Robust Network Architecture Against Random Threats in WMD Environments: Theoretical Limits and Recovery Strategies
暂无分享,去创建一个
[1] Christian Bettstetter,et al. On the Connectivity of Ad Hoc Networks , 2004, Comput. J..
[2] Hossein Hooshyar. System Protection for High PV-Penetrated Residential Distribution Systems (Green Hubs). , 2011 .
[3] Ove Frank,et al. http://www.jstor.org/about/terms.html. JSTOR's Terms and Conditions of Use provides, in part, that unless you have obtained , 2007 .
[4] Zygmunt J. Haas,et al. Predictive distance-based mobility management for PCS networks , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[5] M. Newman,et al. Statistical mechanics of networks. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.
[6] Zhu Han,et al. Manipulating the electricity power market via jamming the price signaling in smart grid , 2011, 2011 IEEE GLOBECOM Workshops (GC Wkshps).
[7] Ian F. Akyildiz,et al. A survey on wireless multimedia sensor networks , 2007, Comput. Networks.
[8] Isabelle Herlin,et al. Landslide tracking with a curve evolution model driven by interferometric data , 2003, IGARSS 2003. 2003 IEEE International Geoscience and Remote Sensing Symposium. Proceedings (IEEE Cat. No.03CH37477).
[9] Yi Xu,et al. The Speed of Information Propagation in Large Wireless Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[10] Stefan Savage,et al. Inferring Internet denial-of-service activity , 2001, TOCS.
[11] Georgios Kalogridis,et al. Smart Grid Privacy via Anonymization of Smart Metering Data , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[12] R. Giovanini,et al. EPOCHS: a platform for agent-based electric power and communication simulation built from commercial off-the-shelf components , 2006, IEEE Transactions on Power Systems.
[13] William H. Sanders,et al. Smart grid protocol testing through cyber-physical testbeds , 2013, 2013 IEEE PES Innovative Smart Grid Technologies Conference (ISGT).
[14] Terry V. Benzel,et al. The DETER project: Advancing the science of cyber security experimentation and test , 2010, 2010 IEEE International Conference on Technologies for Homeland Security (HST).
[15] Victor M. Preciado,et al. Moment-Based Spectral Analysis of Large-Scale Networks Using Local Structural Information , 2010, IEEE/ACM Transactions on Networking.
[16] Hamid Krim,et al. Statistical classification of social networks , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[17] Dogu Arifler,et al. Information Theoretic Approach to Detecting Systematic Node Destructions in Wireless Sensor Networks , 2008, IEEE Transactions on Wireless Communications.
[18] Eitan Altman,et al. Impact of Mobility on the Performance of Relaying in Ad Hoc Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[19] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[20] Edmund M. Yeh,et al. On the latency for information dissemination in mobile wireless networks , 2008, MobiHoc '08.
[21] Brian D. O. Anderson,et al. A Theory of Network Localization , 2006, IEEE Transactions on Mobile Computing.
[22] James W. Vick,et al. Homology Theory: An Introduction to Algebraic Topology , 1973 .
[23] T. Liggett. An Improved Subadditive Ergodic Theorem , 1985 .
[24] Hamid Krim,et al. A Generalized Markov Graph Model: Application to Social Network Analysis , 2013, IEEE Journal of Selected Topics in Signal Processing.
[25] Hamid Krim,et al. Distributed boundary tracking using alpha and Delaunay-Cech shapes , 2013, ArXiv.
[26] Michael F. Worboys,et al. Detecting basic topological changes in sensor networks by local aggregation , 2008, GIS '08.
[27] Christian Bettstetter,et al. On the minimum node degree and connectivity of a wireless multihop network , 2002, MobiHoc '02.
[28] Hamid Krim,et al. Divide and Conquer: Localizing Coverage Holes in Sensor Networks , 2010, 2010 7th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON).
[29] Wenye Wang,et al. Design and Applications of A Smooth Mobility Model for Mobile Ad Hoc Networks , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.
[30] David Evans,et al. Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.
