IIoT-SIDefender: Detecting and defense against the sensitive information leakage in industry IoT
- 14 April 2017
- journal article
- research article
- Published by Springer Nature in World Wide Web
- Vol. 21 (1), 59-88
- https://doi.org/10.1007/s11280-017-0459-8
Abstract
No abstract availableKeywords
Funding Information
- National Natural Science Foundation of China (CN) (61373137)
- Major Program of Jiangsu Higher Education Institutions (14KJA520002)
This publication has 16 references indexed in Scilit:
- LSCD: A Low-Storage Clone Detection Protocol for Cyber-Physical SystemsIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2016
- Fast Detection of Transformed Data LeaksIEEE Transactions on Information Forensics and Security, 2015
- A Model-Based Security Toolkit for the Internet of ThingsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2014
- Securing distributed storage for Social Internet of Things using regenerating code and Blom key agreementPeer-to-Peer Networking and Applications, 2014
- Trust management system design for the Internet of Things: A context-aware and multi-service approachComputers & Security, 2013
- IntPatch: Automatically Fix Integer-Overflow-to-Buffer-Overflow Vulnerability at Compile-TimeLecture Notes in Computer Science, 2010
- Multi-attribute group decision making model under the condition of uncertain informationAutomation in Construction, 2008
- An extension of TOPSIS for group decision makingMathematical and Computer Modelling, 2007
- Data lifetime is a systems problemPublished by Association for Computing Machinery (ACM) ,2004
- Watermarking, tamper-proofing, and obfuscation - tools for software protectionIEEE Transactions on Software Engineering, 2002