APPLICATION OF WIRELESS SENSOR NETWORKS IN CRITICAL INFRASTRUCTURE PROTECTION : CHALLENGES AND DESIGN OPTIONS
暂无分享,去创建一个
[1] William H. Cunningham,et al. Optimal attack and reinforcement of a network , 1985, JACM.
[2] Vinod M. Prabhakaran,et al. Decentralized erasure codes for distributed networked storage , 2006, IEEE Transactions on Information Theory.
[3] Shivakant Mishra,et al. Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks , 2006, Pervasive Mob. Comput..
[4] Baochun Li,et al. Data Persistence in Large-Scale Sensor Networks with Decentralized Fountain Codes , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[5] Hovav Shacham,et al. When good instructions go bad: generalizing return-oriented programming to RISC , 2008, CCS.
[6] Levente Buttyán,et al. Private cluster head election in wireless sensor networks , 2009, 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems.
[7] Claudio Soriente,et al. On the difficulty of software-based attestation of embedded devices , 2009, CCS.
[8] Aurélien Francillon,et al. Attacking and Protecting Constrained Embedded Systems from Control Flow Attacks , 2009 .