A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols
暂无分享,去创建一个
[1] Tai-Hoon Kim,et al. Security Encryption Schemes for Internet SCADA: Comparison of the Solutions , 2011, SUComS.
[2] Sandip C. Patel,et al. Improving the cyber security of SCADA communication networks , 2009, CACM.
[3] Xingming Sun,et al. Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement , 2016, IEEE Transactions on Parallel and Distributed Systems.
[4] Xingming Sun,et al. Segmentation-Based Image Copy-Move Forgery Detection Scheme , 2015, IEEE Transactions on Information Forensics and Security.
[5] Naixue Xiong,et al. The protocol design and New approach for SCADA security enhancement during sensors broadcasting system , 2016, Multimedia Tools and Applications.
[6] H. Kobayashi,et al. A SCADA System Using Mobile Agents for a Next-Generation Distribution System , 2013, IEEE Transactions on Power Delivery.
[7] Soojin Park,et al. The Sensors Connectivity within SCADA Automation Environment and New Trends for Security Development during Multicasting Routing Transmission , 2015, Int. J. Distributed Sens. Networks.
[8] Jin Wang,et al. A Variable Threshold-Value Authentication Architecture for Wireless Mesh Networks , 2014 .
[9] Francesco Parisi-Presicce,et al. DNPSec: Distributed Network Protocol Version 3 (DNP3) Security Framework , 2007 .
[10] Min-kyu Choi. Wireless Communications for SCADA Systems Utilizing Mobile Nodes , 2013 .
[11] Carina S. González-González,et al. Standards Evaluation HMI: Application of the guideline GEDIS to the systems SCADA of the NAP (Network Access Point) Canary Islands , 2014, Interacción '14.
[12] Jeffrey L. Hieb,et al. Cyber security risk assessment for SCADA and DCS networks. , 2007, ISA transactions.
[13] Naixue Xiong,et al. Comparative analysis of quality of service and memory usage for adaptive failure detectors in healthcare systems , 2009, IEEE Journal on Selected Areas in Communications.
[14] Gheorghe-Daniel Andreescu,et al. SCADA element solutions using Ethernet and mobile phone network , 2011, 2011 IEEE 9th International Symposium on Intelligent Systems and Informatics.
[15] H. S. Wolff,et al. iRun: Horizontal and Vertical Shape of a Region-Based Graph Compression , 2022, Sensors.
[16] Ki-Hyung Kim,et al. A unified security framework with three key management schemes for wireless sensor networks , 2008, Comput. Commun..
[17] Jian Shen,et al. A Novel Routing Protocol Providing Good Transmission Reliability in Underwater Sensor Networks , 2015 .
[18] Wei Meng,et al. GPRS based remote data acquisition and forecasting system for long-distance natural Gas pipeline monitoring , 2012, 2012 International Conference on Computational Problem-Solving (ICCP).
[19] J. B. Morton. A Mobility Study. , 1975 .
[20] Bong-Han Kim,et al. Network Anomaly Detection for M-Connected SCADA Networks , 2013, 2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications.
[21] Aamir Shahzad,et al. N-Secure Cryptography Solution for SCADA Security Enhancement , 2014 .
[22] Fan Yang,et al. Design of GPRS Based Interface Parameters Remote Monitoring System for Crude Oil Tank , 2012 .
[23] Chunlei Wang,et al. A Simulation Environment for SCADA Security Analysis and Assessment , 2010, 2010 International Conference on Measuring Technology and Mechatronics Automation.
[24] Yuxiang Wang,et al. Construction of Tree Network with Limited Delivery Latency in Homogeneous Wireless Sensor Networks , 2014, Wirel. Pers. Commun..
[25] Engin Ozdemir,et al. Mobile phone based SCADA for industrial automation. , 2006, ISA transactions.
[26] Sufyan Al-Irhayim,et al. Implementation of GPRS-Based Positioning System Using PIC Microcontroller , 2010, 2010 2nd International Conference on Computational Intelligence, Communication Systems and Networks.
[27] Naixue Xiong,et al. New Security Development and Trends to Secure the SCADA Sensors Automated Transmission during Critical Sessions , 2015, Symmetry.
[28] Naixue Xiong,et al. A Distributed Efficient Flow Control Scheme for Multirate Multicast Networks , 2010, IEEE Transactions on Parallel and Distributed Systems.
[29] Naixue Xiong,et al. A Secure, Intelligent, and Smart-Sensing Approach for Industrial System Automation and Transmission over Unsecured Wireless Networks , 2016, Sensors.
[30] Dermot Diamond,et al. Distributed chemical sensor networks for environmental sensing , 2011 .
[31] Naixue Xiong,et al. Steganalysis of LSB matching using differences between nonadjacent pixels , 2016, Multimedia Tools and Applications.
[32] Paul W. Oman,et al. Intrusion Detection and Event Monitoring in SCADA Networks , 2007, Critical Infrastructure Protection.
[33] Jun Zeng,et al. A Tracking System Supporting Large-Scale Users Based on GPS and G-Sensor , 2015, Int. J. Distributed Sens. Networks.
[34] Raul Ionel,et al. GPRS based data acquisition and analysis system with mobile phone control , 2012 .
[35] Wenfeng Jiang,et al. A Method of Remote Interactive Control in Electricity SCADA System Based on Internet , 2012 .
[36] Laurence Kujawa,et al. The synergy between system modelization and HMI modelization: application on a workbench HMI , 2014, Ergo'IA '14.
[37] Daniele Marioli,et al. Wired and wireless sensor networks for industrial applications , 2009, Microelectron. J..
[38] HyungJun Kim,et al. Security and Vulnerability of SCADA Systems over IP-Based Wireless Sensor Networks , 2012, Int. J. Distributed Sens. Networks.
[39] Andreas Willig,et al. Wireless Technology in Industrial Networks , 2005, Proceedings of the IEEE.
[40] Rayford B. Vaughn,et al. Discovering vulnerabilities in control system human-machine interface software , 2009, J. Syst. Softw..
[41] Om Pal,et al. Public Key Cryptography Based Approach for Securing SCADA Communications , 2011 .
[42] K. Krishnamurthy,et al. Design and Implementation of Web Based Remote Supervisory Control and Information System , 2011 .
[43] Rekha Jain,et al. Wireless Sensor Network -A Survey , 2013 .
[44] Savaş Şahin. Modbus-Based SCADA/HMI Applications , 2013 .
[45] Qian Wang,et al. A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data , 2016, IEEE Transactions on Parallel and Distributed Systems.
[46] J.A. Rodriguez,et al. Deployment of digital video and Audio Over electrical SCADA networks , 2005, IEEE Transactions on Power Delivery.
[47] E. Chikuni,et al. Investigating the security of electrical power systems SCADA , 2007, AFRICON 2007.