[31] Rong Zheng,et al. Information Dissemination in Power-Constrained Wireless Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[32] Andrea J. Goldsmith,et al. Large wireless networks under fading, mobility, and delay constraints , 2004, IEEE INFOCOM 2004.
[33] R. Ho. Algebraic Topology , 2022 .
[34] E. Xing,et al. Discrete Temporal Models of Social Networks , 2006, SNA@ICML.
[35] Majid Khabbazian,et al. NIS02-1: Wormhole Attack in Wireless Ad Hoc Networks: Analysis and Countermeasure , 2006, IEEE Globecom 2006.
[36] Hamid Krim,et al. Distributed Localization of Coverage Holes Using Topological Persistence , 2014, IEEE Transactions on Signal Processing.
[37] Magnus Egerstedt,et al. Control Using Higher Order Laplacians in Network Topologies , 2006 .
[38] Nisheeth K. Vishnoi,et al. On Generating Graphs with Prescribed Vertex Degrees for Complex Network Modeling 1 , 2003 .
[39] Martin L. Shooman,et al. Reliability of computer systems and networks , 2001 .
[40] Donald F. Towsley,et al. Dynamic Coverage of Mobile Sensor Networks , 2011, IEEE Transactions on Parallel and Distributed Systems.
[41] Jennifer C. Hou,et al. Modeling steady-state and transient behaviors of user mobility: formulation, analysis, and application , 2006, MobiHoc '06.
[42] Zhen Liu,et al. Capacity, delay and mobility in wireless ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[43] Mathew D. Penrose,et al. Random Geometric Graphs , 2003 .
[44] Lei Sun,et al. On latency distribution and scaling: from finite to large Cognitive Radio Networks under general mobility , 2012, 2012 Proceedings IEEE INFOCOM.
[45] H. Krim,et al. Applied topology in static and dynamic sensor networks , 2012, 2012 International Conference on Signal Processing and Communications (SPCOM).
[46] Harish Chintakunta,et al. Topology and Geometry of Sensor Networks: A Distributed Computing Approach , 2013 .
[47] Sheldon M. Ross,et al. Stochastic Processes , 2018, Gauge Integral Structures for Stochastic Calculus and Quantum Electrodynamics.
[48] Lamine Mili,et al. Power system and communication network co-simulation for smart grid applications , 2011, ISGT 2011.
[49] Wenye Wang,et al. A unified mobility model for analysis and simulation of mobile wireless networks , 2009, Wirel. Networks.
[50] Nicolas Papadakis,et al. A Variational Technique for Time Consistent Tracking of Curves and Motion , 2008, Journal of Mathematical Imaging and Vision.
[51] Subhasri Duttagupta,et al. Tracking Dynamic Boundaries Using Sensor Network , 2011, IEEE Transactions on Parallel and Distributed Systems.
[52] Ramin Hekmat,et al. Ad-hoc networks - fundamental properties and network topologies , 2006 .
[53] Christian Bettstetter,et al. Smooth is better than sharp: a random mobility model for simulation of wireless networks , 2001, MSWIM '01.
[54] Alireza Tahbaz-Salehi,et al. Distributed Coverage Verification in Sensor Networks Without Location Information , 2008, IEEE Transactions on Automatic Control.
[55] Muriel Médard,et al. High-reliability architectures for networks under stress , 2004, IEEE INFOCOM 2004.
[56] François Baccelli,et al. Impact of interferences on connectivity in ad hoc networks , 2005, IEEE/ACM Transactions on Networking.
[57] Bin Wang,et al. Detection and tracking of region-based evolving targets in sensor networks , 2005, Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005..
[58] P. Pattison. LOGIT MODELS AND LOGISTIC REGRESSIONS FOR SOCIAL NETWORKS: I. AN INTRODUCTION TO MARKOV GRAPHS AND p* STANLEY WASSERMAN UNIVERSITY OF ILLINOIS , 1996 .
[59] David A. Maltz,et al. Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.
