14 Reference
14 Reference
REFERENCES
[1] M. W. Woo, J. Lee, K. Park, A reliable IoT system for personal healthcare
devices, Future Gener. Comput. Syst. 78 (2018) 626–640.
[5] C. Li, X. Hu, L. Zhang, The IoT-based heart disease monitoring system
for pervasive healthcare service, Procedia Computer Science 112 (2017)
2328–2334.
[7] C. Maple, Security and privacy in the internet of things, Journal of Cyber
Policy 2 (2017) 155–184.
[8] K. Park, J. Park, J. Lee, An IOT system for remote monitoring of patients
at home, volume 7, 2017, pp. 260–268. doi: https://doi.org/10.3390/
app7030260.
[9] L. Zhang, Y. Zhang, S. Tang, H. Luo, Privacy protection for e-health sys-
teams by means of dynamic authentication and three-factor key
agreement, IEEE Transactions on Industrial Electronics PP (2017) 1–1.
77
[12] C. Wang, N. Cao, K. Ren, W. Lou, Enabling secure and efficient ranked
keyword search over outsourced cloud data, IEEE Transactions on
Parallel and Distributed Systems 23 (2012) 1467–1479.
[21] Humayun, M., Niazi, M., Jhanjhi, N. et al. Cyber Security Threats and
Vulnerabilities: A Systematic Mapping Study. Arab J Sci Eng (2020).
https://doi.org/10.1007/s13369- 019-04319-2
[22] K. Hussain, S.J. Hussain, NZ. Jhanjhi and M. Humayun, “SYN Flood
Attack Detection based on Bayes Estimator (SFADBE) For MANET”,
International Conference on Computer and Information Sciences (ICCIS),
1-4, 2019
[31] Bär S, Reinhold O, Alt R. The role of cross-domain use cases in IoT: a
case analysis. In: Proceedings of the 52nd Hawaii international conference
on system sciences; 2019.
[37] Cisco: The Internet of Things Reference Model. 2014. http://cdn. IoT wf
.com/resources/71/IoT Reference Model White Paper June4 2014.pdf.
Accessed 30 Aug 2019
[39] Gomes RM, Baunach M. Code generation from formal models for
automatic RTOS portability. In: 2019 IEEE/ACM international
symposium on code generation and optimization (CGO). IEEE; 2019. p.
271–2.
[48] Jang SE, Park ST, Lee SJ. A study on online fraud and abusing detection
technology using web-based device fingerprinting. J Korea Inst Inf
Security Cryptol. 2018;28(5):1179–95.
82
[52] Keybase: Secure groups, files, and chat for everyone. https ://keyba se.io/.
Accessed 9 Sept 2019.
[53] Klas GI. Edge cloud to cloud integration for IoT. 2016. https://yucia
nga.info/wp content/uploads/2016/02/16_02_04_Edge cloud to could
integration for IoT v1.pdf. Accessed 28 Aug 2019.
[58] Park HK, Lee K. A design of an AES-based security chip for IoT
applications using verilog HDL. Trans Korean Inst Electr Eng P.
2018;67(1):9–14.
83
[59] Preskill J. Quantum computing in the NISQ era and beyond. Quantum.
2018; 2:79.
[60] Ring T. Connected cars-the next target for hackers. Network Security.
2015;2015(11):11–6.
[64] Bevan, G., A. Evans A, and S. Nuti. (2019) “Reputations Count: Why
Benchmarking Performance is Improving Health Care Across the World.”
Health Economics, Policy and Law 14: 141-61
[68] L.-Y. Yeh, P.-Y. Chiang, Y.-L. Tsai, J.-L. Huang, Cloud-based fine-
grained health information access control framework for lightweight IoT
devices with dynamic auditing and attribute revocation, IEEE
Transactions on Cloud Computing PP (2015) 1–1.
84
[69] Alyssa Anne Ubing, Syukrina Kamilia Binti Jasmi, Azween Abdullah, NZ
Jhanjhi and Mahadevan Supramaniam, “Phishing Website Detection: An
Improved Accuracy through Feature Selection and Ensemble Learning”
International Journal of Advanced Computer Science and Applications
(IJACSA),10(1), 2019.http://dx.doi.org/10.14569/IJACSA.2019.0100133
[72] K. Yang, X. Jia, K. Ren, Secure and verifiable policy update outsourcing
for big data access control in the cloud, IEEE Transactions on Parallel and
Distributed Systems 26 (2015) 3461–3470.
[77] Ammar, M., Russello, G., & Crispo, B. (2018). Internet of Things: A
survey on the security of IoT frameworks. Journal of Information Security
and Applications, 38, 8-27
[78] Salman, O., Elhajj, I., Chehab, A., & Kayssi, A. (2017). Software Defined
IoT security framework. 2017 4th International Conference on Software
Defined Systems, SDS 2017, 75–80. https://doi.org/10.1109/SDS.2017.
7939144