Transmission Early-Stopping Scheme for Anti-Jamming Over Delay-Sensitive IoT Applications
暂无分享,去创建一个
[1] Xinyu Yang,et al. A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.
[2] Xin Liu,et al. Performance of IEEE 802.11 under Jamming , 2008, Mobile Networks and Applications.
[3] Longfei Wu,et al. A Survey on Security and Privacy Issues in Internet-of-Things , 2017, IEEE Internet of Things Journal.
[4] Srdjan Capkun,et al. Detection of Reactive Jamming in Sensor Networks , 2009 .
[5] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[6] Ricardo J. Rodríguez,et al. Survivability Model for Security and Dependability Analysis of a Vulnerable Critical System , 2018, 2018 27th International Conference on Computer Communication and Networks (ICCCN).
[7] L. Scharf,et al. Statistical Signal Processing: Detection, Estimation, and Time Series Analysis , 1991 .
[8] Andrea Bobbio,et al. Reliability and Availability Engineering - Modeling, Analysis, and Applications , 2017 .
[9] Shi Jin,et al. Optimal Jamming Attack Strategy Against Wireless State Estimation: A Game Theoretic Approach , 2018, IECON 2018 - 44th Annual Conference of the IEEE Industrial Electronics Society.
[10] A. Girotra,et al. Performance Analysis of the IEEE 802 . 11 Distributed Coordination Function , 2005 .
[11] Bo Yu,et al. An improved detection method for different types of jamming attacks in wireless networks , 2014, The 2014 2nd International Conference on Systems and Informatics (ICSAI 2014).
[12] Ziyuan Cai,et al. A New Model-Based Method to Detect Radio Jamming Attack to Wireless Networks , 2015, 2015 IEEE Globecom Workshops (GC Wkshps).
[13] Mohsen Guizani,et al. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.
[14] Hang Liu,et al. Modeling and performance evaluation of jamming-tolerant wireless systems , 2019, J. Ambient Intell. Humaniz. Comput..
[15] Sajjad Hussain Shah,et al. A survey: Internet of Things (IOT) technologies, applications and challenges , 2016, 2016 IEEE Smart Energy Grid Engineering (SEGE).
[16] Moussa Ayyash,et al. Spectrum Assignment in Cognitive Radio Networks for Internet-of-Things Delay-Sensitive Applications Under Jamming Attacks , 2018, IEEE Internet of Things Journal.
[17] Sailes K. Sengijpta. Fundamentals of Statistical Signal Processing: Estimation Theory , 1995 .
[18] Zhuo Lu,et al. From jammer to gambler: Modeling and detection of jamming attacks against time-critical traffic , 2011, 2011 Proceedings IEEE INFOCOM.
[19] Kishor S. Trivedi. Probability and Statistics with Reliability, Queuing, and Computer Science Applications , 1984 .
[20] E. Veronica Belmega,et al. Mitigating Jamming Attacks Using Energy Harvesting , 2019, IEEE Wireless Communications Letters.
[21] H. Vincent Poor,et al. An introduction to signal detection and estimation (2nd ed.) , 1994 .
[22] K. J. Ray Liu,et al. Optimal Defense against Jamming Attacks in Cognitive Radio Networks Using the Markov Decision Process Approach , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[23] Zhuo Lu,et al. Modeling, Evaluation and Detection of Jamming Attacks in Time-Critical Wireless Applications , 2014, IEEE Transactions on Mobile Computing.
[24] Mikael Gidlund,et al. A Delay-Bounded MAC Protocol for Mission- and Time-Critical Applications in Industrial Wireless Sensor Networks , 2018, IEEE Sensors Journal.
[25] Sanjay E. Sarma,et al. The Future Internet of Things: Secure, Efficient, and Model-Based , 2017, IEEE Internet of Things Journal.
[26] Radha Poovendran,et al. Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[27] Jim Kurose,et al. Computer Networking: A Top-Down Approach (6th Edition) , 2007 .
[28] Donggang Liu,et al. Fast jamming detection in sensor networks , 2012, 2012 IEEE International Conference on Communications (ICC).
[29] Kishor S. Trivedi,et al. Transient performance & availability modeling in high volume outpatient clinics , 2017, 2017 Annual Reliability and Maintainability Symposium (RAMS).
[30] Giancarlo Fortino,et al. Evaluating Critical Security Issues of the IoT World: Present and Future Challenges , 2018, IEEE Internet of Things Journal.
[31] David L Adamy,et al. Ew 101: A First Course in Electronic Warfare , 2001 .