[60] Dmitry Podkuiko,et al. Energy Theft in the Advanced Metering Infrastructure , 2009, CRITIS.
[61] Dmitriy Morozov,et al. Zigzag persistent homology and real-valued functions , 2009, SCG '09.
[62] Wei Ren,et al. Connectivity of cognitive radio networks: proximity vs. opportunity , 2009, CoRoNet '09.
[63] Wenye Wang,et al. On the Connectivity Analysis over Large-Scale Hybrid Wireless Networks , 2010, 2010 Proceedings IEEE INFOCOM.
[64] Eitan Altman,et al. Coverage and connectivity of ad hoc networks presence of channel randomness , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[65] Namrata Vaswani,et al. Tracking Deforming Objects Using Particle Filtering for Geometric Active Contours , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[66] Stephen B. Wicker,et al. On the behavior of communication links of a node in a multi-hop mobile environment , 2004, MobiHoc '04.
[67] Hamed Mohsenian Rad,et al. Distributed Internet-Based Load Altering Attacks Against Smart Power Grids , 2011, IEEE Transactions on Smart Grid.
[68] Albert-László Barabási,et al. Statistical mechanics of complex networks , 2001, ArXiv.
[69] Mingyan Liu,et al. Random waypoint considered harmful , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[70] Ness B. Shroff,et al. Delay and Capacity Trade-Offs in Mobile Ad Hoc Networks: A Global Perspective , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[71] Jacques Janssen,et al. Numerical Treatment of Homogeneous Semi-Markov Processes in Transient Case–a Straightforward Approach , 2004 .
[72] Mathew D. Penrose,et al. On k-connectivity for a geometric random graph , 1999, Random Struct. Algorithms.
[73] Mingyan Liu,et al. Sound mobility models , 2003, MobiCom '03.
[74] Vikram Srinivasan,et al. Cooperation in wireless ad hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[75] Zuyi Li,et al. Modeling Load Redistribution Attacks in Power Systems , 2011, IEEE Transactions on Smart Grid.
[76] Christopher Taylor,et al. Localization in Sensor Networks , 2005, Handbook of Sensor Networks.
[77] Panganamala Ramana Kumar,et al. RHEINISCH-WESTFÄLISCHE TECHNISCHE HOCHSCHULE AACHEN , 2001 .
[78] David Tse,et al. Mobility increases the capacity of ad-hoc wireless networks , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[79] Wenye Wang,et al. Modeling and Analysis of Connectivity in Mobile Ad Hoc Networks with Misbehaving Nodes , 2006, 2006 IEEE International Conference on Communications.
[80] Hamid Krim,et al. Analysis and Control of Beliefs in Social Networks , 2014, IEEE Transactions on Signal Processing.
[81] Michael McGuire,et al. Stationary distributions of random walk mobility models for wireless ad hoc networks , 2005, MobiHoc '05.
[82] B. Bollobás,et al. Connectivity of random k-nearest-neighbour graphs , 2005, Advances in Applied Probability.
[83] Edward W. Knightly,et al. Denial of service resilience in ad hoc networks , 2004, MobiCom '04.
[84] Daniel P. Heyman,et al. Stochastic models in operations research , 1982 .
[85] R. C. Williamson,et al. Regularized principal manifolds , 2001 .
[86] Jie Gao,et al. Localization and routing in sensor networks by local angle information , 2005, MobiHoc '05.
[87] Michael F. Worboys,et al. Detecting Topological Change Using a Wireless Sensor Network , 2008, GIScience.
[88] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2011, TSEC.
[89] Anas AlMajali,et al. Analyzing Resiliency of the Smart Grid Communication Architectures under Cyber Attack , 2012, CSET.
[90] Levente Buttyán,et al. Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..
[91] Hamid Krim,et al. Detection and tracking of systematic time-evolving failures in sensor networks , 2011, 2011 4th IEEE International Workshop on Computational Advances in Multi-Sensor Adaptive Processing (CAMSAP).
