Modeling and performance evaluation of jamming-tolerant wireless systems
暂无分享,去创建一个
[1] Tomas Olovsson,et al. Towards operational measures of computer security: Experimentation and modelling , 1995 .
[2] Zhuo Lu,et al. From jammer to gambler: Modeling and detection of jamming attacks against time-critical traffic , 2011, 2011 Proceedings IEEE INFOCOM.
[3] Kishor S. Trivedi. Probability and Statistics with Reliability, Queuing, and Computer Science Applications , 1984 .
[4] Richard A. Poisel,et al. Modern Communications Jamming Principles and Techniques , 2003 .
[5] Wenyuan Xu,et al. Channel surfing: defending wireless sensor networks from jamming and interference , 2006, SenSys '06.
[6] Xianzhi Wang,et al. Trust architecture and reputation evaluation for internet of things , 2018, J. Ambient Intell. Humaniz. Comput..
[7] B. Sarojini,et al. Survey on Big Data and Cloud Computing , 2017, 2017 World Congress on Computing and Communication Technologies (WCCCT).
[8] Longfei Wu,et al. A Survey on Security and Privacy Issues in Internet-of-Things , 2017, IEEE Internet of Things Journal.
[9] Xinyu Yang,et al. A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.
[10] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[11] Radha Poovendran,et al. Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[12] Seong-Taek Park,et al. A study on smart factory-based ambient intelligence context-aware intrusion detection system using machine learning , 2018, J. Ambient Intell. Humaniz. Comput..
[13] Jim Kurose,et al. Computer Networking: A Top-Down Approach , 1999 .
[14] Srdjan Capkun,et al. Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[15] Rodolphe Ortalo,et al. Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security , 1999, IEEE Trans. Software Eng..
[16] Ingrid Moerman,et al. Time-critical communication in 6TiSCH networks , 2018, 2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW).
[17] Guevara Noubir,et al. On link layer denial of service in data wireless LANs , 2005, Wirel. Commun. Mob. Comput..
[18] Akhil Gupta,et al. Security threats of wireless networks: A survey , 2015, International Conference on Computing, Communication & Automation.
[19] Somesh Jha,et al. Minimization and Reliability Analyses of Attack Graphs , 2002 .
[20] Aamir Mahmood,et al. Wireless Mediation of Multiple Equi-Priority Events in Time-Critical Industrial Applications , 2018, SmartCitiesSecurity@MobiHoc.
[21] Xin Liu,et al. Performance of IEEE 802.11 under Jamming , 2008, Mobile Networks and Applications.
[22] Xiaodong Wang,et al. Robust Detection of MAC Layer Denial-of-Service Attacks in CSMA/CA Wireless Networks , 2008, IEEE Transactions on Information Forensics and Security.
[23] Milena Ivanova,et al. The IEC 61850 standard — Communication networks and automation systems from an electrical engineering point of view , 2016, 2016 19th International Symposium on Electrical Apparatus and Technologies (SIELA).
[24] Moussa Ayyash,et al. Spectrum Assignment in Cognitive Radio Networks for Internet-of-Things Delay-Sensitive Applications Under Jamming Attacks , 2018, IEEE Internet of Things Journal.
[25] Bharat B. Madan,et al. A method for modeling and quantifying the security attributes of intrusion tolerant systems , 2004, Perform. Evaluation.
[26] Andrea Bobbio,et al. Reliability and Availability Engineering - Modeling, Analysis, and Applications , 2017 .
[27] Yang Xiao,et al. Future Generation Computer Systems a Survey of Communication/networking in Smart Grids , 2022 .
[28] Zhuo Lu,et al. Modeling, Evaluation and Detection of Jamming Attacks in Time-Critical Wireless Applications , 2014, IEEE Transactions on Mobile Computing.
[29] Jonathan Rodriguez,et al. Network Intrusion Detection System for Jamming Attack in LoRaWAN Join Procedure , 2018, 2018 IEEE International Conference on Communications (ICC).
[30] Ehsan Namjoo,et al. LR-HIDS: logistic regression host-based intrusion detection system for cloud environments , 2018, Journal of Ambient Intelligence and Humanized Computing.
[31] Tomas Olovsson,et al. A Quantitative Model of the Security Intrusion Process Based on Attacker Behavior , 1997, IEEE Trans. Software Eng..
[32] Jim Kurose,et al. Computer Networking: A Top-Down Approach (6th Edition) , 2007 .
[33] Haythem Bany Salameh,et al. Security-aware channel assignment in IoT-based cognitive radio networks for time-critical applications , 2017, 2017 Fourth International Conference on Software Defined Systems (SDS).