[1]
International Telecommunication Union: ITU Internet Reports 2005: The Internet of Things, Geneva: ITU (2005).
Google Scholar
[2]
Y.Z. Yang, J.H. Gao: A Study on the Internet of Things, and Its Scientific Development in China, China Business and Market, (2), pp.46-49 (2010).
Google Scholar
[3]
A. Mitrokotsa, M.R. Rieback, A.S. Tanenbaum: Classifying RFID attacks and defenses, Inf. Syst. Front, pp.491-505 (2010).
DOI: 10.1007/s10796-009-9210-z
Google Scholar
[4]
C.M. Medaglia, A. Serbanati: An Overview of Privacy and Security Issues in the Internet of Things, Proc. of the Internet of Things: 20th Tyrehenian Workshop on Digital Communications, pp.389-395 (2010).
DOI: 10.1007/978-1-4419-1674-7_38
Google Scholar
[5]
R.H. Weber: Internet of Things – New security and privacy challenges, Computer Law & Security Review, vol. 26, pp.23-30 (2010).
DOI: 10.1016/j.clsr.2009.11.008
Google Scholar
[6]
Y.B. Liu, W.P. Hu: Security model and key technology on Internet of Things, Digital Communication, pp.28-33 (2010).
Google Scholar
[7]
G. Yang, J. Xu, W. Chen, Z. H. Qi and H. Y. Wang: Security Characteristic and Technology in the Internet of Things, Journal of Nanjing University of Posts and Telecommunications (Natural Science), vol. 30, pp.20-29 (2010).
Google Scholar
[8]
T. Li: Computer immunology, Beijing: Publishing House of Electronics Industry (2004).
Google Scholar
[9]
J. Hunt, J. Timmis, D. Cooke, M. Neal, C. King: Jisys: The development of an Artificial Immune System for real world applications, Springer-Verlag (1999).
DOI: 10.1007/978-3-642-59901-9_9
Google Scholar
[10]
L.N. de Castro, et al.: Learning and Optimization Using the Clonal Selection Principle, IEEE Transaction On Evolution Computation, vol. 6 (2002).
Google Scholar
[11]
J. Kim, P.J. Bentley: Towards an artificial immune system for network intrusion detection: an investigation of dynamic clonal selection, Proc. of the Congress on Evolutionary Computation, pp.1015-1020 (2002).
DOI: 10.1109/cec.2002.1004382
Google Scholar