Cyber attacks on estimation sensor networks and iots: Impact, mitigation and implications to unattacked systems
暂无分享,去创建一个
[1] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[2] Rick S. Blum,et al. A Fundamental Limitation on Maximum Parameter Dimension for Accurate Estimation With Quantized Data , 2016, IEEE Transactions on Information Theory.
[3] Jun Fang,et al. Hyperplane-Based Vector Quantization for Distributed Estimation in Wireless Sensor Networks , 2009, IEEE Transactions on Information Theory.
[4] Rick S. Blum,et al. Functional Forms of Optimum Spoofing Attacks for Vector Parameter Estimation in Quantized Sensor Networks , 2016, IEEE Transactions on Signal Processing.
[5] Rick S. Blum,et al. Attacks on Sensor Network Parameter Estimation With Quantization: Performance and Asymptotically Optimum Processing , 2015, IEEE Transactions on Signal Processing.
[6] Rick S. Blum,et al. Distributed joint spoofing attack identification and estimation in sensor networks , 2015, 2015 IEEE China Summit and International Conference on Signal and Information Processing (ChinaSIP).
[7] Wade Trappe,et al. Robust statistical methods for securing wireless localization in sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[8] R. Michael Buehrer,et al. Characterization and detection of location spoofing attacks , 2012, Journal of Communications and Networks.
[9] Haralabos C. Papadopoulos,et al. Sequential signal encoding from noisy measurements using quantizers with dynamic bias control , 2001, IEEE Trans. Inf. Theory.
[10] Rick S. Blum,et al. Asymptotically Optimum Distributed Estimation in the Presence of Attacks , 2015, IEEE Transactions on Signal Processing.
[11] Pramod K. Varshney,et al. Distributed Inference with Byzantine Data: State-of-the-Art Review on Data Falsification Attacks , 2013, IEEE Signal Processing Magazine.
[12] P.K. Varshney,et al. Target Location Estimation in Sensor Networks With Quantized Data , 2006, IEEE Transactions on Signal Processing.
[13] Xiaodong Wang,et al. Quickest Detection of False Data Injection Attack in Wide-Area Smart Grids , 2015, IEEE Transactions on Smart Grid.
[14] G.B. Giannakis,et al. Distributed compression-estimation using wireless sensor networks , 2006, IEEE Signal Processing Magazine.
[15] Zhu Han,et al. Coordinated data-injection attack and detection in the smart grid: A detailed look at enriching detection solutions , 2012, IEEE Signal Processing Magazine.
[16] Alejandro Ribeiro,et al. Bandwidth-constrained distributed estimation for wireless sensor networks-part II: unknown probability density function , 2006, IEEE Transactions on Signal Processing.