Performance Assessment of Data and Time-Sensitive Wireless Distributed Networked-Control-Systems in Presence of Information Security
暂无分享,去创建一个
[1] Songwu Lu,et al. Securing a Wireless World , 2006, Proceedings of the IEEE.
[2] Wenye Wang,et al. Characterization of data-sensitive wireless distributed networked-control-systems , 2007, 2007 IEEE/ASME international conference on advanced intelligent mechatronics.
[3] Srivaths Ravi,et al. Optimizing public-key encryption for wireless clients , 2002, 2002 IEEE International Conference on Communications. Conference Proceedings. ICC 2002 (Cat. No.02CH37333).
[4] Weiming Shen,et al. Nrc Publications Archive (nparc) Archives Des Publications Du Cnrc (nparc) Distributed Device Networks with Security Constraints Distributed Device Networks with Security Constraints* Distributed Device Networks with Security Constraints , 2022 .
[5] Hideki Hashimoto,et al. Path tracking control of mobile robots using a quadratic curve , 1996, Proceedings of Conference on Intelligent Vehicles.
[6] Chi-Ho Tsang,et al. Multi-agent intrusion detection system in industrial network using ant colony clustering approach and unsupervised feature extraction , 2005, 2005 IEEE International Conference on Industrial Technology.
[7] E.J. Byres,et al. Industrial cybersecurity for power system and SCADA networks , 2005, Record of Conference Papers Industry Applications Society 52nd Annual Petroleum and Chemical Industry Conference.
[8] Mo-Yuen Chow,et al. Gain scheduler middleware: a methodology to enable existing controllers for networked control and teleoperation - part I: networked control , 2004, IEEE Transactions on Industrial Electronics.
[9] David A. Wagner,et al. Intercepting mobile communications: the insecurity of 802.11 , 2001, MobiCom '01.
[10] A T Karygiannis,et al. Wireless Network Security: 802.11, Bluetooth and Handheld Devices , 2002 .
[11] Zheng Li,et al. Intelligent space with time sensitive applications , 2005, Proceedings, 2005 IEEE/ASME International Conference on Advanced Intelligent Mechatronics..
[12] Wenye Wang,et al. Measuring performance impact of security protocols in wireless local area networks , 2005, 2nd International Conference on Broadband Networks, 2005..