Locating Compromised Data Sources in IoT-Enabled Smart Cities: A Great-Alternative-Region-Based Approach
暂无分享,去创建一个
[1] Elisa Bertino,et al. Botnets and Internet of Things Security , 2017, Computer.
[2] Wuqiong Luo,et al. How to Identify an Infection Source With Limited Observations , 2013, IEEE Journal of Selected Topics in Signal Processing.
[3] Vincent K. N. Lau,et al. Energy-efficient transmission strategy for Cognitive Radio systems , 2012, 2012 IEEE Wireless Communications and Networking Conference Workshops (WCNCW).
[4] Yang Li,et al. SA-PSO based optimizing reader deployment in large-scale RFID Systems , 2015, J. Netw. Comput. Appl..
[5] Mianxiong Dong,et al. RMER: Reliable and Energy-Efficient Data Collection for Large-Scale Wireless Sensor Networks , 2016, IEEE Internet of Things Journal.
[6] Devavrat Shah,et al. Rumors in a Network: Who's the Culprit? , 2009, IEEE Transactions on Information Theory.
[7] Minyi Guo,et al. Joint Optimization of Lifetime and Transport Delay under Reliability Constraint Wireless Sensor Networks , 2016, IEEE Transactions on Parallel and Distributed Systems.
[8] Dina S. Deif,et al. Classification of Wireless Sensor Networks Deployment Techniques , 2014, IEEE Communications Surveys & Tutorials.
[9] R. C. Luo,et al. Wireless and Pyroelectric Sensory Fusion System for Indoor Human/Robot Localization and Monitoring , 2013, IEEE/ASME Transactions on Mechatronics.
[10] Christos V. Verikoukis,et al. Misbehavior detection in the Internet of Things: A network-coding-aware statistical approach , 2016, 2016 IEEE 14th International Conference on Industrial Informatics (INDIN).
[11] Hsiao-Hwa Chen,et al. Sensing-Energy Tradeoff in Cognitive Radio Networks With Relays , 2013, IEEE Systems Journal.
[12] Mianxiong Dong,et al. Reliability guaranteed efficient data gathering in wireless sensor networks , 2015, IEEE Access.
[13] Andrea Vitaletti,et al. Smart City: An Event Driven Architecture for Monitoring Public Spaces with Heterogeneous Sensors , 2010, 2010 Fourth International Conference on Sensor Technologies and Applications.
[14] Martin Vetterli,et al. Locating the Source of Diffusion in Large-Scale Networks , 2012, Physical review letters.
[15] Mo-Yuen Chow,et al. Attack detection and mitigation for resilient distributed DC optimal power flow in the IoT environment , 2016, 2016 IEEE 25th International Symposium on Industrial Electronics (ISIE).
[16] Meie Shen,et al. Optimizing RFID Network Planning by Using a Particle Swarm Optimization Algorithm With Redundant Reader Elimination , 2012, IEEE Transactions on Industrial Informatics.
[17] Mianxiong Dong,et al. ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks , 2016, IEEE Transactions on Information Forensics and Security.