|
網路資料
林慶桓與劉崇堅(民 102 年 1 月 22 日)。參加「2012 物聯網(IoT2012)國際會議」 報告。民 106年10月15日,取自國家通訊傳播委員會網頁: https://www.ncc.gov.tw/chinese/files/13092/2893_30578_130927_1.pdf 吳金榮(民 106 年 2 月 5 日)。【趨勢大師】物聯網連網裝置數量大幅成長。蘋果 新聞網。民 106 年 10 月 8 日,取自 http://www.appledaily.com.tw/realtimenews/article/new/20170215/1054623/ 周碩彥( 民 104 年 11 月 30 日)。物聯網發展趨勢展示內容。工業管理系政府研究計 畫。民 106年10 月 15 日,取自 https://www.naer.edu.tw/ezfiles/0/1000/attach/95/pta_9695_1581881_06359.pdf 物聯網的最佳合作夥伴!資策會 In-Snergy 可創造無限應用的聯網平台 從模組、裝 置、雲端、應用,一手包辦!(民 106 年 4 月 13 日) 。中央通訊社。民 106 年 10 月 8 日,取自 http://www.cna.com.tw/postwrite/Detail/211693.aspx#.WehtjhOCzOQ 陳家祥(民 106 年 7 月 13 日)。單一陳情→單一出賣 北市 APP 平台再傳資安漏洞。 雲論名人論壇。民 106 年 10 月 18 日,取自https://www.ettoday.net/news/20170713/965719.htm?feature=todaysforum&tab_id=268 Google Glass.(2014). Google Glass: Make Glass Your Own. Retrieved October, 8, 2017 from https://www.youtube.com/watch?v=eneEmDtSvzI. Internet Crime Complaint Center , 2016 Internet Crime Report . Retrieved October, 8, 2017 from:https://pdf.ic3.gov/2016_IC3Report.pdf Kropeit, T. (2015). Don’t Trust Open Hotspots: Wi-Fi Hacker Detection and Privacy Protection via Smartphone. BS Thesis. Retrieved October, 8, 2017 from: https://www. emsec. rub. de/media/attachments/files/2015/03/BA Kropeit. pdf. LNR Group. (2012). arpwatch, the Ethernet monitor program; for keeping track of ethernet/ip address pairings. Last accessed April, 17 Trend Micro. (2015, March 5). 5 Possible Attacks on the IoE and How to Prevent Them. Retrieved October, 18, 2017, from http://blog.trendmicro.com/5-possible-attacks-on-the-ioe-and- how-to-prevent-them/?linkId=12742900 英文文獻 Abad, C. L., & Bonilla, R. I. (2007). An analysis on the schemes for detecting and preventing ARP cache poisoning attacks. Paper presented at the Distributed Computing Systems Workshops, 2007. ICDCSW07. 27th International Conference on. Agarwal, M., Biswas, S., & Nandi, S. (2015). Advanced stealth man-in-the-middle attack in wpa2 encrypted wi-fi networks. IEEE Communications Letters, 19(4), 581-584. Ahmad, M. S. (2010). Wpa too! DEF CON, 18. Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., & Ayyash, M. (2015). Internet of things: A survey on enabling technologies, protocols, and applications. IEEE Communications Surveys & Tutorials, 17(4), 2347-2376. Ashton, K. (2009). That ‘internet of things’ thing. RFID journal, 22(7), 97-114. Bishop, M. (1995). A taxonomy of unix system and network vulnerabilities: Technical Report CSE-95-10, Department of Computer Science, University of California at Davis. Bruschi, D., Ornaghi, A., & Rosti, E. (2003). S-ARP: a secure address resolution protocol. Paper presented at the Computer Security Applications Conference, 2003. Proceedings. 19th Annual. Carnut, M., & Gondim, J. (2003). ARP spoofing detection on switched Ethernet networks: A feasibility study. Paper presented at the Proceedings of the 5th Simposio Seguranca em Informatica. Coetzee, L., & Eksteen, J. (2011). The Internet of Things-promise for the future? An introduction. Paper presented at the IST-Africa Conference Proceedings, 2011. Conti, M., Dragoni, N., & Lesyk, V. (2016). A survey of man in the middle attacks. IEEE Communications Surveys & Tutorials, 18(3), 2027-2051. Da Xu, L., He, W., & Li, S. (2014). Internet of things in industries: A survey. IEEE Transactions on industrial informatics, 10(4), 2233-2243. Denning, P.J. "A New Social Contract for Research," Communications of the ACM (40:2), February 1997, pp. 132-134. Fink, S. (1986). Crisis management: Planning for the inevitable. American Management Association. Ghering, M., & Poll, E. (2016). Evil Twin Vulnerabilities in Wi-Fi Networks. Gouda, M. G., & Huang, C.-T. (2003). A secure address resolution protocol. Computer Networks, 41(1), 57-71. Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions. Future generation computer systems, 29(7), 1645-1660. Hansman, S., & Hunt, R. (2005). A taxonomy of network and computer attacks. Computers & Security, 24(1), 31-43. Hevner, A. R., March, S. T., Park, J., & Ram, S. (2008). Design science in information systems research. Management Information Systems Quarterly, 28(1), 6. Howard, J. D. (1997). An analysis of security incidents on the Internet 1989-1995: Carnegie- Mellon Univ Pittsburgh PA. Mitroff, I. I. (1994). Crisis management and environmentalism: A natural fit. California management review, 36(2), 101-113. Jia, X., Feng, Q., Fan, T., & Lei, Q. (2012). RFID technology and its applications in Internet of Things (IoT). Paper presented at the Consumer Electronics, Communications and Networks (CECNet), 2012 2nd International Conference on. Krige, W. (1999). The usage of audit logs for effective information security management. Unpublished master’s thesis. Port Elizabeth Technikon, Port Elizabeth, South Africa. Kumar, V., Chakraborty, S., Barbhuiya, F. A., & Nandi, S. (2012). Detection