-
1
-
-
33845960072
-
-
Adar E, Wuchner A. Risk management for critical infrastructure protection challenges, best practices & tools. In: First intern. workshop on critical infrastructure protection; November 2005. p. 90-100.
-
-
-
-
2
-
-
0037086890
-
Wireless sensor networks: a survey
-
Akyildiz I.F., Su W., Sankarasubramaniam Y., and Cayirci E. Wireless sensor networks: a survey. Computer Networks: The International Journal of Computer and Telecommunications Networking 38 4 (March 2002) 393-422
-
(2002)
Computer Networks: The International Journal of Computer and Telecommunications Networking
, vol.38
, Issue.4
, pp. 393-422
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
3
-
-
34547404724
-
-
Alarifi A, Du W. Diversifying sensor nodes to improve resilience against node compromise. In: Proceedings of the fourth ACM workshop on security of ad hoc and sensor networks (SASN 2006), Alexandria, USA; October 2006.
-
-
-
-
4
-
-
34249692620
-
-
Alcaraz C, Roman R. Applying key infrastructures for sensor networks in CIP/CIIP scenarios. In: Proceedings of the first international workshop on critical information infrastructures security (CRITIS 2006), Samos, Greece; August-September 2006.
-
-
-
-
5
-
-
33745855808
-
-
Becher A, Benenson Z, Dornseif M. Tampering with motes: real-world physical attacks on wireless sensor networks. In: Proceedings of the third international conference on security in pervasive computing (SPC 2006), York, UK; April 2006.
-
-
-
-
6
-
-
34249744773
-
-
Beckwith R, Teibel D, Bowen P. Report from the field: results from an agricultural wireless sensor network. In: Proceedings of the first IEEE workshop on embedded networked sensors (EmNetS-I 2004), Tampa, USA; November 2004.
-
-
-
-
7
-
-
66149139377
-
-
Bologna S, Di Costanzo G, Luiijf E, Setola R. An overview of R&D activities in Europe on critical information infrastructure protection (CIIP). In: Proceedings of the first international workshop on critical information infrastructures security (CRITIS 2006), Samos, Greece; August-September 2006.
-
-
-
-
8
-
-
34249652533
-
-
Bopping D. CIIP in Australia. In: First CI2RCO critical information infrastructure protection conference, Rome; March 2006.
-
-
-
-
10
-
-
34249673495
-
-
Commission of the European Communities. Communication from the Commission to the Council and the European parliament: critical infrastructure protection in the fight against Terrorism, COM (2004) 702 final, Brussels; 20 October 2004.
-
-
-
-
11
-
-
34249716882
-
-
Distributed intelligence, sensing and coordination in variable environments. CSIRO..
-
-
-
-
12
-
-
80052933495
-
-
D'Antonio S, Oliviero F, Setola R. High-speed intrusion detection in support of critical infrastructure protection. In: Proceedings of the first international workshop on critical information infrastructures security (CRITIS 2006), Samos, Greece; August-September 2006.
-
-
-
-
13
-
-
33845933166
-
-
Hammerli BM. CIIP task description and a proposal for a substitute of national C(I)IP policies. In: First international workshop on critical infrastructure protection; 2005. p. 51-61.
