An Immune Middleware for Embedded System
暂无分享,去创建一个
[1] Yee Wei Law,et al. How to Secure a Wireless Sensor Network , 2005, 2005 International Conference on Intelligent Sensors, Sensor Networks and Information Processing.
[2] Richard Han,et al. Node Compromise in Sensor Networks: The Need for Secure Systems ; CU-CS-990-05 , 2005 .
[3] Ahmad-Reza Sadeghi,et al. Towards multilaterally secure computing platforms - with open source and trusted computing , 2005, Inf. Secur. Tech. Rep..
[4] Lianying Zhou,et al. Research on computer network security based on pattern recognition , 2003, SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483).
[5] Pradeep K. Khosla,et al. SWATT: softWare-based attestation for embedded devices , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[6] Harald Vogt,et al. Intrusion Detection and Failure Recovery in Sensor Nodes , 2005, GI Jahrestagung.
[7] Ali Miri,et al. An intrusion detection system for wireless sensor networks , 2005, WiMob'2005), IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, 2005..
[8] David E. Bakken,et al. A configurable cryptography subsystem in a middleware framework for embedded systems , 2004, Comput. Networks.
[9] Anastasia Pagnoni,et al. An innate immune system for the protection of computer networks , 2005 .
[10] Donggang Liu,et al. Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).
[11] David A. Wagner,et al. Security in wireless sensor networks , 2004, SASN '04.
[12] Fumio Mizoguchi,et al. Design of security system based on immune system , 2001, Proceedings Tenth IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises. WET ICE 2001.
[13] Srivaths Ravi,et al. Secure embedded processing through hardware-assisted run-time monitoring , 2005, Design, Automation and Test in Europe.
[14] Trent Jaeger,et al. Secure coprocessor-based intrusion detection , 2002, EW 10.
[15] Philip Koopman. Embedded System Security , 2004, Computer.
[16] Fan Hong,et al. Network Based Immunization Against Computer Virus , 2006, 2006 Japan-China Joint Workshop on Frontier of Computer Science and Technology.
[17] Elaine Shi,et al. Designing secure sensor networks , 2004, IEEE Wireless Communications.
[18] Judith Kelner,et al. Evaluation of security mechanisms in wireless sensor networks , 2005, 2005 Systems Communications (ICW'05, ICHSN'05, ICMCS'05, SENET'05).
[19] Amitabh Mishra,et al. Intrusion detection in wireless ad hoc networks , 2004, IEEE Wireless Communications.