WARDOG: Awareness Detection Watchdog for Botnet Infection on the Host Device | 0 | 0.34 | 2021 |
A Pattern-Driven Adaptation in IoT Orchestrations to Guarantee SPDI Properties. | 0 | 0.34 | 2020 |
Networking-Aware IoT Application Development. | 0 | 0.34 | 2020 |
Cyber Range Training Programme Specification Through Cyber Threat and Training Preparation Models. | 0 | 0.34 | 2020 |
Towards IoT Orchestrations with Security, Privacy, Dependability and Interoperability Guarantees | 0 | 0.34 | 2019 |
Pattern-Driven Security, Privacy, Dependability and Interoperability Management of IoT Environments | 0 | 0.34 | 2019 |
Smart End-to-end Massive IoT Interoperability, Connectivity and Security (SEMIoTICS). | 0 | 0.34 | 2019 |
Secure Semantic Interoperability for IoT Applications with Linked Data. | 0 | 0.34 | 2019 |
SEMIoTICS Architectural Framework: End-to-end Security, Connectivity and Interoperability for Industrial IoT | 3 | 0.45 | 2019 |
Model-Driven Cyber Range Training: A Cyber Security Assurance Perspective | 0 | 0.34 | 2019 |
The Threat-Arrest Cyber-Security Training Platform | 0 | 0.34 | 2019 |
VirtuWind - An SDN- and NFV-Based Architecture for Softwarized Industrial Networks. | 3 | 0.40 | 2019 |
Architectural Patterns for Secure IoT Orchestrations | 2 | 0.43 | 2019 |
CloudNet Anti-malware Engine - GPU-Accelerated Network Monitoring for Cloud Services. | 0 | 0.34 | 2018 |
The Industrial Internet of Things as an enabler for a Circular Economy Hy-LP: A novel IIoT protocol, evaluated on a wind park's SDN/NFV-enabled 5G industrial network. | 3 | 0.40 | 2018 |
A review of lightweight block ciphers. | 10 | 0.69 | 2018 |
Policy-Controlled Authenticated Access to LLN-Connected Healthcare Resources | 5 | 0.47 | 2018 |
Towards a Security, Privacy, Dependability, Interoperability Framework for the Internet of Things | 0 | 0.34 | 2018 |
Reactive security for SDN/NFV‐enabled industrial networks leveraging service function chaining | 4 | 0.59 | 2018 |
XSACd - Cross-domain resource sharing & access control for smart environments. | 3 | 0.41 | 2018 |
The Interoperability of Things: Interoperable solutions as an enabler for IoT and Web 3.0 | 2 | 0.42 | 2018 |
SecRoute: End-to-end secure communications for wireless ad-hoc networks | 3 | 0.42 | 2017 |
A survey of lightweight stream ciphers for embedded systems | 12 | 0.91 | 2016 |
RtVMF: A Secure Real-Time Vehicle Management Framework. | 7 | 0.53 | 2016 |
Node.DPWS: Efficient Web Services for the Internet of Things. | 2 | 0.37 | 2016 |
Which IoT Protocol? Comparing Standardized Approaches over a Common M2M Application. | 0 | 0.34 | 2016 |
Secure and Authenticated Access to LLN Resources Through Policy Constraints | 0 | 0.34 | 2015 |
RT-SPDM: Real-Time Security, Privacy and Dependability Management of Heterogeneous Systems. | 4 | 0.46 | 2015 |
WSACd - A Usable Access Control Framework for Smart Home Devices | 0 | 0.34 | 2015 |
Embedded Systems Security: A Survey of EU Research Efforts | 2 | 0.37 | 2015 |
Node.DPWS: High performance and scalable Web Services for the IoT. | 1 | 0.41 | 2015 |
Embedded Systems Security Challenges. | 0 | 0.34 | 2014 |
Policy-Based Access Control for Body Sensor Networks. | 1 | 0.37 | 2014 |
Policy-Based Access Control For Dpws-Enabled Ubiquitous Devices | 3 | 0.48 | 2014 |
DSAPE - Dynamic Security Awareness Program Evaluation. | 0 | 0.34 | 2014 |
Lightweight Cryptography For Embedded Systems - A Comparative Analysis | 4 | 0.64 | 2013 |
How Effective Is Your Security Awareness Program? An Evaluation Methodology | 7 | 0.50 | 2012 |
Secure policy-based management solutions in heterogeneous embedded systems networks | 2 | 0.38 | 2012 |