Analysis of Attack-Defense Strategies in Autonomous Distributed IoT Systems
暂无分享,去创建一个
[1] Sheng-Tzong Cheng,et al. Performance evaluation of an admission control algorithm: dynamic threshold with negotiation , 2003, Perform. Evaluation.
[2] Ananthram Swami,et al. A Provenance-Based Trust Model for Delay Tolerant Networks , 2012, IFIPTM.
[3] Guofei Jiang,et al. Modeling and analytics for cyber-physical systems in the age of big data , 2014, PERV.
[4] Jin-Hee Cho,et al. PROVEST: Provenance-Based Trust Model for Delay Tolerant Networks , 2018, IEEE Transactions on Dependable and Secure Computing.
[5] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[6] Ing-Ray Chen,et al. Utilizing call admission control for pricing optimization of multiple service classes in wireless cellular networks , 2009, Comput. Commun..
[7] Ing-Ray Chen,et al. Agent-Based Forwarding Strategies for Reducing Location Management Cost in Mobile Networks , 2001, Mob. Networks Appl..
[8] Sheng-Tzong Cheng,et al. On failure recoverability of client-server applications in mobile wireless environments , 2005, IEEE Transactions on Reliability.
[9] Ing-Ray Chen,et al. Analyzing dynamic voting using Petri nets , 1996, Proceedings 15th Symposium on Reliable Distributed Systems.
[10] Ing-Ray Chen,et al. Adaptive network management for countering selective capture in wireless sensor networks , 2013, Proceedings of the 9th International Conference on Network and Service Management (CNSM 2013).
[11] Ilsun You,et al. Misbehavior Detection of Embedded IoT Devices in Medical Cyber Physical Systems , 2018, 2018 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE).
[12] Farokh B. Bastani,et al. Effect of artificial-intelligence planning-procedures on system reliability , 1991 .
[13] Sokol Kosta,et al. Large-Scale Synthetic Social Mobile Networks with SWIM , 2014, IEEE Transactions on Mobile Computing.
[14] Ing-Ray Chen,et al. Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical Cyber Physical Systems , 2015, IEEE Transactions on Dependable and Secure Computing.
[15] Ilsun You,et al. On IoT Misbehavior Detection in Cyber Physical Systems , 2018, 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC).
[16] Farokh B. Bastani,et al. Reliability of systems with fuzzy-failure criterion , 1994, Proceedings of Annual Reliability and Maintainability Symposium (RAMS).
[17] Walaa Hamouda,et al. A Critical Review of Practices and Challenges in Intrusion Detection Systems for IoT: Toward Universal and Resilient Systems , 2018, IEEE Communications Surveys & Tutorials.
[18] Ing-Ray Chen,et al. Admission Control Algorithms for Revenue Optimization with QoS Guarantees in Mobile Wireless Networks , 2006, Wirel. Pers. Commun..
[19] Ing-Ray Chen,et al. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems , 2013, IEEE Transactions on Reliability.
[20] Hamid Al-Hamadi,et al. Trust-Based Decision Making for Health IoT Systems , 2017, IEEE Internet of Things Journal.
[21] Ing-Ray Chen,et al. Performance Evaluation of Forwarding Strategies for Location Management in Mobile Networks , 1998, Comput. J..
[22] Sheng-Tzong Cheng,et al. Dynamic quota-based admission control with sub-rating in multimedia servers , 2000, Multimedia Systems.
[23] Ing-Ray Chen,et al. Analysis of Replicated Data with Repair Dependency , 1996, Comput. J..
[24] Ing-Ray Chen,et al. Modeling and Analysis of Attacks and Counter Defense Mechanisms for Cyber Physical Systems , 2016, IEEE Transactions on Reliability.
[25] Ing-Ray Chen,et al. Performance Analysis of Location-Aware Mobile Service Proxies for Reducing Network Cost in Personal Communication Systems , 2005, Mob. Networks Appl..