Smart integration of cloud computing and MCMC based secured WSN to monitor environment
暂无分享,去创建一个
[1] Bruno Sinopoli,et al. Distributed control applications within sensor networks , 2003, Proc. IEEE.
[2] R. S. Ponmagal,et al. Integration of Wireless Sensor Network with Cloud , 2010, 2010 International Conference on Recent Trends in Information, Telecommunication and Computing.
[3] Yu Hen Hu,et al. Detection, classification, and tracking of targets , 2002, IEEE Signal Process. Mag..
[4] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[5] Anne-Marie Kermarrec,et al. The many faces of publish/subscribe , 2003, CSUR.
[6] Stephen P. Brooks,et al. Miscellanea. On quantile estimation and Markov chain Monte Carlo convergence , 1999 .
[7] Wenke Lee,et al. Intrusion detection in wireless ad-hoc networks , 2000, MobiCom '00.
[8] Feng Zhao. Wireless sensor networks: a new computing platform for tomorrow's Internet , 2004, Proceedings of the IEEE 6th Circuits and Systems Symposium on Emerging Technologies: Frontiers of Mobile and Wireless Communication (IEEE Cat. No.04EX710).
[9] Dharmendra Sharma,et al. A Novel Framework for Abnormal Behaviour Identification and Detection for Wireless Sensor Networks , 2012 .
[10] Yizhong Ma,et al. The intrusion detection method based on game theory in wireless sensor network , 2008, 2008 First IEEE International Conference on Ubi-Media Computing.
[11] Shrikanth Narayanan,et al. Collaborative classification applications in sensor networks , 2002, Sensor Array and Multichannel Signal Processing Workshop Proceedings, 2002.
[12] Xu Huang,et al. Timing control for protecting from internal attacks in wireless sensor networks , 2012, The International Conference on Information Network 2012.
[13] Pavan Sikka,et al. Wireless ad hoc sensor and actuator networks on the farm , 2006, 2006 5th International Conference on Information Processing in Sensor Networks.
[14] Dedy Dwi Prastyo,et al. Markov Chain Monte Carlo - Based Approaches for Modeling the Spatial Survival with Conditional Autoregressive (CAR) Frailty , 2010 .
[15] Steven Myers,et al. Secure cloud computing with brokered trusted sensor networks , 2010, 2010 International Symposium on Collaborative Technologies and Systems.
[16] Yenumula B. Reddy,et al. A Game Theory Approach to Detect Malicious Nodes in Wireless Sensor Networks , 2009, 2009 Third International Conference on Sensor Technologies and Applications.
[17] Bruce H. Krogh,et al. Energy-efficient surveillance system using wireless sensor networks , 2004, MobiSys '04.
[18] Dharmendra Sharma,et al. A Taxonomy of Internal Attacks in Wireless Sensor Network , 2012 .
[19] Jessica Staddon,et al. Efficient tracing of failed nodes in sensor networks , 2002, WSNA '02.
[20] S. Godsill. On the Relationship Between Markov chain Monte Carlo Methods for Model Uncertainty , 2001 .
[21] Randy H. Katz,et al. Above the Clouds: A Berkeley View of Cloud Computing , 2009 .
[22] Elisa Bertino,et al. Efficient privacy preserving content based publish subscribe systems , 2012, SACMAT '12.