of Stealth Man-in- the-Middle attack in Wireless LAN. Paper presented at the Parallel distributed and grid computing (PDGC), 2012 2nd IEEE international conference on. Lau, F., Rubin, S. H., Smith, M. H., & Trajkovic, L. (2000). Distributed denial of service attacks. Paper presented at the Systems, Man, and Cybernetics, 2000 IEEE International Conference on. Lee, I., & Lee, K. (2015). The Internet of Things (IoT): Applications, investments, and challenges for enterprises. Business Horizons, 58(4), 431-440. Lee, J. D., & See, K. A. (2004). Trust in automation: Designing for appropriate reliance. Human factors, 46(1), 50-80. Lipson, H. F. (2002). Tracking and tracing cyber-attacks: Technical challenges and global policy issues: CARNEGIE-MELLON UNIV PITTSBURGH PA SOFTWARE ENGINEERING INST. Liu, C. H., Yang, B., & Liu, T. (2014). Efficient naming, addressing and profile services in Internet-of-Things sensory environments. Ad Hoc Networks, 18, 85-101. Lough, D. L. (2001). A taxonomy of computer attacks with applications to wireless networks. Virginia Tech. March, S. T., & Smith, G. F. (1995). Design and natural science research on information technology. Decision support systems, 15(4), 251-266. Markus, M.L., Majchrzak, A., and Gasser, L., "A Design Theory for Systems that Support Emergent Knowledge Processes," MIS Quarterly (26:3), September, 2002, pp. 179- 212. Meng, D., & WU, C. Y. L. (2011). Security architecture and key technologies for IoT/CPS. ZTE technology journal, 1(1), 013. Micro, T. (2013). Blurring boundaries: Trend Micro security predictions for 2014 and beyond. Retrieved April, 1, 2015. Mirkovic, J., & Reiher, P. (2004). A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Computer Communication Review, 34(2), 39-53. Ornaghi, A., & Valleri, M. (2003). Man in the middle attacks. Paper presented at the Blackhat Conference Europe. Pingle, B., Mairaj, A., & Javaid, A. Y. (2018, May). Real-World Man-in-the-Middle (MITM) Attack Implementation Using Open Source Tools for Instructional Use. In 2018 IEEE International Conference on Electro/Information Technology (EIT) (pp. 0192-0197). IEEE. Ramachandran, V., & Nandi, S. (2005). Detecting ARP spoofing: An active technique. Paper presented at the International Conference on Information Systems Security. Silver, M. S., Markus, M. L., & Beath, C. M. (1995). The information technology interaction model: A foundation for the MBA core course. MIS quarterly, 361-390. Simon, H.A. The Sciences of the Artificial, 3rd Edition, MIT Press, Cambridge, MA, 1996. Söllner, M., Hoffmann, A., & Leimeister, J. M. (2016). Why different trust relationships matter for information systems users. European Journal of Information Systems, 25(3), 274-287. Standard, A. (2015). ISO/IEC 27002. Information technology-security techniques-code of practice for information security controls,(AS ISO/IEC 27002: 2015), Standards Australia. Strategy, I., & Unit, P. (2005). ITU Internet Reports 2005: The internet of things. Geneva: International Telecommunication Union (ITU), 1, 62. Suo, H., Wan, J., Zou, C., & Liu, J. (2012). Security in the internet of things: a review. Paper presented at the Computer Science and Electronics Engineering (ICCSEE), 2012 international conference on. Tripunitara, M. V., & Dutta, P. (1999). A middleware approach to asynchronous and backward compatible detection and prevention of ARP cache poisoning. Paper presented at the Computer Security Applications Conference, 1999.(ACSAC99) Proceedings. 15th Annual. Tsichritzis, D. "The Dynamics of Innovation," Beyond Calculation: The Next Fifty Years of Computing, Copernicus, 1997, pp. 259-265. Tsitroulis, A., Lampoudis, D., & Tsekleves, E. (2014). Exposing WPA2 security protocol vulnerabilities. International Journal of Information and Computer Security, 6(1), 93-107. Vallivaara, V. A., Sailio, M., & Halunen, K. (2014). Detecting man-in-the-middle attacks on non- mobile systems. Paper presented at the Proceedings of the 4th ACM conference on Data and application security and privacy. Walls, J. G., Widmeyer, G. R., & El Sawy, O. A. (1992). Building an information system design theory for vigilant EIS. Information systems research, 3(1), 36-59. Whalen, S. (2001). An introduction to ARP spoofing. Online document. Yang, G., Xu, J., Chen, W., Qi, Z.-H., & Wang, H.-Y. (2010). Security characteristic and technology in the internet of things. Nanjing Youdian Daxue Xuebao(Ziran Kexue Ban)/ Journal of Nanjing University of Posts and Telecommunications(Natural Nanjing University of Posts and Telecommunications(Natural, 30(4). Yu, Y., Wang, J., & Zhou, G. (2010). The exploration in the education of professionals in applied Internet of Things engineering. Paper presented at the Distance Learning and Education (ICDLE), 2010 4th International Conference on.
|