Anomaly Detection in RFID Networks Using Bayesian Blocks and DBSCAN
暂无分享,去创建一个
Patrick Kreidl | Zornitza Genova Prodanoff | Andrew Penkunas | Z. Prodanoff | Patrick Kreidl | Andrew Penkunas
[1] S. Promwong,et al. Indoor measurement and modeling of RFID transmission loss at 5.8 GHz with human body , 2008, 2008 5th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology.
[2] Michael Smith,et al. Quantitative comparison of indoor RFID channel models using bootstrap techniques , 2014, 2014 IEEE Wireless Communications and Networking Conference (WCNC).
[3] Gang Li,et al. Bandwidth dependence of CW ranging to UHF RFID tags in severe multipath environments , 2011, 2011 IEEE International Conference on RFID.
[4] Al Alkadi,et al. Piece-wise constant models for RFID traffic , 2016, 2016 IEEE International Conference on RFID Technology and Applications (RFID-TA).
[5] Ernst Haselsteiner. Security in Near Field Communication ( NFC ) Strengths and Weaknesses , 2006 .
[6] Cheng-Xiang Wang,et al. Channel Modeling of Information Transmission Over Cognitive Interrogator-Sensor Networks , 2011, IEEE Transactions on Vehicular Technology.
[7] Franz Aurenhammer,et al. Voronoi diagrams—a survey of a fundamental geometric data structure , 1991, CSUR.
[8] M. Pecht,et al. A Wireless Sensor System for Prognostics and Health Management , 2010, IEEE Sensors Journal.
[9] J. Scargle. Bayesian Blocks: Divide and Conquer, MCMC, and Cell Coalescence Approaches , 2000, physics/0009033.
[10] Tiago M. Fernández-Caramés,et al. Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications , 2016, Sensors.
[11] Hongmei Chi,et al. Evaluation of Two RFID Traffic Models with Potential in Anomaly Detection , 2018, SoutheastCon 2018.
[12] Jürgen Götze,et al. Modeling and simulation of MISO diversity for UHF RFID communication , 2012, 2012 Federated Conference on Computer Science and Information Systems (FedCSIS).
[13] R. Khan,et al. Sequential Tests of Statistical Hypotheses. , 1972 .
[14] Klaus Witrisal,et al. UWB channel sounding for ranging and positioning in passive UHF RFID , 2010 .
[15] Jianhua Guo,et al. Collaborative RFID intrusion detection with an artificial immune system , 2011, Journal of Intelligent Information Systems.