Journal of Engineering and Applied Sciences

Year: 2019
Volume: 14
Issue: 2
Page No. 502 - 506

Secure Routing for IoT Base on Polling System

Authors : Seyed MahmoodHashemi

References

Bottino, L.J., 2006. Security measures in a secure computer communications architecture. Proceedings of the 2006 IEEE/AIAA 25th International Conference on Digital Avionics Systems, October 15-19, 2006, IEEE, Portland, Oregon, ISBN:1-4244-0377-4, pp: 1-18.

Breier, J. and L. Hudec, 2011. Risk analysis supported by information security metrics. Proceedings of the12th International Conference on Computer Systems and Technologies, June 16-17, 2011, Vienna, Austria, pp: 393-398.

Feng, N., H.J. Wang and M. Li, 2014. A security risk analysis model for information systems: Causal relationships of risk factors and vulnerability propagation analysis. Inform. Sci., 256: 57-73.
CrossRef  |  Direct Link  |  

Hafiz, M. and R.E. Johnson, 2009. Security-oriented program transformations. Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies, April 13-15, 2009, ACM, Oak Ridge, Tennessee, USA., ISBN:978-1-60558-518-5, pp: 1-4.

Kbar, G., 2008. Security risk analysis for asset in relation to vulnerability, probability of threats and attacks. Proceedings of the 2008 International Conference on Innovations in Information Technology, December 16-18, 2008, IEEE, Al Ain, United Arab Emirates, ISBN:978-1-4244-3396-4, pp: 668-672.

Kondakci, S., 2015. Analysis of information security reliability: A tutorial. Reliab. Eng. Syst. Saf., 133: 275-299.
Direct Link  |  

Kumar, R. and H. Singh, 2013. A qualitative analysis of effects of security risks on architecture of an information system. ACM. SIGSOFT. Software Eng. Notes, 38: 1-3.
CrossRef  |  Direct Link  |  

Mixia, L., Y. Dongmei, Z. Qiuyu and Z. Honglei, 2007. Network security risk assessment and situation analysis. Proceedings of the 2007 International Workshop on Anti-Counterfeiting, Security and Identification (ASID), April 16-18, 2007, IEEE, Xiamen, China, ISBN:1-4244-1035-5, pp:448-452.

Padyab, A.M., T. Paivarinta and D. Harnesk, 2014. Genre-based assessment of information and knowledge security risks. Proceedings of the 2014 47th Hawaii International Conference on System Sciences, January 6-9, 2014, IEEE, LuleƄ, Sweden, ISBN:978-1-4799-2504-9, pp: 3442-3451.

Silva, M.M., A.P.H. De Gusmao, T. Poleto, L.C.E. Silva and A.P.C.S. Costa, 2014. A multidimensional approach to information security risk management using FMEA and fuzzy theory. Int. J. Inf. Manage., 34: 733-740.
CrossRef  |  Direct Link  |  

Viehmann, J., 2012. Reusing risk analysis results--an extension for the coras risk analysis method. Proceedings of the Joint 2012 International Conference on Privacy, Security, Risk and Trust and Social Computing, September 3-5, 2012, IEEE, Amsterdam, Netherlands, ISBN:978-1-4673-5638-1, pp: 742-751.

Vorster, A. and L.E.S. Labuschagne, 2005. A framework for comparing different information security risk analysis methodologies. Proceedings of the Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists on IT Research in Developing Countries, September 20-22, 2005, South Africa, pp: 95-103.

Wang, L.X., 1997. A Course in Fuzzy System and Control. Prentice Hall, Upper Saddle River, New Jersey, USA., ISBN:9780135408827, pp: 424.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved