Publication: TRIS: A Three-Rings IoT Sentinel to Protect Against Cyber-Threats
Abstract (Spanish)
Collections
Collections
References
Pantaleone. Nespoli and Félix. Gómez Mármol, "e-Health Wireless IDS with SIEM integration", IEEE Wireless Communications and Networking Conference (WCNC' ‘18). Barcelona, 2018.
Gartner. Gartner's 2016 Hype Cycle for Emerging Technologies Identifies Three Key Trends That Organizations Must Track to Gain Competitive Advantage, 2016.
Srisakdi. Charmonman and Pornpisud. Mongkhonvanit, "Special consideration for Big Data in IoE or Internet of Everything", 2015 13th International Conference on ICT and Knowledge Engineering (ICT Knowledge Engineering 2015)., pp. 147-150, Nov. 2015.
Yong. Ho Hwang, "IoT Security & Privacy: Threats and Challenges", Proceedings of the 1st ACM Workshop on IoT Privacy Trust and Security. I0TPTS ‘15. Singapore Republic of Singapore: ACM, 2015.
Markus. Miettinen et al., "IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT", 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). IEEE, pp. 2177-2184, June 2017.
Huansheng. Ning, Liu. Hong and T. Yang Laurence, "Cyberentity Security in the Internet of Things", Computer, pp. 46-53, Apr. 2013.
Alessandro. Sforzin et al., "RPiDS: Raspberry Pi IDS A Fruitful Intrusion Detection System for IoT", IEEE Conference on Advanced and Trusted Computing, pp. 440-448, 2016.
Huansheng. Ning and Hong. Liu, "Cyber-Physical-Social Based Security Architecture for Future Internet of Things", Advances in Internet of Things, pp. 1-7, Jan. 2012.
Shin-Ming. Cheng et al., "Traffic-Aware Patching for Cyber Security in Mobile IoT", IEEE Communications Magazine, vol. 7, pp. 29-35, 2017.
Jonathan. Roux et al., "Toward an Intrusion Detection Approach for IoT based on Radio Communications Profiling", 13th European Dependable Computing Conference. Geneva, pp. 147-150, Sept. 2017.
Yin. Minn Pa Pa et al., "IoTPOT: A Novel Honeypot for Revealing Current IoT Threats", Journal of Information Processing, vol. 3, pp. 522-533, 2016.
Al-Sakib. Khan Pathan, The State of the Art in Intrusion Prevention and Detection, Taylor & Francis, 2014.
Jesse. Varsalone and Matthew. McFadden, Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It, Taylor & Francis, 2011.
Latifi. Shahram, "Information Technology: New Generations", 13th International Conference on Information Technology. Advances in Intelligent Systems and Computing. Springer International Publishing, 2016.
Ciampa. Mark, CompTIA Security+ Guide to Network Security Fundamentals. Cengage Learning 2017.
Ken. Dunham et al., Android Malware and Analysis, CRC Press, 2014.
Joshua J. Drake et al., Android Hacker's Handbook. EBL-Schweitzer, Wiley, 2014.
Onur. Savas and Julia. Deng, Big Data Analytics in Cybersecurity. Data Analytics Applications, CRC Press, 2017.
Madhu. Akula and Akash. Mahajan, Security Automation with Ansible 2: Leverage Ansible 2 to automate complex security tasks like application security network security and malware analysis, Packt Publishing, 2017.
Boštjan. Kaluža, Instant Weka How-to, Packt Publishing, 2013.
Daniel. Arp et al., "Drebin: Effective and Explainable Detection of Android Malware in Your Pocket", 21th Annual Network and Distributed System Security Symposium (NDSS)., pp. 23-26, Feb. 2014.