-
-
-
-
14
-
-
33646523960
-
VigilNet: An integrated sensor network system for energy-efficient surveillance
-
He T., Krishnamurthy S., Luo L., Yan T., Gu L., Stoleru R., Zhou G., Cao Q., Vicaire P., Stankovic J.A., Abdelzaher T.F., Hui J., and Krogh B. VigilNet: An integrated sensor network system for energy-efficient surveillance. ACM Transactions on Sensor Networks 2 1 (February 2006) 1-38
-
(2006)
ACM Transactions on Sensor Networks
, vol.2
, Issue.1
, pp. 1-38
-
-
He, T.1
Krishnamurthy, S.2
Luo, L.3
Yan, T.4
Gu, L.5
Stoleru, R.6
Zhou, G.7
Cao, Q.8
Vicaire, P.9
Stankovic, J.A.10
Abdelzaher, T.F.11
Hui, J.12
Krogh, B.13
-
15
-
-
2942656255
-
Secure routing in wireless sensor networks: attacks and countermeasures
-
Special Issue on sensor network applications and protocols p. 293-315
-
Karlof C., and Wagner D. Secure routing in wireless sensor networks: attacks and countermeasures. Special Issue on sensor network applications and protocols. Elsevier's Ad Hoc Networks Journal (September 2003) p. 293-315
-
(2003)
Elsevier's Ad Hoc Networks Journal
-
-
Karlof, C.1
Wagner, D.2
-
16
-
-
26444574670
-
-
Karlof C, Sastry N, Wagner D. TinySec: a link layer security architecture for wireless sensor networks. In: Second Intern. Conf. on Embedded Networked Sensor Systems; 2004. p. 162-75.
-
-
-
-
17
-
-
34249694798
-
-
Kenichi Soga. Underground M3, Smart infrastructure, .
-
-
-
-
18
-
-
34249713800
-
-
Liu A., Ning P. TinyECC: elliptic curve cryptography for sensor networks (Version 0.2), ; September 2006.
-
-
-
-
19
-
-
34249735994
-
-
Lopez J, Montenegro JA, Roman R. Securing critical information infrastructures. In: Proceedings of the second international workshop on security, privacy and trust in pervasive and ubiquitous computing (SecPerU 2006), Lyon, France; June 2006.
-
-
-
-
20
-
-
34249677479
-
-
Manzo M, Roosta T, Sastry S. Time synchronization attacks in sensor networks. In: Proceedings of the third ACM workshop on security of ad hoc and sensor networks (SASN 2005), Alexandria, USA; November 2005.
-
-
-
-
21
-
-
33845447841
-
-
Martinez K, Padhy P, Elsaify A, Zou G, Riddoch A, Hart JK, Ong HLR. Deploying a sensor network in an extreme environment. In: Proceedings of sensor networks, ubiquitous and trustworthy computing (SUTC 2006), Taiwan; June 2006. p. 186-93.
-
-
-
-
22
-
-
34249734367
-
-
Minder D, Marrón PJ, Lachenmann A, Rothermel K. Experimental construction of a meeting model for smart office environments. In: Proceedings of the first workshop on real-world wireless sensor networks (REALWSN 2005), Stockholm, Sweden; June 2005.
-
-
-
-
23
-
-
34249704139
-
-
Moteiv Corporation, ; 2007.
-
-
-
-
24
-
-
19944369062
-
Soft Tamper-Proofing via Program Integrity Verification in Wireless Sensor Networks
-
Park T., and Shin K.G. Soft Tamper-Proofing via Program Integrity Verification in Wireless Sensor Networks. IEEE Transactions on Mobile Computing 4 3 (May-June 2005) 297-309
-
(2005)
IEEE Transactions on Mobile Computing
, vol.4
, Issue.3
, pp. 297-309
-
-
Park, T.1
Shin, K.G.2
-
25
-
-
34249654693
-
-
Particle Computer GmbH. ; 2007.
-
-
-
-
26
-
-
47649126396
-
-
Ramanathan N, Balzano L, Estrin D, Hansen M, Harmon T, Jay J, Kaiser WJ, Sukhatme G. Designing wireless sensor networks as a shared resource for sustainable development. In: Proceedings of the international conference on information and communication technologies and development (ICTD 2006), Berkeley, USA; May 2006.
-
-
-
-
27
-
-
12344298391
-
-
Rinaldi SM. Modeling and simulating critical infrastructures and their interdependences. In: 37th Hawaiian International Conference on system Sciences; 2004.
