Vision and Challenges for Realising the Internet of Things, pp.10-2759, 2010. ,
54432-libelium-unveils-the-top-50-internet-of-things applica- tions 3. Internet of Things in 2020:A roadmap for the future, Libelium Unveils the Top 50 Internet of Things Applications: A Survey on Applications of Wireless Sensor Network Using Cloud Computing. In : International Journal of Computer Science & Emerging Technologies (E-ISSN, pp.2044-6004, 2010. ,
Integrating Wireless Sensor Networks with Cloud Computing, 2011 Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011. ,
DOI : 10.1109/MSN.2011.86
Securing the Internet of Things, Computer, vol.44, issue.9, pp.51-58, 2011. ,
DOI : 10.1109/MC.2011.291
A Survey of Recent Intrusion Detection Systems for Wireless Sensor Network, Advances in Network Security and Applications: Conference Proceedings of Fourth International Conference on Network Security and Applications, pp.978-981, 2011. ,
DOI : 10.1007/978-3-642-22540-6_27
Lightweight Hierarchical Model For HWSNET, International Journal of Advanced Smart Sensor Network Systems (IJASSN), pp.17-32, 2011. ,
Sleep Deprivation Attack Detection in Wireless Sensor Network, Sensor-Cloud Infrastructure. In: Proceedings of the 13th International Conference on Network-Based Information Systems, pp.19-25, 2010. ,
DOI : 10.5120/5056-7374
URL : http://arxiv.org/abs/1203.0231
Opportunistic Sensing: Security Challenges for the New Paradigm Secure Cloud Computing with Brokered Trusted Sensor Networks, Proceedings of the First International Conference on Communication Systems and Networks (COMSNETS) Proceedings of the International Symposium on Collaborative Technologies and Systems (CTS '10, 2008. ,
Security in Smart object Networks, nordsecmob.aalto.fi/ en/publications/ theses 2012 sethi-mohit thesis, p.pdf, 2012. ,
On Cryptographic Approaches to Internet-of-Things Security, www.lix. polytechnique.fr/ hipercom ... papers houSu ing.pdf 19 Enforcing Security Mechanisms in the IP-Based Internet of Things: An Algorithmic Overview, pp.1999-4893197, 2013. ,
A novel coding scheme to implement signature based IDS in IP based Sensor Networks, 2009 IFIP/IEEE International Symposium on Integrated Network Management-Workshops, pp.978-979, 2009. ,
DOI : 10.1109/INMW.2009.5195973
A Novel Intrusion Detection Framework for IP Based Sensor Networks, Conference Proceedings of International Conference on Information Networking, pp.978-89, 2009. ,
An Intrusion Detection Scheme Based on Anomaly Mining in Internet of Things, Conference Proceedings of the 4th International Conference on Wireless, Mobile and Multimedia Networks, p.China, 2011. ,
Research on immunity-based intrusion detection technology for the Internet of Things, 2011 Seventh International Conference on Natural Computation, pp.978-979, 2006. ,
DOI : 10.1109/ICNC.2011.6022060
Pervasive Healthcare and Wireless Health Monitoring, Mobile Networks and Applications, vol.8, issue.4, 2007. ,
DOI : 10.1007/s11036-007-0017-1