Vision and Challenges for Realising the Internet of Things, CERP- IoT -Cluster of European Research Projects on the Internet of Things, 2010. ,
Systemic Security Management, Institute for Critical Information Infrastructure Protection (ICIIP), 2008. ,
DOI : 10.1109/MSP.2006.167
A Systemic Approach for IoT Security, 2013 IEEE International Conference on Distributed Computing in Sensor Systems, p.351, 2013. ,
DOI : 10.1109/DCOSS.2013.78
URL : https://hal.archives-ouvertes.fr/hal-00868362
Securing the Internet of Things, Computer, vol.44, issue.9, pp.51-58, 2011. ,
DOI : 10.1109/MC.2011.291
Privacy-preserving data mining: models and algorithms, 2008. ,
Model-driven Design of Self-observing Products, pp.978-90, 2011. ,
Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things, Journal of Cyber Security and Mobility, vol.1, pp.309-348, 2013. ,
Research on immunity-based intrusion detection technology for the Internet of Things, 2011 Seventh International Conference on Natural Computation, 2011. ,
DOI : 10.1109/ICNC.2011.6022060
Data integrity and intrusion detection in Wireless Sensor Networks, 2008 16th IEEE International Conference on Networks, 2008. ,
DOI : 10.1109/ICON.2008.4772642
A Survey on Security Issues of M2M Communications in Cyber-Physical Systems, KSII Transactions on Internet and Information Systems, vol.6, issue.1, 2012. ,
DOI : 10.3837/tiis.2012.01.002
A survey of trust and reputation systems for online service provision, Decision Support Systems, vol.43, issue.2, pp.618-644, 2007. ,
DOI : 10.1016/j.dss.2005.05.019
The Meanings of Trust, 1996. ,
Trust and Punishment, Proceedings of the 1st International ICST Conference on Autonomic Computing and Communication Systems, 2007. ,
DOI : 10.4108/ICST.AUTONOMICS2007.2107
Standard Glossary of Software Engineering Terminology, 1991. ,