Optimal Secure Two-Layer IoT Network Design
暂无分享,去创建一个
[1] Qiang Chen,et al. Value-centric design of the internet-of-things solution for food supply chain: Value creation, sensor portfolio and information fusion , 2012, Information Systems Frontiers.
[2] Nicholas Hopper,et al. Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks , 2013, IEEE Transactions on Mobile Computing.
[3] Rolf H. Weber,et al. Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..
[4] Quanyan Zhu,et al. A Linear Quadratic Differential Game Approach to Dynamic Contract Design for Systemic Cyber Risk Management under Asymmetric Information , 2018, 2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[5] Jianbin Zhang,et al. An IoT-based appliance control system for smart homes , 2013, 2013 Fourth International Conference on Intelligent Control and Information Processing (ICICIP).
[6] Quanyan Zhu,et al. Interdependent strategic cyber defense and robust switching control design for wind energy systems , 2017, 2017 IEEE Power & Energy Society General Meeting.
[7] Steeve Zozor,et al. 2D time-frequency interference modelling using stochastic geometry for performance evaluation in Low-Power Wide-Area Networks , 2016, 2017 IEEE International Conference on Communications (ICC).
[8] Quanyan Zhu,et al. Game-Theoretic Approach to Feedback-Driven Multi-stage Moving Target Defense , 2013, GameSec.
[9] Quanyan Zhu,et al. Secure and Resilient Control Design for Cloud Enabled Networked Control Systems , 2015, CPS-SPC '15.
[10] Quanyan Zhu,et al. Secure and reconfigurable network design for critical information dissemination in the Internet of battlefield things (IoBT) , 2017, 2017 15th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt).
[11] Yuguang Fang,et al. Securing wireless sensor networks: a survey , 2008, IEEE Communications Surveys & Tutorials.
[12] Quanyan Zhu,et al. Security investment under cognitive constraints: A Gestalt Nash equilibrium approach , 2018, 2018 52nd Annual Conference on Information Sciences and Systems (CISS).
[13] Amitav Mukherjee,et al. Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints , 2015, Proceedings of the IEEE.
[14] Loukas Lazos,et al. Selective jamming/dropping insider attacks in wireless mesh networks , 2011, IEEE Network.
[15] Saswati Sarkar,et al. Maximum Damage Battery Depletion Attack in Mobile Sensor Networks , 2011, IEEE Transactions on Automatic Control.
[16] Liang Zhou,et al. Multimedia traffic security architecture for the internet of things , 2011, IEEE Network.
[17] Corinne Touati,et al. Optimal Design and Defense of Networks Under Link Attacks , 2017 .
[18] Quanyan Zhu,et al. Resilient and decentralized control of multi-level cooperative mobile networks to maintain connectivity under adversarial environment , 2015, 2016 IEEE 55th Conference on Decision and Control (CDC).
[19] Quanyan Zhu,et al. A factored MDP approach to optimal mechanism design for resihent large-scale interdependent critical infrastructures , 2017, 2017 Workshop on Modeling and Simulation of Cyber-Physical Energy Systems (MSCPES).
[20] Jonathan L. Gross,et al. Handbook of graph theory , 2007, Discrete mathematics and its applications.
[21] F. Harary. THE MAXIMUM CONNECTIVITY OF A GRAPH. , 1962, Proceedings of the National Academy of Sciences of the United States of America.
[22] Quanyan Zhu,et al. A Large-Scale Markov Game Approach to Dynamic Protection of Interdependent Infrastructure Networks , 2017, GameSec.
[23] Quanyan Zhu,et al. iSTRICT: An Interdependent Strategic Trust Mechanism for the Cloud-Enabled Internet of Controlled Things , 2018, IEEE Transactions on Information Forensics and Security.
[24] Quanyan Zhu,et al. Heterogeneous Multi-Layer Adversarial Network Design for the IoT-Enabled Infrastructures , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.
[25] Niraj K. Jha,et al. A Comprehensive Study of Security of Internet-of-Things , 2017, IEEE Transactions on Emerging Topics in Computing.
[26] Adrian Perrig,et al. Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[27] Quanyan Zhu,et al. Security as a Service for Cloud-Enabled Internet of Controlled Things Under Advanced Persistent Threats: A Contract Design Approach , 2017, IEEE Transactions on Information Forensics and Security.
[28] Quanyan Zhu,et al. Optimal Contract Design Under Asymmetric Information for Cloud-Enabled Internet of Controlled Things , 2016, GameSec.
[29] Quanyan Zhu,et al. DISTRIBUTED AND OPTIMAL RESILIENT PLANNING OF LARGE-SCALE INTERDEPENDENT CRITICAL INFRASTRUCTURES , 2018, 2018 Winter Simulation Conference (WSC).
[30] Quanyan Zhu,et al. A Dynamic Game Analysis and Design of Infrastructure Network Protection and Recovery: 125 , 2017, PERV.
[31] Quanyan Zhu,et al. Factored markov game theory for secure interdependent infrastructure networks , 2018 .
[32] Mashrur Chowdhury,et al. Vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication in a heterogeneous wireless network – Performance evaluation , 2016 .
[33] Marcin Dziubinski,et al. Network Design and Defence , 2012, Games Econ. Behav..
[34] Quanyan Zhu,et al. Interdependent Strategic Security Risk Management With Bounded Rationality in the Internet of Things , 2019, IEEE Transactions on Information Forensics and Security.
[35] Quanyan Zhu,et al. Interdependent network formation games with an application to critical infrastructures , 2016, 2016 American Control Conference (ACC).
[36] Geir M. Køien,et al. Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks , 2015, J. Cyber Secur. Mobil..
[37] Yee Wei Law,et al. Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols , 2005, TOSN.