Malicious node detection for the future network security from epistemic uncertainties
暂无分享,去创建一个
[1] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[2] Pavan Sikka,et al. Wireless ad hoc sensor and actuator networks on the farm , 2006, 2006 5th International Conference on Information Processing in Sensor Networks.
[3] D. Stephens,et al. Detection of moving radioactive sources using sensor networks , 2004, IEEE Transactions on Nuclear Science.
[4] Bruno Sinopoli,et al. Distributed control applications within sensor networks , 2003, Proc. IEEE.
[5] Christos Gkantsidis,et al. Cooperative Security for Network Coding File Distribution , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[6] Reza Curtmola,et al. Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks , 2009, WiSec '09.
[7] Mm Momani,et al. Bayesian methods for modelling and management of trust in wireless sensor networks , 2008 .
[8] Audun Jøsang,et al. A Logic for Uncertain Probabilities , 2001, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[9] Xu Huang,et al. Fuzzy Dynamic Switching in Quantum Key Distribution for Wi-Fi Networks , 2009, 2009 Sixth International Conference on Fuzzy Systems and Knowledge Discovery.
[10] Hyuk Lim,et al. J-Sim: a simulation and emulation environment for wireless sensor networks , 2006, IEEE Wireless Communications.
[11] Matt Welsh,et al. Deploying a wireless sensor network on an active volcano , 2006, IEEE Internet Computing.
[12] Xu Huang,et al. Fuzzy controller for a dynamic window in elliptic curve cryptography wireless networks for scalar multiplication , 2010, 2010 16th Asia-Pacific Conference on Communications (APCC).
[13] Yong Guan,et al. An Efficient Signature-Based Scheme for Securing Network Coding Against Pollution Attacks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[14] Feng Zhao. Wireless sensor networks: a new computing platform for tomorrow's Internet , 2004, Proceedings of the IEEE 6th Circuits and Systems Symposium on Emerging Technologies: Frontiers of Mobile and Wireless Communication (IEEE Cat. No.04EX710).
[15] Fabrice Valois,et al. Resiliency of wireless sensor networks: Definitions and analyses , 2010, 2010 17th International Conference on Telecommunications.
[16] Pritam Gajkumar Shah,et al. Multi-Agent System Protecting from Attacking with Elliptic Curve Cryptography , 2010 .
[17] Dharmendra Sharma,et al. Accuracy of Location Identification with Antenna Polarization on RSSI , 2009 .
[18] Fang Liu,et al. Insider Attacker Detection in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[19] Kamal Jain,et al. Signatures for Network Coding , 2006 .
[20] Balasubramaniam Natarajan,et al. Optimal Control-Based Strategy for Sensor Deployment , 2011, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[21] David Mazières,et al. On-the-fly verification of rateless erasure codes for efficient content distribution , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[22] Xu Huang,et al. A Novel Algorithm for Protecting from Internal Attacks of Wireless Sensor Networks , 2011, 2011 IFIP 9th International Conference on Embedded and Ubiquitous Computing.