Page 251 - NGTU_paper_withoutVideo
P. 251

کیتاموئژ نیون یاهدربراک و اه یروآ نف یلم سنارفنک

            [2]  Zhu, H., Yin, X., Ma, J., & Hu, W. (2016).  Identifying the main paths of information diffusion in online social networks.
               Physica A: Statistical Mechanics and its Applications, 452, 320-328.
            [3]  Xia, F., Yang, L. T., Wang, L., & Vinel, A. (2012). Internet of Things. International journal of communication systems, 25(9),
               1101.
            [4]  Aljawarneh, S., Aldwairi, M., & Yassein, M. B. (2018). Anomaly-based intrusion detection system through feature selection
               analysis and building hybrid efficient model. Journal of Computational Science, 25, 152-160.
            [5]  Liu, W., Wang, Z., Liu, X., Zeng, N., Liu, Y., & Alsaadi, F. E. (2017). A survey of deep neural network architectures and
               their applications. Neurocomputing, 234, 11-26.
            [6]  Auer, P., Burgsteiner, H., & Maass, W. (2008). A learning rule for very simple universal approximators consisting of a single
               layer of perceptrons. Neural networks, 21(5), 786-795.
            [7]  Lee, I., & Lee, K. (2015). The Internet of Things (IoT): Applications, investments, and challenges for enterprises. Business
               Horizons, 58(4), 431-440.
            [8]  Khanna,  A.,  &  Kaur,  S.  (2019).  Evolution  of  Internet  of  Things  (IoT)  and  its  significant  impact  in  the  field  of  Precision
               Agriculture. Computers and Electronics in Agriculture. 157, 218-231.
            [9]  Hadeel, M.A.S., El-Kassabia, T.K., & Alramzana, A. (2020). Self-adapting cloud services orchestration for fulfilling intensive
               sensory data-driven IoT workflows. Future Generation Computer Systems, 108, 583-597.
           [10]  Alsaadi,  E.,  &  Tubaishat,  A.  (2015).  Internet  of  things:  features,  challenges,  and  vulnerabilities.  International  Journal  of
               Advanced Computer Science and Information Technology, 4(1), 1-13.
           [11]  Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2015). Security, privacy and trust in Internet of Things: The road
               ahead. Computer networks, 76, 146-164.
           [12]  Yang, Y., Wu, L., Yin, G., Li, L., & Zhao, H. (2017). A survey on security and privacy issues in Internet-of-Things. IEEE
               Internet of Things Journal, 4(5), 1250-1258.
           [13]  Yang, W., Wang, M., Zhang, J., Zou, J., Hua, M., Xia, T., & You, X. (2017).  Narrowband wireless access for low-power
               massive internet of things: A bandwidth perspective. IEEE Wireless Communications, 24(3), 138-145.
           [14]  Burg, A., Chattopadhyay, A., & Lam, K. Y. (2017). Wireless communication and security issues for cyber–physical systems
               and the Internet-of-Things. Proceedings of the IEEE, 106(1), 38-60.
           [15]  Liao, H. J., Lin, C. H. R., Lin, Y. C., & Tung, K. Y. (2013). Intrusion detection system: A comprehensive review. Journal of
               Network and Computer Applications, 36(1), 16-24.
           [16]  Mitchell, R., & Chen, I. R. (2014). A survey of intrusion detection techniques for cyber-physical systems. ACM Computing
               Surveys (CSUR), 46(4), 1-29.
           [17]  Butun, I., Morgera, S. D., & Sankar, R. (2013). A survey of intrusion detection systems in wireless sensor networks. IEEE
               communications surveys & tutorials, 16(1), 266-282.
           [18]  Wallgren,  L.,  Raza,  S.,  &  Voigt,  T.  (2013).  Routing  attacks  and  countermeasures  in  the  RPL-based  internet  of  things.
               International Journal of Distributed Sensor Networks, 9(8), 794326.
   246   247   248   249   250   251   252   253   254   255   256