Beruflich Dokumente
Kultur Dokumente
3. A. Mohan, "Cyber Security for Personal Medical Devices Internet of Things," 2014 IEEE
International Conference on Distributed Computing in Sensor Systems, Marina Del Rey,
CA, 2014, pp. 372-374. : http://ieeexplore.ieee.org/stamp/stamp.jsp?
tp=&arnumber=6846193&isnumber=6846129 doi: 10.1109/DCOSS.2014.49
7. S. M. R. Islam, D. Kwak, M. H. Kabir, M. Hossain and K. S. Kwak, "The Internet of Things for Health Care:
A Comprehensive Survey," in IEEE Access, vol. 3, no. , pp. 678-708, 2015.doi:
10.1109/ACCESS.2015.2437951 http://ieeexplore.ieee.org/stamp/stamp.jsp?
tp=&arnumber=7113786&isnumber=7042252
9. J. Siddiquee, A. Roy, A. Datta, P. Sarkar, S. Saha and S. S. Biswas, "Smart asthma attack prediction system
using Internet of Things," 2016 IEEE 7th Annual Information Technology, Electronics and Mobile
Communication Conference (IEMCON), Vancouver, BC, Canada, 2016, pp. 1-4.
doi: 10.1109/IEMCON.2016.7746252 http://ieeexplore.ieee.org/stamp/stamp.jsp?
tp=&arnumber=7746252&isnumber=7746074
10. S. M. R. Islam, D. Kwak, M. H. Kabir, M. Hossain and K. S. Kwak, "The Internet of Things for Health Care:
A Comprehensive Survey," in IEEE Access, vol. 3, no. , pp. 678-708, 2015.
11. L. Yang, Y. Ge, W. Li, W. Rao, and W. Shen, A home mobile healthcare system for wheelchair users, in
Proc. IEEE Int. Conf. Comput. Supported Cooperat. Work Design (CSCWD), May 2014, pp. 609614.
12. V. Kolici, E. Spaho, K. Matsuo, S. Caballe, L. Barolli, and F. Xhafa, Implementation of a medical support
system considering P2P and IoT technologies, in Proc. 8th Int. Conf. Complex, Intell. Softw. Intensive Syst.
(CISIS), Jul. 2014, pp. 101106
13. M. Zhang, A. Raghunathan, and N. K. Jha, Trustworthiness of medical devices and body area networks,
Proceedings of the IEEE, vol. 102, no. 8, pp. 11741188, 2014. http://0-
ieeexplore.ieee.org.brum.beds.ac.uk/xpls/icp.jsp?arnumber=6827202#at-glance
14. Samuel Gibbs, Google eavesdropping tool installed on computers without permission.
https://www.theguardian.com/technology/2015/jun/23/google-eavesdropping-tool-installed-computers-
without-permission, 2015
15. D. Puthal, S. Nepal, R. Ranjan and J. Chen, "Threats to Networking Cloud and Edge Datacenters in the
Internet of Things," in IEEE Cloud Computing
16. S. Bhasin and F. Regazzoni, A survey on hardware Trojan detection techniques, in Proc. IEEE Int. Symp.
Circuits and Systems, 2015, pp. 20212024.
17. A. M. Nia, S. Sur-Kolay, A. Raghunathan, and N. K. Jha, Physiological information leakage: A new frontier
in health information security, accepted for publication in IEEE Trans. Emerging Topics in Computing
18. H. Li, Y. He, L. Sun, X. Cheng and J. Yu, "Side-channel information leakage of encrypted video stream in
video surveillance systems," IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on
Computer Communications, San Francisco, CA, 2016, pp. 1-9. doi: 10.1109/INFOCOM.2016.7524621
19. X. Duan, Q. Cui, S. Wang, H. Fang and G. She, "Differential power analysis attack and efficient
countermeasures on PRESENT," 2016 8th IEEE International Conference on Communication Software and
Networks (ICCSN), Beijing, 2016, pp. 8-12. doi: 10.1109/ICCSN.2016.7586627.
20. A. A. Patel and S. J. Soni, "A Novel Proposal for Defending against Vampire Attack in WSN," 2015 Fifth
International Conference on Communication Systems and Network Technologies, Gwalior, 2015, pp. 624-
627.
21. D. Kaur and R. Singh Energy level based Hello Flood attack Mitigation on WSN, 2015, IJESC
22. Y. Li, L. Zhou, H. Zhu and L. Sun, "Privacy-Preserving Location Proof for Securing Large-Scale Database-
Driven Cognitive Radio Networks," in IEEE Internet of Things Journal, vol. 3, no. 4, pp. 563-571, Aug.
2016.
23. A. P. Johnson, S. Patranabis, R. S. Chakraborty and D. Mukhopadhyay, "Remote Dynamic Clock
Reconfiguration Based Attacks on Internet of Things Applications," 2016 Euromicro Conference on Digital
System Design (DSD), Limassol, 2016, pp. 431-438.
24. F. Xu, Z. Qin, C. C. Tan, B. Wang, and Q. Li, IMDGuard: Securing implantable medical devices with the
external wearable guardian, in Proc. IEEE Int. Conf. Comput. Commun., Apr. 2011, pp. 18621870
25. doi: 10.1109/JIOT.2015.2481926
Palgrave Macmillan
M. Semilof. (1996, July). Driving commerce to the web-corporate intranets and the internet: lines blur.
Communication Week [Online]. vol. 6, issue 19. Available: http://www.techweb.com/se/directlinkcgi?
CWK19960715S0005
Venters, Will and Whitley, Edgar A. (2012) A critical review of cloud computing: researching desires and
realities. Journal of Information Technology, 27 (3). pp. 179-197. ISSN 0268-3962
Christian Cervantes, Diego Poplade, Michele Nogueira and Aldri Santos, Detection of Sinkhole Attacks for
Supporting Secure Routing on 6LoWPAN for Internet of Things http://0-
ieeexplore.ieee.org.brum.beds.ac.uk/stamp/stamp.jsp?arnumber=7140344
START AFTER MEETING
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7423655/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7210391/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/6332046/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/962536/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7380537/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/6821532/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7761601/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7746252/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7737142/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7733684/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7723583/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7503493/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7461513/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7384232/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7129976/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7093020/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/6868197/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7093020/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/6849970/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/6271291/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7411833/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7762123/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7753621/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7740440/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7745310/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7745481/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7745830/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7746067/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7733119/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7724728/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7724916/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7579107/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7575858/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7566473/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7568958/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7560864/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7563449/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7546519/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7544364/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7543884/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7538981/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7529088/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7523532/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7518650/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7510833/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7510811/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7503989/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7497199/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7498684/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7471235/http://0-
ieeexplore.ieee.org.brum.beds.ac.uk/document/7473054/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7467343/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7155463/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7457159/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7454499/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7444889/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7430504/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7427903/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7427903/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7427903/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7423328/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7424628/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7420545/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7405613/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7328145/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7307037/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7167238/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7106364/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/6702439/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7001385/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/6849186/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/6849256/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/6718523/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/6505979/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7544364/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7437601/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7412058/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7389813/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7684756/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7546225/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7539245/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7459120/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7453776/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7758259/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7308171/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7005393/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7196499/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7021016/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/6300573/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/5766526/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/1499204/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7562763/