Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Reference :

    1. R. Khatoun and S. Zeadally, “ Smart Cities: Basic Concepts, Architectural Issues, and Research Opportunities,” Commun. ACM , vol. 59, no. 8, Aug. 2016, pp. 46–57.
    2. UN E - Government Survey 2014, “E-Government for the Future We Want,” http://www.un.org/desaB. David et al ., “ Unconditionally Secure, Universally Composable Privacy Preserving Linear Algebra,” IEEE Trans. Info. Forensics Security , vol. 11, no. 1, Jan. 2016, pp. 59–73.
    3. J. H. Cheon and J. Kim, “A Hybrid Scheme of Public Key Encryption and Somewhat Homomorphic Encryption,” IEEE Trans. Info. Forensics Security , vol. 10, no. 5, May 2015, pp. 1052–63.
    4. H. Demirkan, “A Smart Healthcare Systems Framework,” IT Professional , vol. 15, no. 5, Sept.– Oct. 2013, pp. 38–45
    5. Y. Zou, J. Zhu, X. Wang and L. Hanzo, "A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends," in Proceedings of the IEEE, vol. 104, no. 9, pp. 1727-1765, Sept. 2016.
    6. D. Kapetanovic, G. Zheng and F. Rusek, "Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks," in IEEE Communications Magazine, vol. 53, no. 6, pp. 21-27, June 2015.
    7. C. Clavier, B. Feix, G. Gagnerot and M. Roussellet, "Passive and Active Combined Attacks on AES Combining Fault Attacks and Side Channel Analysis," 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, Santa Barbara, CA, 2010, pp. 10-19.
    8. M. A. Chaqfeh, N. Mohamed, "Challenges in middleware solutions for the Internet of Things", Proc. Int. Conf. CTS, pp. 21-26, 2012.
    9. OmniSecu.com http://www.omnisecu.com/security/infrastructure-andemail-security/low-interaction-honeypots-and-highinteraction-honeypots.php
    10. P. Diebold, A. Hess, G. Schafer “A Honeypot Architecture for Detecting and Analyzing Unknown
    11. Network Attacks”, In Proc. Of 14th Kommounikation in Verteilten Systemen 2005 (KiVS05), Kaiserslautern, Germany, February, 2005. http://www2.tkn.tusberlin.de/publications/papers/kivs05.pdf
    12. http://InformIT.com http://www.informit.com/articles/article.aspx?p=30489 Tech-target.com http://searchsecurity.techtarget.com/feature/Honeypottechnology-How-honeypots-work-in-the-enterprise K. Padayachee, "Aspectising honeytokens to contain the insider threat", IET Information Security, vol. 9, no. 4, pp. 240-247, 2015. A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, M. Ayyash, "Internet of things: A survey on enabling technologies protocols and applications", IEEE Communications Surveys & Tutorials, vol. 17, no. 4, pp. 2347-2376, 2015. K. Zhang, X. Liang, R. Lu, X. Shen, "Sybil attacks and their defenses in the internet of things", IEEE Internet Things J., vol. 1, no. 5, pp. 372-383, 2014. "Cybersecurity and The Internet of Things", EY. global, 2015. N. Kambow, L. Passi, "Honeypots: The need of network security", International Journal of Computer Scienceand Information Technologies, vol. 5, 2014.

Recent Article