Resource Optimization Techniques and Security Levels for Wireless Sensor Networks Based on the ARSy Framework
暂无分享,去创建一个
[1] Zbigniew Kotulski,et al. Adaptable security mechanism for dynamic environments , 2007, Comput. Secur..
[2] Mani Srivastava,et al. Energy-aware wireless microsensor networks , 2002, IEEE Signal Process. Mag..
[3] Athanasios V. Vasilakos,et al. Secure Smart Homes , 2017, ACM Comput. Surv..
[4] Ms.C Ir. Supeno Djanali. ANALISA KINERJA RESOURCE-AWARE FRAMEWORK PADA ALGORITMA LIGHT-WEIGHT FREQUENT ITEM (LWF) , 2010 .
[5] Mohamed Medhat Gaber,et al. Enabling Resource-Awareness for In-Network Data Processing in Wireless Sensor Networks , 2008, ADC.
[6] Mike Cook,et al. Raspberry Pi For Dummies , 2013 .
[7] Xiao Qin,et al. SAREC: a security-aware scheduling strategy for real-time applications on clusters , 2005, 2005 International Conference on Parallel Processing (ICPP'05).
[8] Yacine Challal,et al. Energy efficiency in wireless sensor networks: A top-down survey , 2014, Comput. Networks.
[9] Kun Liu,et al. VEDAS: A Mobile and Distributed Data Stream Mining System for Real-Time Vehicle Monitoring , 2004, SDM.
[10] Charless C. Fowlkes,et al. Diamond Eye: a distributed architecture for image data mining , 1999, Defense, Security, and Sensing.
[11] Jörgen Hansson,et al. An adaptable security manager for real-time transactions , 2000, Proceedings 12th Euromicro Conference on Real-Time Systems. Euromicro RTS 2000.
[12] Zbigniew Kotulski,et al. Adaptive Approach to Network Security , 2009, CN.
[13] Mohamed Medhat Gaber,et al. Adaptive mining techniques for data streams using algorithm output granularity , 2003 .
[14] David E. Culler,et al. System architecture for wireless sensor networks , 2003 .
[15] Ruoming Jin,et al. Frequent Pattern Mining in Data Streams , 2007, Frequent Pattern Mining.
[16] Ishikawa,et al. A Model of Security Adaptation for Limited Resources in Wireless Sensor Network , 2017 .
[17] Alessio Merlo,et al. The energy impact of security mechanisms in modern mobile devices , 2012, Netw. Secur..
[18] Kahina Chelli,et al. Security Issues in Wireless Sensor Networks : Attacks and Countermeasures , 2015 .
[19] Mohamed Medhat Gaber,et al. Resource-aware Online Data Mining in Wireless Sensor Networks , 2007, 2007 IEEE Symposium on Computational Intelligence and Data Mining.
[20] Biswanath Mukherjee,et al. Wireless sensor network survey , 2008, Comput. Networks.
[21] Mohammad Alshayeb,et al. EVE: On-Board Process Planning and Execution , 2002 .
[22] Mohamed Medhat Gaber,et al. A Survey of Classification Methods in Data Streams , 2007, Data Streams - Models and Algorithms.
[23] George Mastorakis,et al. On cohabitating networking technologies with common wireless access for home automation system purposes , 2016, IEEE Wireless Communications.
[24] Lajos Hanzo,et al. A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.
[25] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[26] Muhammad Ilyas Syarif,et al. Performance analysis of resource-aware framework classification, clustering and frequent items in wireless sensor networks , 2011, Proceeding of the International Conference on e-Education, Entertainment and e-Management.
[27] Charu C. Aggarwal,et al. Data Streams - Models and Algorithms , 2014, Advances in Database Systems.
[28] Philip S. Yu,et al. On Clustering Massive Data Streams: A Summarization Paradigm , 2007, Data Streams - Models and Algorithms.
[29] Archana Bharathidasan,et al. Sensor Networks : An Overview , 2002 .
[30] Jaydip Sen,et al. A Survey on Wireless Sensor Network Security , 2009, Int. J. Commun. Networks Inf. Secur..
[31] A. Tomlinson. POWER , 1998, The Palgrave Encyclopedia of Imperialism and Anti-Imperialism.
[32] Philip S. Yu,et al. A framework for resource-aware knowledge discovery in data streams: a holistic approach with its application to clustering , 2006, SAC '06.
[33] Alessio Merlo,et al. What is Green Security? , 2011, 2011 7th International Conference on Information Assurance and Security (IAS).
[34] Habib F. Rashvand,et al. Wireless sensor systems for extreme environments : space, underwater, underground and industrial , 2017 .
[35] Ke Shi,et al. Data Mining Techniques for Wireless Sensor Networks: A Survey , 2013, Int. J. Distributed Sens. Networks.
[36] Srivaths Ravi,et al. A study of the energy consumption characteristics of cryptographic algorithms and security protocols , 2006, IEEE Transactions on Mobile Computing.
[37] Mikael Gidlund,et al. Wireless Coexistence between IEEE 802.11- and IEEE 802.15.4-Based Networks: A Survey , 2011, Int. J. Distributed Sens. Networks.