1.A.1.pdf 1.A.2.pdf 4.A.2.pdf 5.B.3.pdf A probabilistic verification scheme for vehicular safety applications.pdf Economic Impact of IoT Cyber Risk.pdf Embedded policing and policy enforcement approach for future secure IoT technologies.pdf Ethical and normative challenges of identification in the Internet of Things.pdf GSAM Internet of things programme.pdf IoT in the wild what negotiating public deployments can tell us about the state of the Internet of Things.pdf IoT interoperability security considerations and challenges in implementation.pdf Jeremy Watson.pdf Keynote Advanced Security Research Greg Akers Cisco.pdf Mechanisms for meaningful consent in IoT.pdf Respectful things adding social intelligence to ‘Smart’ Devices.pdf Smart Bears don’t talk to strangers.pdf Smart IoT and soft AI.pdf The consumer security index for IoT.pdf Using graph databases to assess the security of thingernets based on the thingabilities and thingertivity of things.pdf What children s imagined uses of the BBC Micro bit tells us about designing for their IoT privacy security and safety.pdf WSNs under attack! How bad is it Evaluating connectivity impact using centrality measures.pdf
- 1
- 粉丝: 2104
- 资源: 8306
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助