bookmarks  

    No matching posts.
  • ⟨⟨
  • ⟩⟩

publications  2  

  •  

    , and . IJIRIS:: International Journal of Innovative Research in Information Security, Volume VII (Issue IX): 89-98 (October 2020)1. Andrea Zanella, Lorenzo Vangelista, Nicola Bui, Angelo Castellani, Michele Zorzi ―”Internet of Things for Smart Cities”, IEEE INTERNET OF THINGS JOURNAL, VOL. 1, NO. 1, FEBRUARY 2014 2. Salha M. Alzahrani ―”Sensing for the Internet of Things and Its Applications”, 978-1-5386-3281-9/17 $31.00 © 2017 IEEE DOI 10.1109/W-FiCloud.2017.33 3. H.Schaffers, N.Komninos, M.Pallot, B.Trousse, M.Nilsson, A.Oliveira, “Smart Cities and the Future Internet: Towards Cooperation Frameworks for Open Innovation”, The Future Internet, Lecture Notes in Computer Science Volume 6656, pp. 431-446, 2011. 4. D.Cuff, M.Hansen, and J.Kang, “Urban sensing: out of the woods.” Communications of the ACM vol. 51, no. 3, pp. 24-33, Mar. 2008. 5. H.Arasteh, V.Hosseinnezhad, V.Loia, A.Tommasetti, O.Troisi, M.Shafie-khah, P. Siano ”Iot-based Smart Cities: a Survey”, 978-1-5090-2320-2/16/$31.00 ©2016 IEEE. 6. Arun Kumar Rana , Ram krishna , Sachin Dhwan3, Dr. Sharad Sharma, Dr. Rashmi Gupta ”Review on Artificial Intelligence with Internet of Things - Problems, Challenges and Opportunities”,978-1-7281-1793-5/19/$31.00 ©2019 IEEE 7. Husam Rajab, Tibor Cinkelr ” IoT based Smart Cities”, 978-1-5386-3779-1/18/$31.00 ©2018 IEEE. 8. B.Hammi, R.Khatoun, S.Zeadally, A.Fayad and L.Khoukhi, "IoT technologies for smart cities," in IET Networks, vol. 7, no. 1, pp. 1-13, 1 2018. 9. D.El-Baz and J.Bourgeois,“Smart cities in Europe and the alma logistics project,” ZTE Commun., vol. 13, no. 4, pp. 10–15, 2015 10. H.Arasteh, V.Hosseinnezhad, V.Loia, A.Tommasetti, O.Troisi, M.Shafie-khah, P.Siano” Iot-based Smart Cities: a Survey” , 978-1-5090-2320-2/16/$31.00 ©2016 IEEE 11. M.M.Rathore, A.Ahmad, A.Paul, S.Rho, “Urban planning and building smart cities based on the internet of things using big data analytics,” Comput. Netw., 2016, DOI: 10.1016/j.comnet.2015.12.023 12. N.Neyestani, M.Y.Damavandi, M.Shafie-khah and J.P.S.Catalão ― “Modeling the PEV traffic pattern in an urban environment with parking lots and charging stations,” PowerTech, 2015 IEEE Eindhoven, Eindhoven, 2015, pp. 1-6. 13. M.Yazdani-Damavandi, M.P.Moghaddam, M.R.Haghifam, M.Shafie-khah, J.P.S.Catalão, "Modeling Operational Behavior of Plug-in Electric Vehicles’ Parking Lot in Multienergy Systems," IEEE Trans. Smart Grid, vol. 7, pp. 124-135, 2016. 14. N.Neyestani, M.Y.Damavandi, M.Shafie-Khah, J.Contreras, and J.P.S.Catalão, Ällocation of plug-in vehicles' parking lots in distribution systems considering network-constrained objectives," IEEE Trans. Power Syst., vol. 30, pp. 2643-2656, 2015. 15. M.Shafie-khah, E.Heydarian-Forushani, M.E.H.Golshan, P. Siano, M.P. Moghaddam, M.K. Sheikh-El-Eslami, and J.P.S. Catalão, “Optimal trading of plug-in electric vehicle aggregation agents in a market environment for sustainability,” Appl. Energy, Volume 162, 15 January 2016, Pages 601-612 16. A.K.Evangelos, D.T.Nikolaos, and C.B.Anthony, “Integrating RFIDs and smart objects into a Unified Internet of Things architecture,” Advances in Internet of Things, vol. 1, pp. 5-12, 2011. 17. J.Gubbi, R.Buyya, S.Marusic, and M.Palaniswami, “Internet of Things (IoT): A vision, architectural elements, and future directions,” Future Gener. Comput. Syst., vol. 29, pp. 1645–1660, 2013. 18. A.Botta, W.de Donato, V.Persico, and A.Pescapé, ― “Integration of cloud computing and internet of things: a survey”, Future Gener. Comput. Syst., vol. 56, pp. 684–700, 2016. 19. R.Fielding,―“Representational state transfer,” Architectural Styles and the Design of Network-based Software Architecture, pp.76-85,2000. 20. A.P.Castellani, N.Bui, P.Casari, M.Rossi, Z.Shelby and M.Zorzi ― “Architecture and protocols for the Internet of Things: A case study,” 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), pp. 678–683, 2010 21. Z. Shelby, K. Hartke, C. Bormann, and B. Frank.―“Constrained Application Protocol (CoAP).” draft-ietf-core-coap-18. s.l. : IETF, 2013. 22. A.Castellani, S.Loreto, A.Rahman, T.Fossati and E.Dijk.―“Best Practices for HTTP-CoAP Mapping Implementation.” draft-castellanicore-http-mapping-07. s.l. : IETF, 2013..
    4 years ago by @ijiris
    (1)
     
