Development of Distribution Automation System Based on the Customized Integrated Services Distribution Terminal
暂无分享,去创建一个
[1] Chengqi Zhang,et al. MA-IDS Architecture for Distributed Intrusion Detection using Mobile Agent , 2004 .
[2] William M. Farmer,et al. Security for Mobile Agents: Authentication and State Appraisal , 1996, ESORICS.
[3] Xia Wang,et al. An End-to-end Detection of Wormhole Attack in Wireless Ad-hoc Networks , 2007, 31st Annual International Computer Software and Applications Conference (COMPSAC 2007).
[4] Mario Gerla,et al. Adaptive Clustering for Mobile Wireless Networks , 1997, IEEE J. Sel. Areas Commun..
[5] Ricardo Staciarini Puttini,et al. Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches , 2002, Wireless Information Systems.
[6] Maria E. Orlowska,et al. On the Design Issues of Wireless Sensor Networks for Telemetry , 2005, 16th International Workshop on Database and Expert Systems Applications (DEXA'05).
[7] Frank C. Lambert,et al. A survey on communication networks for electric system automation , 2006, Comput. Networks.
[8] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[9] Alok Aggarwal,et al. Clustering algorithms for wireless ad hoc networks , 2000, DIALM '00.
[10] S. Khuller,et al. A Clustering Scheme for Hierarchical Control in Wireless Networks , 2001 .
[11] Yih-Chun Hu,et al. A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.
[12] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[13] Ratan K. Guha,et al. Effective intrusion detection using multiple sensors in wireless ad hoc networks , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.
[14] Karl N. Levitt,et al. A general cooperative intrusion detection architecture for MANETs , 2005, Third IEEE International Workshop on Information Assurance (IWIA'05).
[15] Helmut Kurth,et al. Certifying open source - the Linux experience , 2004, IEEE Security & Privacy Magazine.
[16] C.-C. Jay Kuo,et al. Cooperative Communications in Resource-Constrained Wireless Networks , 2007, IEEE Signal Processing Magazine.
[17] L. Sydanheimo,et al. Considerations of Using Power Line Communication in the AMR System , 2006, 2006 IEEE International Symposium on Power Line Communications and Its Applications.
[18] Gene Tsudik,et al. Flooding for Reliable Multicast in Multi-Hop Ad Hoc Networks , 1999, DIALM '99.
[19] Udo W. Pooch,et al. Zone-Based Intrusion Detection for Mobile Ad Hoc Networks , 2006, Ad Hoc Sens. Wirel. Networks.
[20] Jim White,et al. Telescript technology: mobile agent , 1999 .