참고문헌
- Allan A. Friedman and Darrell M. West, "Privacy and Security in Cloud Computing", Issues in Technology Innovation, No 3, pp24-29, November 2010
- Zubair A. Baig, Patryk Szewczyk, Craig Valli, Priya Rabadia, Peter Hannay, Maxim Chernyshev, Mike Johnstone, Paresh Kerai, Ahmed Ibrahim, Krishnun Sansurooah, Naeem Syed, Matthew Peacock, "Future challenges for smart cities: Cyber-security and digital forensics", Journal of Digital Investigation, pp3-13, (2017).
- Adel S. Elmaghraby and Michael M. Losavio, "Cyber security challenges in Smart Cities: Safety, security and privacy", Journal of Advanced Research, Volume 5, pp. 491-497, 2014. https://doi.org/10.1016/j.jare.2014.02.006
- Anwaar AlDairi and Lo'ai Tawalbeh, "Cyber Security Attacks on Smart Cities and Associated Mobile Technologies", The International Workshop on Smart Cities Systems Engineering (SCE 2017) Procedia Computer Science, Volume 109C, pp. 1086-1091, 2017.
- Maro Lacinak and Jozef Ristvej, "Smart city, Safety and Security", TRANSCOM 2017: International scientific conference on sustainable, modern and safe transport, Procedia Engineering, Volume 192, pp. 522 - 527, 2017. .
- Rida Khatoun and Sherali Zeadally. "Smart cities: concepts, architectures, research opportunities". Magazine of Communications of the ACM, Volume 59, Issue 8, pp. 46-57 August 2016.
- Terence K.L. Huia, R. Simon Sherratt, Daniel Diaz Sanchez, Major requirements for building Smart Homes in Smart Cities based on Internet of Things technologies", Future Generation Computer Systems, Volume 76, 2017, pp. 358-369. https://doi.org/10.1016/j.future.2016.10.026
- Zakaria El Mrabet, Naima Kaabouch , Hassan El Ghazi, Hamid El Ghazi, "Cyber-security in smart grid: Survey and challenges ", Computers and Electrical Engineering, Volume 67, 2018, pp. 469-482. https://doi.org/10.1016/j.compeleceng.2018.01.015
- Rossouw von Solms and Johan van Niekerk," From information security to cyber security", computers and security, Volume 38, 2013, pp. 97-102 https://doi.org/10.1016/j.cose.2013.04.004
- Carol Hawk and Akhlesh Kaushiva, "Cybersecurity and the Smarter Grid", The Electricity Journal, Vol. 27, Issue 8, pp. 84-95, October 2014. https://doi.org/10.1016/j.tej.2014.08.008
- Rafal Leszczyna, "A review of standards with cybersecurity requirements for smart grid", Computers and Security Volume 77, pp. 262-276, 2018. https://doi.org/10.1016/j.cose.2018.03.011
- Ilhami Colak, Seref Sagiroglu, Gianluca Fulli, Mehmet Yesilbudak, Catalin Felix Covrig, "A survey on the critical issues in smart grid technologies", Renewable and Sustainable Energy Reviews, Volume 54, pp. 396-405, February 2016. https://doi.org/10.1016/j.rser.2015.10.036
- Aakanksha Tewari, B.B. Gupta, "Security, privacy and trust of different layers in Internet of Things (IoTs) framework", Future Generation Computer Systems, May 2018. Available at https://doi.org/10.1016/j.future.2018.04.027
- Zhihong Yang, Yingzhao Yue, Yu Yang, Yufeng Peng, Xiaobo Wang, Wenji Liu, "Study and application on the architecture and key technologies for IoT", in: Proceeding of 2011 International Conference on Multimedia Technology, pp. 747-751, ( ICMT), 2011.
- Rishika Mehtaa , Jyoti Sahnib, Kavita Khannac, "Internet of Things: Vision, Applications and Challenges", International Conference on Computational Intelligence and Data Science (ICCIDS 2018), Procedia Computer Science, Vol. 132, pp. 1263-1269, 2018.
- S. Sicari, A. Rizzardi, L.A. Grieco, A. Coen-Porisini, "Security, privacy and trust in Internet of Things: The road ahead", Computer Networks Journal, Vol. 76, pp. 146-164, 2015. https://doi.org/10.1016/j.comnet.2014.11.008
- Mahmoud Ammar, Giovanni Russello, Bruno Crispo, "Internet of Things: A survey on the security of IoT frameworks", Journal of Information Security and Applications, Vol. 38, pp. 8-27, 2018. https://doi.org/10.1016/j.jisa.2017.11.002
- Christos Stergioua, Kostas E. Psannisa, Brij B. Guptab, Yutaka Ishibashic, "Security, privacy & efficiency of sustainable Cloud Computing for Big Data & IoT", Sustainable Computing: Informatics and Systems, Vol. 19, pp. 174-184, 2018. https://doi.org/10.1016/j.suscom.2018.06.003
- Jianwei Hou, Leilei Qu, Wenchang Shi, "A survey on internet of things security from data perspectives", Computer Networks Journal, in press, Dec 2018.
- Zhifeng Xiao ; Yang Xiao, "Security and Privacy in Cloud Computing", IEEE Communications Surveys & Tutorials, Volume 15 , Issue 2 , pp. 843 - 859, Second Quarter 2013. https://doi.org/10.1109/surv.2012.060912.00182
- Jeevitha B. K., Thriveni J., Venugopal K. R, "Data Storage Security and Privacy in Cloud Computing: A Comprehensive Survey", International Journal of Computer Applications (0975 - 8887) Volume 156 - No 12, December 2016, pp. 16-27.
- Sumitra Binu and Mohammed Misbahuddin, "A Survey of Traditional and Cloud Specific Security Issue" International Symposium on Security in computing and Communication, SSCC 2013: Security in Computing and Communications, Sabu M. Thampi et al. (Eds.): SSCC 2013, pp. 110-129, 2013.
- Saeed Shafieian, Mohammad Zulkernine, Anwar Haque, "Attacks in Public Clouds: Can They Hinder the Rise of the Cloud", n: Mahmood Z. (eds) Cloud Computing. Computer Communications and Networks. Springer, Vol 6, pp. 3-22. 2014.
- Issa M. Khalil, Abdallah Khreishah, Muhammad Azeem, "Cloud Computing Security: A Survey", Journal of Computers, Volume 3, pp. 1-35, 2014.
- "Top Threats to Cloud Computing + Industry Insights", CLOUD SECURITY ALLIANCE The Treacherous 12, 2017.
- Hassan Takabi, James B.D. Joshi, Gail-Joon Ahn, " Security and Privacy Challenges in Cloud Computing Environments", IEEE Security & Privacy, Vol. 8, No. 6, pp. 24-31, 2010. https://doi.org/10.1109/MSP.2010.186
- Ramnath, Deepak , Krishnakumar, Vijayaraghavan, S., Ramanathan, R. "An improved secret key update for multiple intersymbol obfuscation in physical layer security" in Proceedings of the International Conference on Advances in Computing, Communications and Informatics (ICACCI), India, 13-16 September 2017.
- Lu Z.; Shakeri., Razo M, Tacca, M.; Fumagalli, A., Galimberti, Martinelli,, Swallow, G. "Orchestration of reliable three-layer networks", in Proceedings of the 19th International Conference on Transparent Optical Networks (ICTON), Spain, 2-6 July 2017.
- Al-Salloum, Wolthusen, "A link-layer-based self-replicating vulnerability discovery agent" in Proceedings of the IEEE symposium on Computers and Communications, Italy, 22-25 June 2010.