Formalism of security properties for battlefield surveillance system
暂无分享,去创建一个
[1] Peter Gorm Larsen,et al. VDMTools: advances in support for formal modeling in VDM , 2008, SIGP.
[2] Nick Battle,et al. The overture initiative integrating tools for VDM , 2010, ACM SIGSOFT Softw. Eng. Notes.
[3] Nazir Ahmad Zafar,et al. Towards Formalism of Earthquake Detection and Disaster Reduction Using WSANs , 2016, 2016 International Conference on Frontiers of Information Technology (FIT).
[4] Nazir Ahmad Zafar,et al. Battlefield surveillance formalism using WSANs , 2017, 2017 International Conference on Electrical Engineering (ICEE).
[5] Ping Sun,et al. Design Proposal of Self-Powered WSN Node for Battle Field Surveillance , 2012 .
[6] Najem Moussa,et al. Agent-based system simulation of wireless battlefield networks , 2016, Comput. Electr. Eng..
[7] Nazir Ahmad Zafar,et al. Formalism of network restructuring in Flood Control System , 2017, 2017 International Conference on Innovations in Electrical Engineering and Computational Technologies (ICIEECT).
[8] Nazir Ahmad Zafar,et al. Cloud computing based flood detection and management system using WSANs , 2016, 2016 International Conference on Emerging Technologies (ICET).
[9] William Scanlon,et al. Millimeter-wave stealth radio for special operations forces , 2010 .
[10] Athanasios V. Vasilakos,et al. Formal verification and validation of a movement control actor relocation algorithm for safety–critical applications , 2016, Wirel. Networks.
[11] Baochun Li,et al. Efficient and guaranteed service coverage in partitionable mobile ad-hoc networks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[12] Muhammad Imran,et al. International Conference on Emerging Ubiquitous Systems and Pervasive Networks ( EUSPN 2015 ) Formalizing Mobile Ad Hoc and Sensor Networks using VDM-SL , 2015 .
[13] Raheem A. Beyah,et al. Designing Secure Protocols for Wireless Sensor Networks , 2008, WASA.
[14] Rathanakar Acharya,et al. Data integrity and intrusion detection in Wireless Sensor Networks , 2008, 2008 16th IEEE International Conference on Networks.
[15] Nazir Ahmad Zafar,et al. Algorithm and Formal Model of Recovering Network Connectivity in Battlefield Surveillance , 2018, IoT 2018.
[16] Sana Ullah,et al. Formal Specification and Validation of a Localized Algorithm for Segregation of Critical/Noncritical Nodes in MAHSNs , 2014, Int. J. Distributed Sens. Networks.
[17] Muhammad Imran,et al. Formal Specification and Validation of a Hybrid Connectivity Restoration Algorithm for Wireless Sensor and Actor Networks , 2012, Sensors.
[18] Nazir Ahmad Zafar,et al. Robot-based forest fire detection and extinguishing model , 2016, 2016 2nd International Conference on Robotics and Artificial Intelligence (ICRAI).
[19] Hobart R. Everett,et al. Third-generation security robot , 1997, Optics East.
[20] Eric Krotkov,et al. The Defense Advanced Research Projects Agency (DARPA) Tactical Mobile Robotics Program , 1999, Int. J. Robotics Res..