[92] Arunabha Sen,et al. Region-based connectivity - a new paradigm for design of fault-tolerant networks , 2009, 2009 International Conference on High Performance Switching and Routing.
[93] Donald F. Towsley,et al. Properties of random direction models , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[94] Narsingh Deo,et al. Degree-correlation of a Scale-free Random Graph Process , 2005 .
[95] Yuval Peres,et al. Mobile geometric graphs: detection, coverage and percolation , 2010, Probability Theory and Related Fields.
[96] Deepa Kundur,et al. Towards modelling the impact of cyber attacks on a smart grid , 2011, Int. J. Secur. Networks.
[97] Yuguang Fang,et al. Portable movement modeling for PCS networks , 2000, IEEE Trans. Veh. Technol..
[98] J. Pearl,et al. Random geometric graphs: an algorithmic perspective , 2006 .
[99] A. Jadbabaie,et al. Decentralized Computation of Homology Groups in Networks by Gossip , 2007, 2007 American Control Conference.
[100] Nikolaos Limnios,et al. Semi-Markov Processes , 2001 .
[101] Hamid Krim,et al. Control and prediction of beliefs on social network , 2013, 2013 5th IEEE International Workshop on Computational Advances in Multi-Sensor Adaptive Processing (CAMSAP).
[102] Vin de Silva,et al. Coordinate-free Coverage in Sensor Networks with Controlled Boundaries via Homology , 2006, Int. J. Robotics Res..
[103] Paolo Giaccone,et al. Capacity scaling in delay tolerant networks with heterogeneous mobile nodes , 2007, MobiHoc '07.
[104] Elmar Gerhards-Padilla,et al. BonnMotion: a mobility scenario generation and analysis tool , 2010, SimuTools.
[105] David C. Moore,et al. Robust distributed network localization with noisy range measurements , 2004, SenSys '04.
[106] Stephan Eidenbenz,et al. Ad hoc-VCG: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents , 2003, MobiCom '03.
[107] Arunabha Sen,et al. A new metric for fault-tolerance in sensor networks , 2004, SenSys '04.
[108] Hamid R. Sadjadpour,et al. On mobility-capacity-delay trade-off in wireless ad hoc networks , 2004, The IEEE Computer Society's 12th Annual International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems, 2004. (MASCOTS 2004). Proceedings..
[109] William H. Sanders,et al. Model-based validation of an intrusion-tolerant information system , 2004, Proceedings of the 23rd IEEE International Symposium on Reliable Distributed Systems, 2004..
[110] William H. Sanders,et al. Model-based evaluation: from dependability to security , 2004, IEEE Transactions on Dependable and Secure Computing.
[111] Massimo Franceschetti,et al. Percolation in Multi-hop Wireless Networks , 2003 .
[112] A. Yezzi,et al. A variational framework for joint segmentation and registration , 2001, Proceedings IEEE Workshop on Mathematical Methods in Biomedical Image Analysis (MMBIA 2001).
[113] Panganamala Ramana Kumar,et al. The Number of Neighbors Needed for Connectivity of Wireless Networks , 2004, Wirel. Networks.
[114] W. Mendenhall,et al. Statistics for engineering and the sciences , 1984 .
[115] Eytan Modiano,et al. Capacity and delay tradeoffs for ad hoc mobile networks , 2005, IEEE Trans. Inf. Theory.
[116] Paolo Santi,et al. The Node Distribution of the Random Waypoint Mobility Model for Wireless Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..
[117] Devavrat Shah,et al. Throughput-delay trade-off in wireless networks , 2004, IEEE INFOCOM 2004.
[118] Thomas F. La Porta,et al. Movement-assisted sensor deployment , 2004, IEEE INFOCOM 2004.
[119] Mauro Leoncini,et al. The k-Neighbors Approach to Interference Bounded and Symmetric Topology Control in Ad Hoc Networks , 2006, IEEE Transactions on Mobile Computing.
[120] Patrick Thiran,et al. Latency of wireless sensor networks with uncoordinated power saving mechanisms , 2004, MobiHoc '04.