Vulnerability-constrained multiple minimum cost paths for multi-source wireless sensor networks
暂无分享,去创建一个
[1] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[2] Amir Hossein Mohajerzadeh,et al. Energy Efficient Spanning Tree for Data Aggregation in Wireless Sensor Networks , 2008, 2008 Proceedings of 17th International Conference on Computer Communications and Networks.
[3] Haohong Wang,et al. Cross-layer optimization for video summary transmission over wireless networks , 2007, IEEE Journal on Selected Areas in Communications.
[4] Albert Y. Zomaya,et al. Security Issues in Wireless Sensor Networks , 2006, 2006 International Conference on Systems and Networks Communications (ICSNC'06).
[5] Refael Hassin,et al. Approximation Schemes for the Restricted Shortest Path Problem , 1992, Math. Oper. Res..
[6] Elaine Shi,et al. Designing secure sensor networks , 2004, IEEE Wireless Communications.
[7] Wei An,et al. The Maximized Relay Capacity and Optimal Data Transmission for Wireless Sensor Networks , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[8] S. Shankar Sastry,et al. Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.
[9] Sang Hyuk Son,et al. RDDS: A Real-Time Data Distribution Service for Cyber-Physical Systems , 2012, IEEE Transactions on Industrial Informatics.
[10] J. Storer. An Introduction to Data Structures and Algorithms , 2002, Birkhäuser Boston.
[11] Guoliang Xue,et al. Constrained shortest link-disjoint paths selection: a network programming based approach , 2006, IEEE Transactions on Circuits and Systems I: Regular Papers.
[12] Scott F. Midkiff,et al. Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses , 2008, IEEE Pervasive Computing.
[13] Keith J. Blow,et al. Radio range adjustment for energy efficient wireless sensor networks , 2006, Ad Hoc Networks.
[14] Jan M. Rabaey,et al. Energy aware routing for low energy ad hoc sensor networks , 2002, 2002 IEEE Wireless Communications and Networking Conference Record. WCNC 2002 (Cat. No.02TH8609).
[15] Sungyoung Lee,et al. Securing Distributed Wireless Sensor Networks: Issues and Guidelines , 2006, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06).
[16] Harry Leib,et al. Performance of truncated type-II hybrid ARQ schemes with noisy feedback over block fading channels , 2000, IEEE Trans. Commun..
[17] Yong Wang,et al. A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.
[18] G. Manimaran,et al. Vulnerability Assessment of Cybersecurity for SCADA Systems , 2008, IEEE Transactions on Power Systems.
[19] Mei Yang,et al. Minimum cost paths subject to minimum vulnerability for reliable communications , 2005, 8th International Symposium on Parallel Architectures,Algorithms and Networks (ISPAN'05).
[20] Amir Hossein Mohajerzadeh,et al. Tree Based Energy and Congestion Aware Routing Protocol for Wireless Sensor Networks , 2010, Wirel. Sens. Netw..
[21] Lui Sha,et al. Cyber-Physical Systems: A New Frontier , 2008, 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008).
[22] Kenneth Steiglitz,et al. Combinatorial Optimization: Algorithms and Complexity , 1981 .
[23] T. Kavitha,et al. Security Vulnerabilities In Wireless Sensor Networks: A Survey , 2010 .
[24] Mohit Saxena,et al. SECURITY IN WIRELESS SENSOR NETWORKS - A LAYER BASED CLASSIFICATION , 2007 .
[25] Djamel Djenouri,et al. A survey of security issues in mobile ad hoc and sensor networks , 2005, IEEE Communications Surveys & Tutorials.
[26] Wei An,et al. Importance-based data transmission optimization in multi-source single-sink wireless sensor networks , 2014, Wirel. Commun. Mob. Comput..
[27] Xiangtong Qi,et al. Dual-homing multicast protection , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..
[28] Kaoru Sezaki,et al. ABS-2-9 TREE-BASED DATA DISSEMINATION IN WIRELESS SENSOR NETWORKS(ABS-2. センサネットワーク技術, 基礎・境界) , 2005 .
[29] Songwu Lu,et al. A scalable solution to minimum cost forwarding in large sensor networks , 2001, Proceedings Tenth International Conference on Computer Communications and Networks (Cat. No.01EX495).
[30] Yong Fan,et al. A distributed relay node placement strategy based on balanced network lifetime for wireless sensor networks , 2010, 2010 IEEE International Conference on Wireless Communications, Networking and Information Security.