Page 251 - NGTU_paper_withoutVideo
P. 251
کیتاموئژ نیون یاهدربراک و اه یروآ نف یلم سنارفنک
[2] Zhu, H., Yin, X., Ma, J., & Hu, W. (2016). Identifying the main paths of information diffusion in online social networks.
Physica A: Statistical Mechanics and its Applications, 452, 320-328.
[3] Xia, F., Yang, L. T., Wang, L., & Vinel, A. (2012). Internet of Things. International journal of communication systems, 25(9),
1101.
[4] Aljawarneh, S., Aldwairi, M., & Yassein, M. B. (2018). Anomaly-based intrusion detection system through feature selection
analysis and building hybrid efficient model. Journal of Computational Science, 25, 152-160.
[5] Liu, W., Wang, Z., Liu, X., Zeng, N., Liu, Y., & Alsaadi, F. E. (2017). A survey of deep neural network architectures and
their applications. Neurocomputing, 234, 11-26.
[6] Auer, P., Burgsteiner, H., & Maass, W. (2008). A learning rule for very simple universal approximators consisting of a single
layer of perceptrons. Neural networks, 21(5), 786-795.
[7] Lee, I., & Lee, K. (2015). The Internet of Things (IoT): Applications, investments, and challenges for enterprises. Business
Horizons, 58(4), 431-440.
[8] Khanna, A., & Kaur, S. (2019). Evolution of Internet of Things (IoT) and its significant impact in the field of Precision
Agriculture. Computers and Electronics in Agriculture. 157, 218-231.
[9] Hadeel, M.A.S., El-Kassabia, T.K., & Alramzana, A. (2020). Self-adapting cloud services orchestration for fulfilling intensive
sensory data-driven IoT workflows. Future Generation Computer Systems, 108, 583-597.
[10] Alsaadi, E., & Tubaishat, A. (2015). Internet of things: features, challenges, and vulnerabilities. International Journal of
Advanced Computer Science and Information Technology, 4(1), 1-13.
[11] Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2015). Security, privacy and trust in Internet of Things: The road
ahead. Computer networks, 76, 146-164.
[12] Yang, Y., Wu, L., Yin, G., Li, L., & Zhao, H. (2017). A survey on security and privacy issues in Internet-of-Things. IEEE
Internet of Things Journal, 4(5), 1250-1258.
[13] Yang, W., Wang, M., Zhang, J., Zou, J., Hua, M., Xia, T., & You, X. (2017). Narrowband wireless access for low-power
massive internet of things: A bandwidth perspective. IEEE Wireless Communications, 24(3), 138-145.
[14] Burg, A., Chattopadhyay, A., & Lam, K. Y. (2017). Wireless communication and security issues for cyber–physical systems
and the Internet-of-Things. Proceedings of the IEEE, 106(1), 38-60.
[15] Liao, H. J., Lin, C. H. R., Lin, Y. C., & Tung, K. Y. (2013). Intrusion detection system: A comprehensive review. Journal of
Network and Computer Applications, 36(1), 16-24.
[16] Mitchell, R., & Chen, I. R. (2014). A survey of intrusion detection techniques for cyber-physical systems. ACM Computing
Surveys (CSUR), 46(4), 1-29.
[17] Butun, I., Morgera, S. D., & Sankar, R. (2013). A survey of intrusion detection systems in wireless sensor networks. IEEE
communications surveys & tutorials, 16(1), 266-282.
[18] Wallgren, L., Raza, S., & Voigt, T. (2013). Routing attacks and countermeasures in the RPL-based internet of things.
International Journal of Distributed Sensor Networks, 9(8), 794326.