-
-
-
-
28
-
-
20844461569
-
Security meter: a practical decision-tree model to quantify risk
-
Sahinoglu M. Security meter: a practical decision-tree model to quantify risk. IEEE Security & Privacy 3 3 (2005) 18-24
-
(2005)
IEEE Security & Privacy
, vol.3
, Issue.3
, pp. 18-24
-
-
Sahinoglu, M.1
-
29
-
-
38349028310
-
-
Sang Y, Shen H, Inoguchi Y, Tan Y, Xiong N. Secure data aggregation in wireless sensor networks: a survey. In: Proceedings of the seventh international conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2006), Taipei, Taiwan; December 2006.
-
-
-
-
30
-
-
34249678743
-
-
Scatterweb GmbH. ; 2007.
-
-
-
-
31
-
-
34249680357
-
-
Schmitz W. Modelling and simulation for analysis of critical infrastructures, In: First GI Workshop on CIP, within Annual Meeting Informatik; 2003.
-
-
-
-
32
-
-
34249746932
-
-
Intel Corporation
-
Sensor Nets/RFID (2006), Intel Corporation. http://www.intel.com/research/exploratory/wireless_sensors.htm
-
(2006)
Sensor Nets/RFID
-
-
-
33
-
-
33744988588
-
-
Sharp C, Schaffert S, Woo A, Sastry N, Karlof C, Sastry S, Culler D. Design and implementation of a sensor network system for vehicle tracking and autonomous interception. In: Proceedings of the second European workshop on wireless sensor networks (EWSN 2005), Istanbul, Turkey; January 2005. p. 93-107.
-
-
-
-
34
-
-
34249726250
-
-
SMEPP. Secure middleware for embedded peer-to-peer systems (FP6-2005-IST-5), .
-
-
-
-
35
-
-
34249677992
-
-
Sun Microsystems Inc., ; 2007.
-
-
-
-
36
-
-
34249697138
-
-
The CodeBlue Project. Harvard University, ; 2006.
-
-
-
-
37
-
-
34249649746
-
-
University of Southern California. Networked aquatic microbial observing system (NAMOS), .
-
-
-
-
38
-
-
34249724606
-
-
U.S. Government, 2004. US National Plan for Research and Development in Support for CIP. April 8, 2005. [retrieved from: ].
-
-
-
-
39
-
-
84873800450
-
-
Verissimo P, Neves NF, Correia M. CRUTIAL: The blueprint of a reference critical information infrastructure architecture. In: Proceedings of the first international workshop on critical information infrastructures security (CRITIS 2006), Samos, Greece; August-September 2006.
-
-
-
-
40
-
-
34249674554
-
-
Wireless Measurement Systems. Crossbow Technology, Inc., ; 2007.
-
-
-
-
41
-
-
33645115901
-
Deploying a wireless sensor network on an active volcano
-
Special Issue on Data-Driven Applications in Sensor Networks
-
Werner-Allen G., Lorincz K., Ruiz M., Marcillo O., Johnson J., Lees J., and Welsh M. Deploying a wireless sensor network on an active volcano. Special Issue on Data-Driven Applications in Sensor Networks. IEEE Internet Computing (March/April 2006)
-
(2006)
IEEE Internet Computing
-
-
Werner-Allen, G.1
Lorincz, K.2
Ruiz, M.3
Marcillo, O.4
Johnson, J.5
Lees, J.6
Welsh, M.7
-
42
-
-
33746791187
-
-
Wokoma I, Shum L, Sacks L, Marshall IW. A biologically-inspired clustering algorithm dependent on spatial data on sensor networks. In: Proceedings of the second annual European workshop on wireless sensor networks (EWSN 2005), Istanbul, Turkey; January-February 2005.
-
-
-
-
43
-
-
15944404585
-
-
Wolthusen S. Modeling critical infrastructure requirements. In: Fifth IEEE SMC Information Assurance Workshop, 2004.
-
-
-
|