References
- Jeong Y. S. (2011). A User Privacy Protection Scheme based on Password through User Information Virtuality in Cloud Computing. Journal of Convergence Soceity for SMB, 1(1), 29-37.
- Kim K. I. (2014). A Exploratory Study IMS Performance Mdodeling Using Information Systems Success Model. Journal of Digital Convergence, 12(3), 127-140. https://doi.org/10.14400/JDC.2014.12.3.127
- Kim K. I. (2015). The Effects on Improvement of IMS Through Corrective Actions. Journal of the Convergence Society for SMB, 5(4), 1-4.
- Kim K. I. (2012). Causes Analysis of Increasing Revocation for IMS Certification in small and Medium-size Enterprises. Journal of the Convergence Society for SMB, 2(2), 7-12.
- Kanungo R. N. (1982). Measurement of job and work involvement. Journal of Applied Psychology, 67(3), 341-349. https://doi.org/10.1037//0021-9010.67.3.341
- Babin B. J. and Boles J. S. (1996). The effects of perceived co-worker involvement and supervisor support on service provider role stress, performance and job satisfaction. Journal of retailing, 72(1), 57-75. https://doi.org/10.1016/S0022-4359(96)90005-6
- Shin S. S., Jeong Y. S. and An Y. J. (2015). A Study of Analysis and Response and Plan for National and International Security Practices using Fin-Tech Technologies. Journal of Convergence Soceity for SMB, 5(3), 1-7.
- Jeong Y. S. (2016). A Study of An Efficient Clustering Processing Scheme of Patient Disease Information for Cloud Computing Environment. Journal of Convergence Soceity for SMB, 6(1), 33-38. https://doi.org/10.22156/CS4SMB.2016.6.1.033
- D. Ilic, S. Karnouskos & M. Wilhelm. (2013). A comparative analysis of smart metering data aggregation performance. 2013 11th IEEE International Conference on Industrial Informatics (INDIN), 434-439.
- J. S. Lee. (2017). A Study on the Effects of the Cooperative Philosophy between SMEs to the Cooperative Activities and Performance. Journal of the Korea Convergence Society, 8(9), 301-309. https://doi.org/10.15207/JKCS.2017.8.9.301
- Y. S. Jeong, Y. H. Yon & J. H. Ku. (2017). Hash-chain-based IoT authentication scheme suitable for small and medium enterprises. Journal of Convergence for Information Technology, 7(4), 105-111. https://doi.org/10.22156/CS4SMB.2017.7.4.105
- A. Deshpande, P. Pitale, and S. Sanap, "Industrial automation using Internet of Things (IoT)," Int. J. Adv. Res. Comput. Eng. Technol., vol. 5, no. 2, pp. 266-269, 2016.
- N. Choosri, Y. Park, S. Grudpan, P. Chuarjedton, and A. Ongvisesphaiboon, "IoT-RFID testbed for supporting traffic light control," Int. J. Inf. Electron. Eng., vol. 5, no. 2, p. 102, Mar. 2015.
- H. Merchant and D. Ahire, "Industrial automation using IoT with raspberry Pi," Int. J. Comput. Appl., vol. 168, no. 1, pp. 44-46, 2017. https://doi.org/10.5120/ijca2017914277
- Industrial Internet Consortium. (2019). I.-I.C. Infinite Industrial IoT Innovation 2014-2019. [Online]. Available: http://www.iotinfinite.org and http://www.iotinfinite.org. Commun. Technol., vol. 62, no. 2, pp. 151-159, 2015.
- M. Hossain, S. Noor, Y. Karim, and R. Hasan, "IoTbed: A generic architecture for testbed as a service for Internet of Things-based systems," in Proc. ICIOT, Jun. 2017, pp. 42-49.
- Y. Berhanu, H. Abie, and M. Hamdi, "A testbed for adaptive security for IoT in eHealth," in Proc. Int. Workshop Adapt. Secur., 2013, pp. 1-8.
- S. Siboni et al., "Security testbed for Internet-of-Things devices," IEEE Trans. Rel., vol. 68, no. 1, pp. 23-44, Mar. 2019. https://doi.org/10.1109/tr.2018.2864536
- O. A. Waraga, M. Bettayeb, Q. Nasir, and M. A. Talib, "Design and implementation of automated IoT security testbed," Comput. Secur., vol. 88, Jan. 2020, Art. no. 101648.
- O. Nock, J. Starkey, and C. M. Angelopoulos, "Addressing the security gap in IoT: Towards an IoT cyber range," Sensors, vol. 20, no. 18, p. 5439, Sep. 2020. https://doi.org/10.3390/s20185439