Simulator for analysis cyber threats to RFID based system
暂无分享,去创建一个
[1] Gabriele D'Angelo,et al. Modeling the Internet of Things: a simulation perspective , 2017, 2017 International Conference on High Performance Computing & Simulation (HPCS).
[2] Andrzej Najgebauer,et al. Agent-Based M&S of Smart Sensors for Knowledge Acquisition Inside the Internet of Things and Sensor Networks , 2015, ACIIDS.
[3] Andrzej Najgebauer,et al. SenseSim: An agent-based and discrete event simulator for Wireless Sensor Networks and the Internet of Things , 2015, 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT).
[4] Srinivas Sampalli,et al. Technique for preventing DoS attacks on RFID systems , 2010, SoftCOM 2010, 18th International Conference on Software, Telecommunications and Computer Networks.
[5] Claus Heinrich,et al. RFID and beyond - growing your business through real world awareness , 2005 .
[6] Waszkowski Robert,et al. Business processes in the RFID-equipped restricted access administrative office , 2016 .
[7] Robert Waszkowski,et al. Simulator for testing hardware and software of the office system with RFID tags , 2017 .
[8] Mikko Sallinen,et al. Survey of Wireless Sensor Networks Simulation Tools for Demanding Applications , 2009, 2009 Fifth International Conference on Networking and Services.
[9] Ronald L. Rivest,et al. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.
[10] Andrzej Najgebauer,et al. Augmented perception using Internet of Things , 2014 .
[11] Antanas Cenys,et al. Composite Dos Attack Model , 2012 .
[12] Maciej Kiedrowicz. Multi-faceted methodology of the risk analysis and management referring to the IT system supporting the processing of documents at different levels of sensitivity , 2017 .
[13] Ke'ahi Cooper,et al. Security for the Internet of Things , 2015 .
[14] Maciej Kiedrowicz,et al. Selected aspects of risk management in respect of security of the document lifecycle management system with multiple levels of sensitivity , 2015 .
[15] Dariusz Pierzchała. Application of Ontology and Rough Set Theory to Information Sharing in Multi-resolution Combat M&S , 2014 .
[16] Robert Waszkowski,et al. Optimization of the Document Placement in the RFID Cabinet , 2016 .
[17] Adam Dunkels,et al. Cross-Level Sensor Network Simulation with COOJA , 2006, Proceedings. 2006 31st IEEE Conference on Local Computer Networks.
[18] M. Tahar Kechadi,et al. CupCarbon: a multi-agent and discrete event wireless sensor network design and simulation tool , 2014, SimuTools.