[1] | Marat Radan, Isaac Keslassy, "Tapping into the router's unutilized processing power", Computer Communications (INFOCOM) 2015 IEEE Conference on, pp. 2569-2577, 2015. |
[2] | Kozlov, D., Veijalainen, J., & Ali, Y. (2012, February). Security and privacy threats in IoT architectures. In Proceedings of the 7th International Conference on Body Area Networks (pp. 256-262). ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering). |
[3] | Razzaq, M. A., Gill, S. H., Qureshi, M. A., & Ullah, S. (2017). Security issues in the Internet of Things (IoT): a comprehensive study. International Journal of Advanced Computer Science and Applications (IJACSA), 8(6), 383-388. |
[4] | https://0x9.me/EodQY. |
[5] | Laya, A., Markendahl, J., & Andersson, P. (2013). Business Challenges for Services Based on New Technology-Analysis of IoT Service and Mobile Payment Cases. Effective, Agile and Trusted eServices Co-Creation, 91. |
[6] | M. Young, The Technical Writer’s Handbook. Mill Valley, CA: University Science, 1989. |
[7] | M. Radan and I. Keslassy, "Tapping into the router's unutilized processing power," 2015 IEEE Conference on Computer Communications (INFOCOM), Kowloon, 2015, pp. 2569-2577. doi: 10.1109/INFOCOM.2015.7218647. |
[8] | M. Jutila, "An Adaptive Edge Router Enabling Internet of Things," in IEEE Internet of Things Journal, vol. 3, no. 6, pp. 1061-1069, Dec. 2016. doi: 10.1109/JIOT.2016.2550561 |
[9] | King, J., & Awad, A. I. (2016). A distributed security mechanism for resource-constrained IoT devices. Informatica, 40(1). |
[10] | Gaona-García, P., Montenegro-Marin, C., Prieto, J. D., & Nieto, Y. V. (2017). Analysis of Security Mechanisms Based on Clusters IoT Environments. International Journal of Interactive Multimedia & Artificial Intelligence, 4(3). |
[11] | https://patents.google.com/patent/US20030140088A1/en. |
[12] | Davie, B. S., & Medved, J. (2009, August). A programmable overlay router for service provider innovation. In Proceedings of the 2nd ACM SIGCOMM workshop on Programmable routers for extensible services of tomorrow (pp. 1-6). ACM. |
[13] | Noureldien, N. A., & Yousif, I. M. (2016). Accuracy of machine learning algorithms in detecting DoS attacks types. Science and Technology, 6(4), 89-92. |
[14] | G. Carl, G. Kesidis, R. R. Brooks and Suresh Rai, "Denial-of-service attack-detection techniques," in IEEE Internet Computing, vol. 10, no. 1, pp. 82-89, Jan.-Feb. 2006. doi: 10.1109/MIC.2006.5. |
[15] | Agah, S. A. (2017). Investigating Identification Techniques of Attacks in Intrusion Detection Systems Using Data Mining Algorithms. IJCSNS, 17(5), 174. |
[16] | G. Carl, G. Kesidis, R. R. Brooks and Suresh Rai, "Denial-of-service attack-detection techniques," in IEEE Internet Computing, vol. 10, no. 1, pp. 82-89, Jan.-Feb. 2006.doi: 10.1109/MIC.2006.5. |
[17] | Babar, S., Stango, A., Prasad, N., Sen, J., & Prasad, R. (2011, February). Proposed embedded security framework for internet of things (iot). In Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE), 2011 2nd International Conference on (pp. 1-5). IEEE. |
[18] | Emmons S, Kobourov S, Gallant M, Börner K (2016) Analysis of Network Clustering Algorithms and Cluster Quality Metrics at Scale. PLoS ONE 11 (7): e0159161. doi:10.1371/journal.pone.0159161. |
[19] | bin Basir, M. A., & binti Ahmad, F. New Feature Selection Model-Based Ensemble Rule Classifiers Method For Dataset Classification. |
[20] | Tehranipoor, F., Karimian, N., Xiao, K., & Chandy, J., "DRAM based intrinsic physical unclonable functions for system level security", In Proceedings of the 25th edition on Great Lakes Symposium on VLSI, (pp. 15-20). ACM, 2015. |
[21] | Chan, E. Y., Chan, H. W., Chan, K. M., Chan, V. P., Chanson, S. T., Cheung, M. M., ... & Lam, L. C. (2004, May). IDR: an intrusion detection router for defending against distributed denial-of-service (DDoS) attacks. In Parallel Architectures, Algorithms and Networks, 2004. Proceedings. 7th International Symposium on (pp. 581-586). IEEE. |
[22] | https://github.com/deepminder/SLM4J. |
[23] | Maksimović, M., Vujović, V., Davidović, N., Milošević, V., & Perišić, B. (2014). Raspberry Pi as Internet of things hardware: performances and constraints. design issues, 3(8). |
[24] | Patchava, V., Kandala, H. B., & Babu, P. R. (2015, December). A smart home automation technique with raspberry pi using iot. In 2015 International Conference on Smart Sensors and Systems (IC-SSS) (pp. 1-4). IEEE. |
[25] | Zhao, C. W., Jegatheesan, J., & Loon, S. C. (2015). Exploring iot application using raspberry pi. International Journal of Computer Networks and Applications, 2(1), 27-34. |
[26] | Ansari, A. N., Sedky, M., Sharma, N., & Tyagi, A. (2015, January). An Internet of things approach for motion detection using Raspberry Pi. In Proceedings of 2015 International Conference on Intelligent Computing and Internet of Things (pp. 131-134). IEEE. |
[27] | https://www.raspberrypi.org/documentation/faqs/#powerReqs. |
[28] | Edwards, C. (2013). Not-so-humble raspberry pi gets big ideas. Engineering & Technology, 8(3), 30-33. |