Connections the quarterly journal

Search form

  • Like Connections page on Facebook
  • Follow us on Twitter
  • Find connections on Istagram
  • Subscribe to Connections RSS
  • English
  • Русский
  • Journal
    • Previews
    • Archive
    • Top papers
    • Athena Award
  • Submissions
    • Guidelines
    • Copyright information
    • Conflict of interest
    • Ethics in publishing
    • Themes
    • Calls for articles
    • Submit a paper
  • About
    • Mission
    • Editorial policy
    • Disclaimer
    • Editorial Board
    • Advisers
    • Author Index
    • Indexing & Archiving
    • Contact Us
    • Privacy policy
Share/Save

Handling a Trillion (Unfixable) Flaws on a Billion Devices: Rethinking Network Security for the Internet-of-Things

Publication Type:

Conference Proceedings

Authors:

Tianlong Yu; Vyas Sekar; Srinivasan Seshan; Yuvraj Agarwal; Chenren Xu

Source:

Proceedings of the 14th ACM Workshop on Hot Topics in Networks (ACM) (2015)
  • 2456 reads
  • Google Scholar
  • DOI
  • RTF
  • EndNote XML
  • Downloads
  • Cited in
  • How to cite
No files have yet been downloaded.
Goel, Sanjay. "National Cyber Security Strategy and the Emergence of Strong Digital Borders." Connections: The Quarterly Journal 19, no. 1 (2020): 73-86.
"Национальная стратегия кибербезопасности и появление жестких цифровых границ." Connections QJ 19, no. 1 (2020): 85-100.
APA style: Yu, T., Sekar V., Seshan S., Agarwal Y., & Xu C. (2015).  Handling a Trillion (Unfixable) Flaws on a Billion Devices: Rethinking Network Security for the Internet-of-Things. Proceedings of the 14th ACM Workshop on Hot Topics in Networks (ACM).
Chicago style: Yu, Tianlong, Vyas Sekar, Srinivasan Seshan, Yuvraj Agarwal, and Chenren Xu. Handling a Trillion (Unfixable) Flaws on a Billion Devices: Rethinking Network Security for the Internet-of-Things In Proceedings of the 14th ACM Workshop on Hot Topics in Networks (ACM)., 2015.
IEEE style: Yu, T., V. Sekar, S. Seshan, Y. Agarwal, and C. Xu, "Handling a Trillion (Unfixable) Flaws on a Billion Devices: Rethinking Network Security for the Internet-of-Things", Proceedings of the 14th ACM Workshop on Hot Topics in Networks (ACM), November 2015.
DOI http://dx.doi.org/10.1145/2834050.2834095
  • Trending
  • Latest
  • Most cited
  • How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race (5,387)
  • National Cyber Security Strategy and the Emergence of Strong Digital Borders (5,187)
  • Austria’s National Cyber Security and Defense Policy: Challenges and the Way Forward (4,854)
  • Cyber Defence in Germany: Challenges and the Way Forward for the Bundeswehr (4,655)
  • Cybersecurity in Switzerland: Challenges and the Way Forward for the Swiss Armed Forces (4,346)
view all
  • Conflict Resilience and the Image of the Other among North and South Koreans
  • After the Crisis: The Role of Resilience in Coming Back Stronger
  • The Importance of Resilience in the Agenda Women, Peace and Security, Particularly During the COVID-19 Pandemic
  • Technology as a Resilience Factor in Peace Operations
  • Stabilization Missions – Lessons to Be Learned from Resilience-Based Peacebuilding
view all
Introduction to Program-based Defense Resource Management (8)
The Art of Shaping Defense Policy: Scope, Components, Relationships (but no Algorithms) (6)
NATO and the South Caucasus: Armenia, Azerbaijan, and Georgia on Different Tracks (5)
Terrorist Routes in Central Asia: Trafficking Drugs, Humans, and Weapons (4)
Terror-Crime Nexus? Terrorism and Arms, Drug, and Human Trafficking in Georgia (4)
view all

© Partnership for Peace Consortium of Defense Academies and Security Studies Institutes, 2012-2020
This site was designed and is maintained by Procon Ltd., Publisher of Connections: The Quarterly Journal