Articles Data Breaches and Identity Theft | Page 21
84 M. Abomhara and G. M. Køien
[19]
[20]
[21]
[22]
[23]
[24]
[25]
[26]
[27]
[28]
[29]
in Foundations of Security Analysis and Design V. Springer, 2009,
pp. 289–338.
R. Roman, J. Zhou, and J. Lopez, “On the features and challenges
of security and privacy in distributed internet of things,” Computer
Networks, vol. 57, no. 10, pp. 2266–2279, 2013.
Y. Cheng, M. Naslund, G. Selander, and E. Fogelstrom, “Privacy in
machine-to-machine communications a state-of-the-art survey,” in Com-
munication Systems (ICCS), 2012 IEEE International Conference on.
IEEE, 2012, pp. 75–79.
M. Rudner, “Cyber-threats to critical national infrastructure: An intelli-
gence challenge,” International Journal of Intelligence and CounterIn-
telligence, vol. 26, no. 3, pp. 453–481, 2013.
R. Kozik and M. Choras, “Current cyber security threats and chal-
lenges in critical infrastructures protection,” in Informatics and Appli-
cations (ICIA), 2013 Second International Conference on. IEEE, 2013,
pp. 93–97.
P. N. Mahalle, N. R. Prasad, and R. Prasad, “Object classification based
context management for identity management in internet of things,”
International Journal of Computer Applications, vol. 63, no. 12, pp. 1–6,
2013.
A. Gluhak, S. Krco, M. Nati, D. Pfisterer, N. Mitton, and T. Razafind-
ralambo, “A survey on facilities for experimental internet of things
research,” Communications Magazine, IEEE, vol. 49, no. 11, pp. 58–67,
2011.
Y. Benazzouz, C. Munilla, O. Gunalp, M. Gallissot, and L. Gurgen,
“Sharing user iot devices in the cloud,” in Internet of Things (WF-IoT),
2014 IEEE World Forum on. IEEE, 2014, pp. 373–374.
G. M. Køien, “Reflections on trust in devices: an informal survey
of human trust in an internet-of-things context,” Wireless Personal
Communications, vol. 61, no. 3, pp. 495–510, 2011.
D. Miorandi, S. Sicari, F. De Pellegrini, and I. Chlamtac, “Internet of
things: Vision, applications and research challenges,” Ad Hoc Networks,
vol. 10, no. 7, pp. 1497–1516, 2012.
M. Thoma, S. Meyer, K. Sperner, S. Meissner, and T. Braun, “On iot-
services: Survey, classification and enterprise integration,” in Green
Computing and Communications (GreenCom), 2012 IEEE International
Conference on. IEEE, 2012, pp. 257–260.
M. Abomhara and G. Koien, “Security and privacy in the internet of
things: Current status and open issues,” in PRISMS 2014 The 2nd