Cyber-Physical Vulnerabilities of Wireless Sensor Networks in Smart Cities
暂无分享,去创建一个
[1] Kang Yen,et al. Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.
[2] Georgios K. Ouzounis,et al. Smart cities of the future , 2012, The European Physical Journal Special Topics.
[3] Cornel Klein,et al. From Smart Homes to Smart Cities: Opportunities and Challenges from an Industrial Perspective , 2008, NEW2AN.
[4] Nitin H. Vaidya,et al. When Watchdog Meets Coding , 2009, 2010 Proceedings IEEE INFOCOM.
[5] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[6] Timo Ojala,et al. Experiences inside the Ubiquitous Oulu Smart City , 2011, Computer.
[7] Ravi Sankar,et al. A Survey of Intrusion Detection Systems in Wireless Sensor Networks , 2014, IEEE Communications Surveys & Tutorials.
[8] Jaime Lloret,et al. Bio-Inspired Mechanisms in Wireless Sensor Networks , 2015, Int. J. Distributed Sens. Networks.
[9] Peng Zhou,et al. Toward Energy-Efficient Trust System Through Watchdog Optimization for WSNs , 2015, IEEE Transactions on Information Forensics and Security.
[10] Yu-Chee Tseng,et al. Pervasive and Mobile Computing ( ) – Pervasive and Mobile Computing Review from Wireless Sensor Networks towards Cyber Physical Systems , 2022 .
[11] Jie Shen,et al. Fault Tolerant Line-Based Barrier Coverage Formation in Mobile Wireless Sensor Networks , 2015, Int. J. Distributed Sens. Networks.
[12] James Conrad,et al. Design considerations for a large-scale wireless sensor network for substation monitoring , 2010, IEEE Local Computer Network Conference.
[13] Shicong Meng,et al. Enhanced Monitoring-as-a-Service for Effective Cloud Management , 2013, IEEE Transactions on Computers.
[14] Yong Wang,et al. A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.
[15] Yang Yang,et al. Research on Smart Substation Equipment Condition Monitoring System Based on Wireless Sensor Networks , 2011 .
[16] Hermann de Meer,et al. Dynamic key management in wireless sensor networks: A survey , 2013, J. Netw. Comput. Appl..
[17] Xuemin Shen,et al. A Cloud-Based Scheme for Protecting Source-Location Privacy against Hotspot-Locating Attack in Wireless Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.