Resilient wireless sensor networks for cyber-physical systems
暂无分享,去创建一个
[1] S. Shankar Sastry,et al. Safe and Secure Networked Control Systems under Denial-of-Service Attacks , 2009, HSCC.
[2] S. Haykin. Kalman Filtering and Neural Networks , 2001 .
[3] Shreyas Sundaram,et al. Resilient Asymptotic Consensus in Robust Networks , 2013, IEEE Journal on Selected Areas in Communications.
[4] Lang Tong,et al. Distributed Detection in the Presence of Byzantine Attacks , 2009, IEEE Transactions on Signal Processing.
[5] Xavier Litrico,et al. Cyber Security of Water SCADA Systems—Part I: Analysis and Experimentation of Stealthy Deception Attacks , 2013, IEEE Transactions on Control Systems Technology.
[6] Levente Buttyán,et al. Designing robust network topologies for wireless sensor networks in adversarial environments , 2013, Pervasive Mob. Comput..
[7] Qi Qi,et al. Wireless sensor networks in intelligent transportation systems , 2009 .
[8] Sencun Zhu,et al. Improving sensor network immunity under worm attacks: A software diversity approach , 2016, Ad Hoc Networks.
[9] Pramod K. Varshney,et al. Distributed Inference with Byzantine Data: State-of-the-Art Review on Data Falsification Attacks , 2013, IEEE Signal Processing Magazine.
[10] H. Vincent Poor,et al. Smart Meter Privacy: A Theoretical Framework , 2013, IEEE Transactions on Smart Grid.
[11] David A. Wagner,et al. Resilient aggregation in sensor networks , 2004, SASN '04.
[12] D. Kushner,et al. The real story of stuxnet , 2013, IEEE Spectrum.
[13] Yevgeniy Vorobeychik,et al. Resilient consensus protocol in the presence of trusted nodes , 2014, 2014 7th International Symposium on Resilient Control Systems (ISRCS).
[14] Xavier Litrico,et al. Stealthy deception attacks on water SCADA systems , 2010, HSCC '10.
[15] Patrick D. McDaniel,et al. Security and Privacy Challenges in the Smart Grid , 2009, IEEE Security & Privacy.
[16] Magnus Egerstedt,et al. Robust Graph Topologies for Networked Systems , 2012 .
[17] Gerhard P. Hancke,et al. Opportunities and Challenges of Wireless Sensor Networks in Smart Grid , 2010, IEEE Transactions on Industrial Electronics.
[18] J. Alex Halderman,et al. Green Lights Forever: Analyzing the Security of Traffic Infrastructure , 2014, WOOT.
[19] Abhimanyu Das,et al. Algorithms for subset selection in linear regression , 2008, STOC.
[20] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[21] Yu-Chee Tseng,et al. Distributed Deployment Schemes for Mobile Wireless Sensor Networks to Ensure Multilevel Coverage , 2008 .
[22] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[23] Cem Ersoy,et al. Wireless sensor networks for healthcare: A survey , 2010, Comput. Networks.
[24] Ying Sun,et al. Gaussian Processes for Short-Term Traffic Volume Forecasting , 2010 .
[25] Yang Xiang,et al. Modeling the Propagation of Worms in Networks: A Survey , 2014, IEEE Communications Surveys & Tutorials.
[26] Carl E. Rasmussen,et al. Gaussian processes for machine learning , 2005, Adaptive computation and machine learning.
[27] Siddharth Sridhar,et al. Cyber–Physical System Security for the Electric Power Grid , 2012, Proceedings of the IEEE.
[28] Reza Olfati-Saber,et al. Distributed Kalman filtering for sensor networks , 2007, 2007 46th IEEE Conference on Decision and Control.
[29] Adrian Perrig,et al. Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[30] Elisa Bertino,et al. Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks , 2015, IEEE Transactions on Dependable and Secure Computing.
[31] Qijun Gu,et al. A study of self-propagating mal-packets in sensor networks: Attacks and defenses , 2011, Comput. Secur..
[32] Paolo Santi. Topology control in wireless ad hoc and sensor networks , 2005 .
[33] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2011, TSEC.
