When Sensor and Actuator Networks Cover the World
暂无分享,去创建一个
[1] Srivaths Ravi,et al. Secure embedded processing through hardware-assisted run-time monitoring , 2005, Design, Automation and Test in Europe.
[2] Liang Zhang,et al. Organizational memory: reducing source-sink distance , 1997, Proceedings of the Thirtieth Hawaii International Conference on System Sciences.
[3] Insup Lee,et al. Opportunities and Obligations for Physical Computing Systems , 2005, Computer.
[4] Jie Wu,et al. DRBTS: Distributed Reputation-based Beacon Trust System , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.
[5] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[6] Alfred O. Hero,et al. An Information-Based Approach to Sensor Management in Large Dynamic Networks , 2007, Proceedings of the IEEE.
[7] Srdjan Capkun,et al. Secure positioning of wireless devices with application to sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[8] Deborah Estrin,et al. Sympathy for the sensor network debugger , 2005, SenSys '05.
[9] Tian He,et al. SIGF: a family of configurable, secure routing protocols for wireless sensor networks , 2006, SASN '06.
[10] Deborah Estrin,et al. ASCENT: adaptive self-configuring sensor networks topologies , 2004, IEEE Transactions on Mobile Computing.
[11] Dawn Xiaodong Song,et al. SIA: secure information aggregation in sensor networks , 2003, SenSys '03.
[12] Panos J. Antsaklis,et al. Control and Communication Challenges in Networked Real-Time Systems , 2007, Proceedings of the IEEE.
[13] John A. Stankovic,et al. An In-Field-Maintenance Framework for Wireless Sensor Networks , 2008, DCOSS.
[14] David E. Culler,et al. Taming the underlying challenges of reliable multihop routing in sensor networks , 2003, SenSys '03.
[15] Dawn Song,et al. SIA: Secure information aggregation in sensor networks , 2007, J. Comput. Secur..
[16] John A. Stankovic,et al. t-kernel: providing reliable OS support to wireless sensor networks , 2006, SenSys '06.
[17] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[18] Qi Han,et al. Journal of Network and Systems Management ( c ○ 2007) DOI: 10.1007/s10922-007-9062-0 A Survey of Fault Management in Wireless Sensor Networks , 2022 .
[19] Mukesh Singhal,et al. Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..