[1]
|
Lianos, M. and Douglas, M. (2000) Dangerization and the End of Deviance: The Institutional Environment. British Journal of Criminology, 40, 261-278. http://dx.doi.org/10.1093/bjc/40.2.261
|
[2]
|
Ferguson, T. (2002) Have Your Objects Call My Object. Harvard Business Review, June, 1-7.
|
[3]
|
Nunberg, G. (2012) The Advent of the Internet: 12th April, Courses.
|
[4]
|
Kosmatos, E.A., Tselikas, N.D. and Boucouvalas, A.C. (2011) Integrating RFIDs and Smart Ob-jects into a Unified Internet of Things Architecture. Advances in Internet of Things: Scientific Research, 1, 5-12.
http://dx.doi.org/10.4236/ait.2011.11002
|
[5]
|
Aggarwal, R. and Lal Das, M. (2012) RFID Security in the Context of “Internet of Things”. First International Conference on Security of Internet of Things, Kerala, 17-19 August 2012, 51-56. http://dx.doi.org/10.1145/2490428.2490435
|
[6]
|
Biddlecombe, E. (2009) UN Predicts “Internet of Things”. Retrieved July 6.
|
[7]
|
Butler, D. (2020) Computing: Everything, Everywhere. Nature, 440, 402-405. http://dx.doi.org/10.1038/440402a
|
[8]
|
Dodson, S. (2008) The Net Shapes up to Get Physical. Guardian.
|
[9]
|
Gershenfeld, N., Krikorian, R. and Cohen, D. (2004) The Internet of Things. Scientific American, 291, 76-81.
http://dx.doi.org/10.1038/scientificamerican1004-76
|
[10]
|
Lombreglia, R. (2010) The Internet of Things, Boston Globe. Retrieved October.
|
[11]
|
Reinhardt, A. (2004) A Machine-to-Machine Internet of Things.
|
[12]
|
Graham, M. and Haarstad, H. (2011) Transparency and Development: Ethical Consumption through Web 2.0 and the Internet of Things. Research Article, 7.
|
[13]
|
Jayavardhana, G., Rajkumar, B., Marusic, S. and Palaniswami, M. (2013) Internet of Things: A Vision, Architectural Elements, and Future Directions. Future Generation.
|
[14]
|
Gigli, M. and Koo, S. (2011) Internet of Things, Services and Applications Categorization. Advances in Internet of Things, 1, 27-31. http://dx.doi.org/10.4236/ait.2011.12004
|
[15]
|
(2005) ITU Internet Reports, International Telecommunication Union. The Internet of Things: 7th Edition.
www.itu.int/internetofthings/on
|
[16]
|
Want, R. (2006) An Introduction to RFID Technology. IEEE Pervasive Compu-ting, 5, 25-33.
|
[17]
|
Li, B.A. and Yu, J.J. (2011) Research and Application on the Smart Home Based on Component Technologies and Internet of Things. Procedia Engineering, 15, 2087-2092. http://dx.doi.org/10.1016/j.proeng.2011.08.390
|
[18]
|
Razzak, F. (2012) Spamming the Internet of Things: A Possibility and its probable Solution. Procedia Computer Science, 10, 658-665. http://dx.doi.org/10.1016/j.procs.2012.06.084
|
[19]
|
Shao, W. and Li, L. (2009) Analysis of the Development Route of IoT in China. Perking: China Science and Technology Information, 24, 330-331.
|
[20]
|
Sun, C. (2012) Application of RFID Technology for Logistics on Internet of Things.
|
[21]
|
Moeinfar, D., Shamsi, H. and Nafar, F. (2012) Design and Implementation of a Low-Power Active RFID for Container Tracking @ 2.4 GHz Frequency: Scientific Research.
|
[22]
|
Bicknell, IPv6 Internet Broken, Verizon Route Prefix Length Policy, 2009.
|
[23]
|
Grieco A., Occhipinti, E. and Colombini, D. (1989) Work Postures and Musculo-Skeletal Disorder in VDT Operators. Bollettino de Oculistica, Suppl. 7, 99-111.
|
[24]
|
Pahlavan, K., Krishnamurthy, P., Hatami, A., Ylianttila, M., Makela, J.P., Pichna, R. and Vallstron, J. (2007) Handoff in Hybrid Mobile Data Networks. Mobile and Wireless Communication Summit, 7, 43-47.
|
[25]
|
Chen, X.-Y. and Jin, Z.-G. (2012) Research on Key Technology and Applications for the Internet of Things. Physics Procedia, 33,561-566. http://dx.doi.org/10.1016/j.phpro.2012.05.104
|
[26]
|
Arampatzis, T., et al. (2005) A Survey of Security Issues in Wireless Sensors Networks, in Intelligent Control. Proceeding of the IEEE International Symposium on, Mediterrean Conference on Control and Automation, 719-724.
|
[27]
|
Chorost, M. (2008) The Networked Pill, MIT Technology Review, March.
|