Protecting wireless sensor networks from internal attacks based on uncertain decisions
暂无分享,去创建一个
[1] Mm Momani,et al. Bayesian methods for modelling and management of trust in wireless sensor networks , 2008 .
[2] D. Stephens,et al. Detection of moving radioactive sources using sensor networks , 2004, IEEE Transactions on Nuclear Science.
[3] Hyuk Lim,et al. J-Sim: a simulation and emulation environment for wireless sensor networks , 2006, IEEE Wireless Communications.
[4] Feng Zhao. Wireless sensor networks: a new computing platform for tomorrow's Internet , 2004, Proceedings of the IEEE 6th Circuits and Systems Symposium on Emerging Technologies: Frontiers of Mobile and Wireless Communication (IEEE Cat. No.04EX710).
[5] Christos Gkantsidis,et al. Cooperative Security for Network Coding File Distribution , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[6] Audun Jøsang,et al. A Logic for Uncertain Probabilities , 2001, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[7] David Mazières,et al. On-the-fly verification of rateless erasure codes for efficient content distribution , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[8] Xu Huang,et al. A Novel Algorithm for Protecting from Internal Attacks of Wireless Sensor Networks , 2011, 2011 IFIP 9th International Conference on Embedded and Ubiquitous Computing.
[9] Xu Huang,et al. Fuzzy Dynamic Switching in Quantum Key Distribution for Wi-Fi Networks , 2009, 2009 Sixth International Conference on Fuzzy Systems and Knowledge Discovery.
[10] Bruno Sinopoli,et al. Distributed control applications within sensor networks , 2003, Proc. IEEE.
[11] Balasubramaniam Natarajan,et al. Optimal Control-Based Strategy for Sensor Deployment , 2011, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[12] Fang Liu,et al. Insider Attacker Detection in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[13] Kamal Jain,et al. Signatures for Network Coding , 2006 .
[14] Chung-Kuo Chang,et al. An application of sensor networks for syndromic surveillance , 2005, Proceedings. 2005 IEEE Networking, Sensing and Control, 2005..
[15] Reza Curtmola,et al. Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks , 2009, WiSec '09.
[16] Xu Huang,et al. Fuzzy controlling window for elliptic curve cryptography in wireless networks , 2010, 5th International Conference on Computer Sciences and Convergence Information Technology.
[17] Pavan Sikka,et al. Wireless ad hoc sensor and actuator networks on the farm , 2006, 2006 5th International Conference on Information Processing in Sensor Networks.
[18] Fabrice Valois,et al. Resiliency of wireless sensor networks: Definitions and analyses , 2010, 2010 17th International Conference on Telecommunications.
[19] Pritam Gajkumar Shah,et al. Multi-Agent System Protecting from Attacking with Elliptic Curve Cryptography , 2010 .
[20] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[21] Matt Welsh,et al. Deploying a wireless sensor network on an active volcano , 2006, IEEE Internet Computing.
[22] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[23] Dharmendra Sharma,et al. Accuracy of Location Identification with Antenna Polarization on RSSI , 2009 .
[24] Yong Guan,et al. An Efficient Signature-Based Scheme for Securing Network Coding Against Pollution Attacks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.