Modeling and analyzing cascading failures for Internet of Things
暂无分享,去创建一个
[1] Khaled Salah,et al. Efficient and dynamic scaling of fog nodes for IoT devices , 2017, The Journal of Supercomputing.
[2] Yongsheng Yang,et al. Exploring the invulnerability of wireless sensor networks against cascading failures , 2019, Inf. Sci..
[3] Dong Yue,et al. Robustness of cyber-physical power systems in cascading failure: Survival of interdependent clusters , 2020 .
[4] Wenfeng Li,et al. Analysis of Cascading Failure Based on Wireless Sensor Networks , 2015, 2015 IEEE International Conference on Systems, Man, and Cybernetics.
[5] Min Chen,et al. Narrow Band Internet of Things , 2017, IEEE Access.
[6] Yongsheng Yang,et al. Message forwarding for WSN-Assisted Opportunistic Network in disaster scenarios , 2019, J. Netw. Comput. Appl..
[7] Song Guo,et al. Green Industrial Internet of Things Architecture: An Energy-Efficient Perspective , 2016, IEEE Communications Standards.
[8] Gang Wang,et al. An Improved OPA Model and Blackout Risk Assessment , 2009, IEEE Transactions on Power Systems.
[9] Faruk Kazi,et al. Impact of Topology on the Propagation of Cascading Failure in Power Grid , 2016, IEEE Transactions on Smart Grid.
[10] Joonsang Baek,et al. Lightweight Encryption for Smart Home , 2016, 2016 11th International Conference on Availability, Reliability and Security (ARES).
[11] Khaled Salah,et al. VDC-Analyst: Design and verification of virtual desktop cloud resource allocations , 2014, Comput. Networks.
[12] Honggang Wang,et al. Topology Control for Building a Large-Scale and Energy-Efficient Internet of Things , 2017, IEEE Wireless Communications.
[13] Nasir Ghani,et al. Stochastic Analysis of Cascading-Failure Dynamics in Power Grids , 2014, IEEE Transactions on Power Systems.
[14] Enrico Zio,et al. Electrical and topological drivers of the cascading failure dynamics in power transmission networks , 2018, Reliab. Eng. Syst. Saf..
[15] Khaled Salah,et al. A User Authentication Scheme of IoT Devices using Blockchain-Enabled Fog Nodes , 2018, 2018 IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA).
[16] Khaled Salah. On the deployment of VoIP in Ethernet networks: methodology and case study , 2006, Comput. Commun..
[17] Xinghuo Yu,et al. Correlation of cascade failures and centrality measures in complex networks , 2017, Future Gener. Comput. Syst..
[18] Yu Meng,et al. A Novel Deployment Scheme for Green Internet of Things , 2014, IEEE Internet of Things Journal.
[19] Kenneth A. Loparo,et al. Cascading Failure Attacks in the Power System: A Stochastic Game Perspective , 2017, IEEE Internet of Things Journal.
[20] Khaled Salah,et al. Impact of CPU Utilization Thresholds and Scaling Size on Autoscaling Cloud Resources , 2013, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science.
[21] Bin Liu,et al. The critical load of scale-free fault-tolerant topology in wireless sensor networks for cascading failures , 2014 .
[22] Giancarlo Fortino,et al. Environment-fusion multipath routing protocol for wireless sensor networks , 2020, Inf. Fusion.
[23] Yongsheng Yang,et al. Modeling and analyzing cascading dynamics of the clustered wireless sensor network , 2019, Reliab. Eng. Syst. Saf..
[24] Liang Chen,et al. A Stochastic Model of Cascading Failure Dynamics in Communication Networks , 2018, IEEE Transactions on Circuits and Systems II: Express Briefs.
[25] Hana Khamfroush,et al. Vulnerability of Interdependent Infrastructures Under Random Attacks , 2019, PERV.
[26] I. Dobson,et al. A LOADING-DEPENDENT MODEL OF PROBABILISTIC CASCADING FAILURE , 2005, Probability in the Engineering and Informational Sciences.
[27] Giancarlo Fortino,et al. A development approach for collective opportunistic Edge-of-Things services , 2019, Inf. Sci..
[28] Adilson E Motter,et al. Cascade-based attacks on complex networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.
[29] Tao Wang,et al. Integrated fault propagation model based vulnerability assessment of the electrical cyber-physical system under cyber attacks , 2019, Reliab. Eng. Syst. Saf..
[30] Liang Zhang,et al. Attack vulnerability of scale-free networks due to cascading failures , 2008 .
[31] Damodar Reddy Edla,et al. Energy efficient load balancing approach for avoiding energy hole problem in WSN using Grey Wolf Optimizer with novel fitness function , 2019, Appl. Soft Comput..