[34] Sarit Kraus,et al. Robust solutions to Stackelberg games: Addressing bounded rationality and limited observations in human cognition , 2010, Artif. Intell..
[35] Scott F. Midkiff,et al. Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses , 2008, IEEE Pervasive Computing.
[36] Jaime Lloret,et al. A Survey on Electric Power Demand Forecasting: Future Trends in Smart Grids, Microgrids and Smart Buildings , 2014, IEEE Communications Surveys & Tutorials.
[37] Shreyas Sundaram,et al. Distributed Function Calculation via Linear Iterative Strategies in the Presence of Malicious Agents , 2011, IEEE Transactions on Automatic Control.
[38] J. Shamma,et al. Belief consensus and distributed hypothesis testing in sensor networks , 2006 .
[39] S. Shankar Sastry,et al. Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.
[40] Tin Kam Ho,et al. Demand forecasting in smart grids , 2014, Bell Labs Technical Journal.
[41] JAMAL N. AL-KARAKI,et al. Routing techniques in wireless sensor networks: a survey , 2004, IEEE Wireless Communications.
[42] Mihaela Cardei,et al. Coverage in Wireless Sensor Networks , 2004, Handbook of Sensor Networks.
[43] Yong Wang,et al. A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.
[44] Bruno Sinopoli,et al. Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[45] Saman A. Zonouz,et al. A Multi-Sensor Energy Theft Detection Framework for Advanced Metering Infrastructures , 2013, IEEE Journal on Selected Areas in Communications.
[46] Wenyuan Xu,et al. Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.
[47] Mohamed F. Younis,et al. A survey on routing protocols for wireless sensor networks , 2005, Ad Hoc Networks.
[48] Shivakant Mishra,et al. A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks , 2003, IPSN.
[49] Bruno Sinopoli,et al. Detecting Integrity Attacks on SCADA Systems , 2011 .
[50] John Anderson,et al. Wireless sensor networks for habitat monitoring , 2002, WSNA '02.
[51] Claude Castelluccia,et al. Code injection attacks on harvard-architecture devices , 2008, CCS.
[52] Mohamed F. Younis,et al. Strategies and techniques for node placement in wireless sensor networks: A survey , 2008, Ad Hoc Networks.
[53] Bruno Sinopoli,et al. False Data Injection Attacks in Electricity Markets , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[54] Krishnendu Chakrabarty,et al. Sensor placement for effective coverage and surveillance in distributed sensor networks , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..
[55] Edward A. Lee. Cyber Physical Systems: Design Challenges , 2008, 2008 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC).
[56] Yu-Chee Tseng,et al. Pervasive and Mobile Computing ( ) – Pervasive and Mobile Computing Review from Wireless Sensor Networks towards Cyber Physical Systems , 2022 .
[57] Byung-rak Son,et al. A Design and Implementation of Forest-Fires Surveillance System based on Wireless Sensor Networks for South Korea Mountains , 2006 .
[58] Anthony H. Dekker,et al. Network Robustness and Graph Topology , 2004, ACSC.
[59] Jie Gao,et al. Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[60] Ronitt Rubinfeld,et al. Efficient algorithms for learning to play repeated games against computationally bounded adversaries , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.
[61] S. Shankar Sastry,et al. Game-Theoretic Models of Electricity Theft Detection in Smart Utility Networks: Providing New Capabilities with Advanced Metering Infrastructure , 2015, IEEE Control Systems.
[62] Elaine Shi,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[63] Yehoshua Bar-Hillel,et al. The Intrinsic Computational Difficulty of Functions , 1969 .
[64] Michael J Demetsky,et al. TRAFFIC FLOW FORECASTING: COMPARISON OF MODELING APPROACHES , 1997 .
[65] Radha Poovendran,et al. A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks , 2007, Wirel. Networks.
[66] Xi Fang,et al. 3. Full Four-channel 6.3-gb/s 60-ghz Cmos Transceiver with Low-power Analog and Digital Baseband Circuitry 7. Smart Grid — the New and Improved Power Grid: a Survey , 2022 .
[67] George Danezis,et al. Privacy-preserving smart metering , 2011, WPES '11.