暂无分享,去创建一个
[1] R. Plemmons,et al. Comparison of Some Direct Methods for Computing Stationary Distributions of Markov Chains , 1984 .
[2] Carlos F. Daganzo,et al. Fundamentals of Transportation and Traffic Operations , 1997 .
[3] Dawn M. Cappelli,et al. Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors , 2005 .
[4] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[5] Panagiotis Papadimitratos,et al. Secure vehicular communication systems: implementation, performance, and research challenges , 2008, IEEE Communications Magazine.
[6] Tansu Alpcan,et al. Security games for vehicular networks , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.
[7] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2009, CCS.
[8] Peter Palensky,et al. Demand Side Management: Demand Response, Intelligent Energy Systems, and Smart Loads , 2011, IEEE Transactions on Industrial Informatics.
[9] Zhu Han,et al. Game Theory in Wireless and Communication Networks: Theory, Models, and Applications , 2011 .
[10] Mahshid Rahnamay-Naeini,et al. On the role of power-grid and communication-system interdependencies on cascading failures , 2013, 2013 IEEE Global Conference on Signal and Information Processing.
[11] Quanyan Zhu,et al. Dependable Demand Response Management in the Smart Grid: A Stackelberg Game Approach , 2013, IEEE Transactions on Smart Grid.
[12] Bo Hu,et al. A Vision of IoT: Applications, Challenges, and Opportunities With China Perspective , 2014, IEEE Internet of Things Journal.
[13] Meixia Tao,et al. Stochastic Throughput Optimization for Two-Hop Systems With Finite Relay Buffers , 2014, IEEE Transactions on Signal Processing.
[14] Jonathan Loo,et al. Real-Time Detection of Denial-of-Service Attacks in IEEE 802.11p Vehicular Networks , 2014, IEEE Communications Letters.
[15] Arunabha Sen,et al. Root Cause Analysis of Failures in Interdependent Power-Communication Networks , 2014, 2014 IEEE Military Communications Conference.
[16] Min Ouyang,et al. Review on modeling and simulation of interdependent critical infrastructure systems , 2014, Reliab. Eng. Syst. Saf..
[17] Walid Saad,et al. Contract-Theoretic Resource Allocation for Critical Infrastructure Protection , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).
[18] Eytan Modiano,et al. Mitigating cascading failures in interdependent power grids and communication networks , 2014, 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[19] Haibo He,et al. Cyber-physical attacks and defences in the smart grid: a survey , 2016, IET Cyper-Phys. Syst.: Theory & Appl..
[20] Anna Scaglione,et al. Micro Synchrophasor-Based Intrusion Detection in Automated Distribution Systems: Toward Critical Infrastructure Security , 2016, IEEE Internet Computing.
[21] Saurabh Amin,et al. Vulnerability of Transportation Networks to Traffic-Signal Tampering , 2016, 2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS).
[22] Bowen Zheng,et al. Timing and security analysis of VANET-based intelligent transportation systems: (Invited paper) , 2017, 2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[23] Zhili Sun,et al. Blockchain-Based Dynamic Key Management for Heterogeneous Intelligent Transportation Systems , 2017, IEEE Internet of Things Journal.
[24] Sneha A. Dalvi,et al. Internet of Things for Smart Cities , 2017 .
[25] Walid Saad,et al. Colonel Blotto Game for Secure State Estimation in Interdependent Critical Infrastructure , 2017, ArXiv.
[26] Walid Saad,et al. Game theory for secure critical interdependent gas-power-water infrastructure , 2017, 2017 Resilience Week (RWS).
[27] Walid Saad,et al. Robust Deep Reinforcement Learning for Security and Safety in Autonomous Vehicle Systems , 2018, 2018 21st International Conference on Intelligent Transportation Systems (ITSC).
[28] Walid Saad,et al. Generalized Colonel Blotto Game , 2017, 2018 Annual American Control Conference (ACC).
[29] Harpreet S. Dhillon,et al. Coverage Analysis of a Vehicular Network Modeled as Cox Process Driven by Poisson Line Process , 2017, IEEE Transactions on Wireless Communications.
[30] Jiajing Wu,et al. Robustness of Interdependent Power Grids and Communication Networks: A Complex Network Perspective , 2018, IEEE Transactions on Circuits and Systems II: Express Briefs.
[31] Walid Saad,et al. Joint Communication and Control for Wireless Autonomous Vehicular Platoon Systems , 2018, IEEE Transactions on Communications.
[32] Walid Saad,et al. Beyond 5G With UAVs: Foundations of a 3D Wireless Cellular Network , 2018, IEEE Transactions on Wireless Communications.
[33] Walid Saad,et al. Cyber-Physical Security and Safety of Autonomous Connected Vehicles: Optimal Control Meets Multi-Armed Bandit Learning , 2018, IEEE Transactions on Communications.
[34] Walid Saad,et al. Deep Learning for Reliable Mobile Edge Analytics in Intelligent Transportation Systems: An Overview , 2017, IEEE Vehicular Technology Magazine.
[35] Feng Wang,et al. Backup Battery Analysis and Allocation against Power Outage for Cellular Base Stations , 2019, IEEE Transactions on Mobile Computing.
[36] Walid Saad,et al. A Vision of 6G Wireless Systems: Applications, Trends, Technologies, and Open Research Problems , 2019, IEEE Network.
[37] Walid Saad,et al. Drones in Distress: A Game-Theoretic Countermeasure for Protecting UAVs Against GPS Spoofing , 2019, IEEE Internet of Things Journal.
[38] Walid Saad,et al. Resilient critical infrastructure: Bayesian network analysis and contract-Based optimization , 2017, Reliab. Eng. Syst. Saf..