Defending jamming attack in wide-area monitoring system for smart grid
暂无分享,去创建一个
Meikang Qiu | Hai Su | Xiao Qin | Zonghua Gu | Zhong Ming | Jianwei Niu | J. Niu | Meikang Qiu | X. Qin | Zhong Ming | Z. Gu | Hai Su
[1] Bhaskar Krishnamachari,et al. On myopic sensing for multi-channel opportunistic access: structure, optimality, and performance , 2007, IEEE Transactions on Wireless Communications.
[2] Zhe Chen,et al. Cognitive Radio for Smart Grid: Theory, Algorithms, and Security , 2011, Int. J. Digit. Multim. Broadcast..
[3] Meikang Qiu,et al. Secure wireless communication system for smart grid with rechargeable electric vehicles , 2012, IEEE Communications Magazine.
[4] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[5] Min Chen,et al. Energy Efficient Security Algorithm for Power Grid Wide Area Monitoring System , 2011, IEEE Transactions on Smart Grid.
[6] Todd E. Humphreys,et al. Assessing the spoofing threat , 2009 .
[7] Meikang Qiu,et al. Cost minimization while satisfying hard/soft timing constraints for heterogeneous embedded systems , 2009, TODE.
[8] Tamás Linder,et al. The On-Line Shortest Path Problem Under Partial Monitoring , 2007, J. Mach. Learn. Res..
[9] A. Ghassemi,et al. Cognitive Radio for Smart Grid Communications , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[10] Srdjan Capkun,et al. Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[11] Athanasios V. Vasilakos,et al. Joint Forensics-Scheduling Strategy for Delay-Sensitive Multimedia Applications over Heterogeneous Networks , 2011, IEEE Journal on Selected Areas in Communications.
[12] Wei Tu,et al. Distributed scheduling scheme for video streaming over multi-channel multi-radio multi-hop wireless networks , 2010, IEEE Journal on Selected Areas in Communications.
[13] Panagiotis Papadimitratos,et al. Secure data communication in mobile ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.
[14] Hsiao-Hwa Chen,et al. On Distributed Multimedia Scheduling With Constrained Control Channels , 2011, IEEE Transactions on Multimedia.
[15] Guy Pujolle,et al. Downlink resource allocation strategies for OFDMA based mobile WiMAX , 2010, Telecommun. Syst..