Assuring trustworthiness of sensor data for cyber-physical systems
暂无分享,去创建一个
[1] Uwe Aickelin,et al. Anomaly Detection Using the Dempster-Shafer Method , 2006, DMIN.
[2] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[3] Alex Talevski,et al. Taxonomy of Wireless Sensor Network Cyber Security Attacks in the Oil and Gas Industries , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.
[4] Christoph Krauß. Handling insider attacks in wireless sensor networks , 2008, Inf. Secur. Tech. Rep..
[5] Björn Stelte. An event management communication system for Wireless Sensor Networks , 2011, 12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops.
[6] Jeffrey A. Barnett,et al. Computational Methods for a Mathematical Theory of Evidence , 1981, IJCAI.
[7] Andreas Matheus,et al. Evidence theory for reputation-based trust in wireless sensor networks , 2012, COM.Geo '12.
[8] Andreas Matheus,et al. Secure trust reputation with multi-criteria decision making for wireless sensor networks data aggregation , 2011, 2011 IEEE SENSORS Proceedings.
[9] Mooseop Kim,et al. Design of Cryptographic Hardware Architecture for Mobile Computing , 2009, J. Inf. Process. Syst..
[10] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2004, SASN '04.
[11] 立花 篤男,et al. 13^ IFIP/IEEE International Symposium on Integrated Network Management (IM2013)報告(特別講演,管理機能,理論・運用方法論,及び一般) , 2013 .
[12] J. H. Davis,et al. An Integrative Model Of Organizational Trust , 1995 .
[13] P. Sridhar,et al. Multi-Criteria Decision Making in Sensor Networks , 2008, IEEE Instrumentation & Measurement Magazine.
[14] Bruno Sinopoli,et al. Challenges for Securing Cyber Physical Systems , 2009 .
[15] Björn Stelte,et al. State-of-the-Art Kryptoverfahren für drahtlose Sensornetze - Eine Krypto-Bibliothek für MantisOS , 2010, Sicherheit.
[16] Reza Curtmola,et al. Mitigating Byzantine Attacks in Ad Hoc Wireless Networks , 2004 .
[17] Subhash Challa,et al. GTRSSN: Gaussian Trust and Reputation System for Sensor Networks , 2008, SCSS.
[18] Claudia Eckert,et al. On handling insider attacks in wireless sensor networks , 2008 .