Internet of everything: how secure should it be?

Conference keynote


Induruwa, A. 2015. Internet of everything: how secure should it be?
AuthorsInduruwa, A.
TypeConference keynote
Year2015
Conference2015 IEEE International Conference on Research in Computational Intelligence and Computer Networks
File
Publication process dates
Deposited16 Dec 2015
Completed22 Nov 2015
Output statusUnpublished
Permalink -

https://repository.canterbury.ac.uk/item/87947/internet-of-everything-how-secure-should-it-be

  • 33
    total views
  • 17
    total downloads
  • 2
    views this month
  • 3
    downloads this month

Export as

Related outputs

Security vulnerabilities of popular smart home appliances
Qi, M., Induruwa, A. and Hussain, F. 2021. Security vulnerabilities of popular smart home appliances. in: Proceeding of The Twentieth International Conference on Networks April 18, 2021 to April 22, 2021 - Porto, Portugal
Hybrid Intrusion Detection System for Smart Home Applications
Hussain, Fida, Induruwa, Abhaya and Qi, Man 2020. Hybrid Intrusion Detection System for Smart Home Applications. in: Mahmood, Z. (ed.) Developing and Monitoring Smart Environments for Intelligent Cities IGI Global. pp. 300-322
TCP/IP networking protocols
Induruwa, A. 2009. TCP/IP networking protocols.
Wireless sensor networks - an introduction
Induruwa, A. 2009. Wireless sensor networks - an introduction.
Application of grid computing for fighting cybercrime
Induruwa, A. and Induruwa, A. 2009. Application of grid computing for fighting cybercrime.
Managing the pedagogy of cybercrime forensics study at postgraduate level: challenges and opportunities
Induruwa, A. 2007. Managing the pedagogy of cybercrime forensics study at postgraduate level: challenges and opportunities.
Cybercrime investigation training and specialist education for the European Union
Stephens, P. and Induruwa, A. 2007. Cybercrime investigation training and specialist education for the European Union.
Constantly evolving technological challenges in cybercrime forensic investigation
Induruwa, A. 2010. Constantly evolving technological challenges in cybercrime forensic investigation. Canterbury Canterbury Christ Church University.
The deployment of IPv6 in Nigeria: opportunities and challenges
Obiniyi, A. and Induruwa, A. 2010. The deployment of IPv6 in Nigeria: opportunities and challenges. International Journal of Computer Information Systems. 1 (3), pp. 18-23.
Setting up an IPv6 laboratory for the deployment of 4G networks and devices
Induruwa, A. and Obiniyi, A. 2007. Setting up an IPv6 laboratory for the deployment of 4G networks and devices. Journal of the Nigerian Computer Society. 14 (2), pp. 52-59.
Mobile phone forensics: an overview of technical and legal aspects
Induruwa, A. 2009. Mobile phone forensics: an overview of technical and legal aspects. International Journal of Electronic Security and Digital Forensics. 2 (2), pp. 169-181. https://doi.org/10.1504/IJESDF.2009.024901