| 1 |
Security in the Internet of Things: A Survey on Application Layer Protocols |
|
| 2 |
Security in Internet of Things: Challenges, Solutions and Future Directions |
|
| 3 |
Internet of Things (IoT) enables various devices that we use on a daily basis can interact with each other via Internet |
|
| 4 |
Noteson‘‘SecureauthenticationschemeforIoTandcloud servers’’ |
|
| 5 |
Smart-Grid Security Issues |
|
| 6 |
Security Protocols and Privacy Issues into 6LoWPAN Stack: A Synthesis |
|
| 7 |
Internet of things Security: A Survey |
|
| 8 |
Internet of things in medical applications with a service-oriented and security approach: a survey |
|
| 9 |
A Survey on Internet of Things: Security and privacy Issues |
|
| 10 |
Survey on secure communication protocols for the Internet of Things |
|
| 11 |
Security, privacy and trust in Internet of Things: The road ahead |
|
| 12 |
Smart Grid Security: Threats, Vulnerabilities and Solutions |
|
| 13 |
A Security Algorithm for Wireless Sensor Networks in the Internet of Things Paradigm |
|
| 14 |
A comprehensive approach to privacy in the cloud-based Internet of Things |
|
| 15 |
A Survey Report on: Security & Challenges in Internet of Things |
|
| 16 |
Big Data Security For Dummies |
|
| 17 |
IoT Security Threat Map |
|
| 18 |
SECURITY GUIDANCE FOR CRITICAL AREAS OF FOCUS IN CLOUD COMPUTING V3.0 |
|
| 19 |
CompTIA® Security+ SY0-501 Cert Guide Fourth Edition |
|
| 20 |
CORE SOFTWARE SECURITY |
|
| 21 |
Cyber Security 51 Handy Things To Know About Cyber Attacks |
|
| 22 |
DISTRIBUTED SYSTEMS SECURITY Issues, Processes and Solutions |
|
| 23 |
DNS Security Defending the Domain Name System |
|
| 24 |
(Security Issues in Internet of Things (IoT |
|
| 25 |
The Fog Computing Paradigm: Scenarios and Security Issues |
|
| 26 |
Internet of Things (IoT) Security: Current Status, Challenges and Countermeasures |
|
| 27 |
(Security and Privacy in Internet of Things (IoTs |
|
| 28 |
Survey of Security and Privacy Issues of Internet of Things |
|
| 29 |
A Safer Internet of Things |
|
| 30 |
New Security Architecture for IoT Network |
|
| 31 |
NTP SECURITY |
|
| 32 |
Practical Internet of Things Security |
|
| 33 |
Proposed Model to Implement High-Level Information Security in Internet of Things |
|
| 34 |
Wireless Sensor Networks |
|
| 35 |
++Secure Coding in C and C |
|
| 36 |
SECURE SYSTEM SIMULATION - INTERNET OF THINGS |
|
| 37 |
Secure routing for internet of things: A survey |
|
| 38 |
Securing IoT for Smart Home System |
|
| 39 |
SECURING THE IoT: ASSESSING THE REQUIREMENTS FOR AN IoT SECURITY STRATEGY |
|
| 40 |
Security and Privacy Challenges in Industrial Internet of Things |
|
| 41 |
On the features and challenges of security and privacy in distributed internet of things |
|
| 42 |
Security and Privacy Issues of Fog Computing: A Survey |
|
| 43 |
Security and privacy mechanism for health internet of things |
|
| 44 |
Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues |
|
| 45 |
Software Security: Building Security in |
|