References
- P. A., Abdalla & C.,Varol (2020, June). "Testing IoT Security: The Case Study of an IP Camera." In 2020 8th International Symposium on Digital Forensics and Security (ISDFS) (pp. 1-5). IEEE.
- Z. Ling, K. Liu, Y. Xu, Y. Jin, & X. Fu., (2017, December). "An end-to-end view of iot security and privacy." In GLOBECOM 2017-2017 IEEE Global Communications Conference (pp. 1-7). IEEE.
- L. Atzori, A. Iera & G. Morabito (2010)." The internet of things: A survey. "Computer networks, 54(15), 2787-2805. https://doi.org/10.1016/j.comnet.2010.05.010
- J. Gubbi, R. Buyya, S. Marusic, & M. Palaniswami, (2013). "Internet of Things (IoT): A vision, architectural elements, and future directions." Future generation computer systems, 29(7), 1645-1660. https://doi.org/10.1016/j.future.2013.01.010
- S. Hilton, (October 2016) , Dyn analysis summary of friday october 21 attack [online] Available: http://dyn.comlblog/dyn-analysis-summary-of-friday-october-21-attack/
- M. Antonakakis, T. April, M. Bailey, M. Bernhard, E. Bursztein, J. Cochran, Z. Durumeric, J.A Halderman, L. Invernizzi, M. Kallitsis, et al. "Understanding the mirai botnet." In Proceedings of the USENIX Security Symposium, Vancouver, BC, Canada, 16-18 August 2017.
- R. Chirgwin, Get pwned: Web cctv cams can be hijacked by single http request - server buffer overflow equals remote control, November 2016, [online] Available: http://www.theregister.co.uk/2016/11/30/iot_cameras_compromised_by_long_url.
- August (2019) ,"Information and Security White Paper 2019 (in Japanese)", white paper Information-technology Promotion Agency.
- S. Shin, & Y. Seto, (2020, June). "Development of IoT Security Exercise Contents for Cyber Security Exercise System." In 2020 13th International Conference on Human System Interaction (HSI) (pp. 1-6). IEEE.
- N. Kalbo, Y. Mirsky, A. Shabtai, & Y. Elovici, (2019). "The Security of IP-based Video Surveillance Systems." arXiv preprint arXiv:1910.10749.
- M. Swan, (2012). "Sensor mania! the internet of things, wearable computing, objective metrics, and the quantified self 2.0." Journal of Sensor and Actuator networks, 1(3), 217-253. https://doi.org/10.3390/jsan1030217
- Markit (2019) "The top trends of 2019: powered by transformative technologies".
- R. Alharbi, & D. Aspinall (2018). "An IoT analysis framework: An investigation of IoT smart cameras vulnerabilities."
- J. Liranzo, & T. Hayajneh, (2017, October). "Security and privacy issues affecting cloud-based IP camera." In 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON) (pp. 458-465). IEEE.
- A. Tekeoglu, & A. S. Tosun, (2015, August). "Investigating security and privacy of a cloud-based wireless IP camera: NetCam." In 2015 24th International Conference on Computer Communication and Networks (ICCCN) (pp. 1-6). IEEE.
- A. Costin, (2016, October). "Security of cctv and video surveillance systems: Threats, vulnerabilities, attacks, and mitigations." In Proceedings of the 6th international workshop on trustworthy embedded devices (pp. 45-54).
- L Qiao,., & K Nahrstedt,. (1997, July). "A new algorithm for MPEG video encryption." In Proc. of First International Conference on Imaging Science System and Technology (pp. 21-29).
- C shi,., & B Bhargava. (1998, October). "An efficient MPEG video encryption algorithm." In Proceedings seventeenth IEEE symposium on reliable distributed systems (Cat. No. 98CB36281) (pp. 381-386). IEEE
- U Potdar,., K. T Talele,., & S. T. Gandhe, (2009, January). "Comparison of MPEG video encryption algorithms". In Proceedings of the International Conference on Advances in Computing, Communication and Control (pp. 289-294)
- S. Bird, E. Klein, & E. Loper, (2009). "Natural language processing with Python: analyzing text with the natural language toolkit." " O'Reilly Media, Inc.".