Future challenges for smart cities: Cyber-security and digital forensics
Tài liệu tham khảo
Antonini, 2014, Security challenges in building automation and scada, 1
Ashktorab, 2012, Security threats and countermeasures in cloud computing, Int. J. Appl. Innovat. Eng. Manag. (IJAIEM), 1, 234
Anon, 2016
Baig, 2014, Securing the internet of things infrastructure standards and techniques
Baldwin, 2016
Behl, 2011, Emerging security challenges in cloud computing: an insight to cloud security challenges and their mitigation, 217
Bera, 2015, Cloud computing applications for smart grid: a survey, IEEE Trans. Parallel Distr. Syst., 26, 1477, 10.1109/TPDS.2014.2321378
Byun, 2014, Internet of things for smart crime detection, Contemp. Eng. Sci., 7, 749, 10.12988/ces.2014.4685
Canis, 2014
Casey, 2009
Casey, 2008, The impact of full disk encryption on digital forensics, ACM SIGOPS Oper. Syst. Rev., 42, 93, 10.1145/1368506.1368519
Cisco, 2015
Colak, 2016, A survey on the critical issues in smart grid technologies, Renew. Sustain. Energy Rev., 54, 396, 10.1016/j.rser.2015.10.036
Cusack, 2015, Up-dating Investigation Models for Smart Phone Procedures
2017
Depuru, 2011, Electricity theft: overview, issues, prevention and a smart meter based approach to control theft, Energy Policy, 39, 1007, 10.1016/j.enpol.2010.11.037
Gambs, 2010, Show me how you move and i will tell you who you are, 34
Granzer, 2010, Security in building automation systems, Ind. Electron. IEEE Trans., 57, 3622, 10.1109/TIE.2009.2036033
Greenberg, 2016
Holmberg, 2003
Jin, 2014, An information framework for creating a smart city through internet of things, IEEE Internet Things J., 1, 112, 10.1109/JIOT.2013.2296516
Johnstone, 2015, Timing attack detection on bacnet via a machine learning approach, 57
Jokar, 2016, A survey on security issues in smart grids, Secur. Commun. Netw., 9, 262, 10.1002/sec.559
Kantarci, 2014, Trustworthy sensing for public safety in cloud-centric internet of things, IEEE Internet Things J., 1, 360, 10.1109/JIOT.2014.2337886
Kastner, 2005, Communication systems for building automation and control, Proc. IEEE, 93, 1178, 10.1109/JPROC.2005.849726
Kechadi, 2015, The state of the art forensic techniques in mobile cloud environment: a survey, challenges and current trends, Int. J. Digit. Crime Forensics, 7, 1, 10.4018/ijdcf.2015040101
Khan, 2016, Scalable and secure network storage in cloud computing, Int. J. Comput. Sci. Inf. Secur., 14, 545
Khatoun, 2016, Smart cities: concepts, architectures, research opportunities, Commun. ACM, 59, 46, 10.1145/2858789
Libelium, 50 Sensor Applications for a Smarter World. Available. URL: http://www.libelium.com/resources/top∖_50∖_iot∖_sensor∖_applications∖_ranking/.
Lilis, 2015, Integrating building automation technologies with smart cities: an assessment study of past, current and future interroperable technologies, 1
Lin, 2012, Cyber-security for the controller area network (can) communication protocol, 1
Lopes, 2015, Detection of dangerous situa- tions using a smart internet of things system, 387
Lu, 2010, Review and evaluation of security threats on the communication networks in the smart grid, 1830
Mansor, 2016, Log your car: The non-invasive vehicle forensics, 974
Mantelero, 2015, Data protection in a big data society. Ideas for a future regulation, Digit. Investig., 15, 104, 10.1016/j.diin.2015.09.006
McDaniel, 2009, Security and privacy challenges in the smart grid, IEEE Secur. Priv., 7, 75, 10.1109/MSP.2009.76
Mishra, 2015, A cognitive adopted framework for IoT big-data management and knowledge discovery prospective, Int. J. Distr. Sens. Netw., 2015, 1, 10.1155/2015/718390
Mukundan, 2014, Efficient integrity verification of replicated data in cloud using homomorphic encryption, Distr. Parallel Databases, 32, 507, 10.1007/s10619-014-7151-0
Mundt, 2016, Security in building automation systems – a first analysis, 1
Nakamura, 2016, Design and implementation of middleware for iot devices toward real-time flow processing
Nolan, 2005
Novák, 2012, Unobtrusive anomaly detection in presence of elderly in a smart-home environment, 341
Olson, 2014
Oriwoh, 2016, Presence detection from smart home motion sensor datasets: a model, 1243
Oriwoh, 2013, Internet of things forensics: challenges and approaches, 608
Ouerhani, 2016, Iot-based dynamic street light control for smart cities use cases
Pardeshi, 2015, Improving data integrity for data storage security in cloud computing, Int. J. Comput. Sci. Netw. Secur. (IJCSNS), 15, 75
Patti, 2016, Iot platform for smart cities: requirements and implementation case studies
Peacock, 2014
Peacock, 2014, An analysis of security issues in building automation systems, 100
Plachkinova, 2016, Emerging trends in smart home security, privacy, and digital forensics
Pleban, 2014, Hacking and securing the ar. drone 2.0 Quadcopter: investigations for improving the security of a toy
Quick, 2014, Impacts of increasing volume of digital forensic data: a survey and future research challenges, Digit. Investig., 11, 273, 10.1016/j.diin.2014.09.002
Ravenscraft, 2014
Razzaque, 2016, Middleware for internet of things: a survey, IEEE Internet Things J., 3, 70, 10.1109/JIOT.2015.2498900
Roussev, 2016, Forensic analysis of cloud-native artifacts, Digit. Investig., vol. 16, S104, 10.1016/j.diin.2016.01.013
Sabahi, 2011, Cloud computing security threats and responses, 245
Sachowski, 2016
Samie, 2016, Iot technologies for embedded computing: a survey
M. Schellevis, B. Jacobs, C. Meijer, J. de Ruiter, Getting Access to Your Own Fitbit Data.
Snyder, 2015
Valasek, 2014
Webb, 2016
Ziegeldorf, 2014, Privacy in the internet of things: threats and challenges, Secur. Commun. Netw., 7, 2728, 10.1002/sec.795