     
  •  

    . IJIRIS:: International Journal of Innovative Research in Information Security, Volume VI (Issue VI): 117-128 (November 2019)1. Symantec, 2019 Internet Security Threat Report, Vol. 24, 2019. 2. Akamai, 2019 State of the Internet / Security: Media Under Assault, 2019. https://www.akamai.com 3. J. Xia, S. Vangala, J. Wu, L. Gao, and K. Kwiat, “Effective Worm Detection for Various Scan Technique,” Journal of Computer Security, vol.14, no.4, pp.359–387, 2006. 4. W. Yu, X. Wang, X. Fu, D. Xuan, and W. Zhao, “An Invisible Localization Attack to Internet Threat Monitors,” IEEE Trans. Parallel and Distributed Systems, vol.20, no.11, pp.1611–1625, 2009. 5. M. Narita, K. Ogura, B.B. Bista, and T. Takata, “Evaluating a Dynamic Internet Threat Monitoring Method for Preventing PN Code-Based Localization Attack,” Proc. 17th International Conference on Network-Based Information Systems (NBiS 2014), 2014. 6. M. Narita, B.B. Bista, and T. Takata, “A Practical Study on Noise-Tolerant PN Code-Based Localisation Attacks to Internet Threat Monitors,” Int. J. Space-Based and Situated Computing, vol.3, no.4, pp.215–226, December 2013. 7. W. Yu, S. Wei, G. Ma, X. Fu, and N. Zhang, “On Effective Localization Attacks Against Internet Threat Monitors,” Proc. 2013 IEEE International Conference on Communications (ICC), pp.2011–2015, 2013. 8. UCSD Network Telescope. https://www.caida.org/projects/network telescope/ 9. Guillot, R. Fontugne, P. Winter, P. Me´rindol, A. King, A. Dainotti, and C. Pelsser, “Chocolatine: Outage Detection for Internet Background Radiation,” 10. Proc. Network Traffic Measurement and Analysis Conference (TMA), June 2019. DShield. http://www.dshield.org/ 11. M. Eto, D. Inoue, J. Song, J. Nakazato, K. Ohtaka, and K. Nakao, “nicter: A Large-Scale Network Incident Analysis System: Case Studies for Understanding Threat Landscape,” Proc. 1st Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, pp.37–45, 2011. 12. D. Inoue, M. Eto, K. Suzuki, M. Suzuki, and K. Nakao, “DAEDALUS-VIZ: Novel Real-Time 3D Visualization for Darknet Monitoring-Based Alert System,” Proc. 9th International Symposium on Visualization for Cyber Security, pp.72–79, October 2012. 13. H. Kanehara, Y. Murakami, J. Shimamura, T. Takahashi, D. Inoue and N. Murata, “Real-time botnet detection using nonnegative tucker decomposition,” 14. Proc. the 34th ACM/SIGAPP Symposium on Applied Computing, pp.1337–1344, April 2019. 15. X. Fan, C. Li, and X. Dong, “ A Real-Time Network Security Visualization System Based on Incremental Learning (ChinaVis 2018),” J. Visualization, pp.1–15, October 2018. 16. Y. Shinoda, K. Ikai, and M. Itoh, “Vulnerabilities of Passive Internet Threat Monitors,” Proc. 14th USENIX Security Symposium, pp.209–224, 2005. 17. J. Bethencourt, J. Franklin, and M. Vernon, “Mapping Internet Sensors with Probe Response Attacks,” Proc. 14th USENIX Security Symposium, pp.193– 208, 2005. 18. S. Wei, D. Shen, L. Ge, W. Yu, E.P. Blasch, K.D. Pham, and G. Chen, “Secured Network Sensor-Based Defense System,” Proc. SPIE 9469, Sensors and Systems for Space Applications VIII, 2015. 19. W. Yu, N. Zhang, X. Fu, R. Bettati, and W. Zhao, “Localization Attacks to Internet Threat Monitors: Modeling and Countermeasures,” IEEE Trans. Computers, vol.59, no.12, pp.1655–1668, 2010. 20. ENISA, “Proactive Detection of Network Security Incidents, Report,” https://www.enisa.europa.eu/2011. 21. M. Kamizono et al., “anti Malware engineering WorkShop ~MWS Datasets 2015~,” MWS2015, 2015..
    5 years ago by @ijiris
    (0)
     
     
  • ⟨⟨
  • 1
  • ⟩⟩