-
1
-
-
79959317465
-
Security challenges in next generation cyber physical systems
-
November
-
M. Anand, E. Cronin, M. Sherr, M. Blaze, Z. Ives, and I. Lee. Security challenges in next generation cyber physical systems. In Beyond SCADA: Networked Embedded Control for Cyber Physical Systems, November 2006.
-
(2006)
Beyond SCADA: Networked Embedded Control for Cyber Physical Systems
-
-
Anand, M.1
Cronin, E.2
Sherr, M.3
Blaze, M.4
Ives, Z.5
Lee, I.6
-
2
-
-
80055028776
-
Challenges for securing cyber physical systems
-
page submitted. DHS
-
A. Cárdenas, S. Amin, B. Sinopoli, A. Giani, A. Perrig, and S. Sastry. Challenges for securing cyber physical systems. In First Workshop on Cyber-physical Systems Security, page submitted. DHS, 2009.
-
(2009)
First Workshop on Cyber-physical Systems Security
-
-
Cárdenas, A.1
Amin, S.2
Sinopoli, B.3
Giani, A.4
Perrig, A.5
Sastry, S.6
-
3
-
-
84859722266
-
Anomaly detection for discrete sequences: A survey
-
IEEE Transactions on
-
V. Chandola, A. Banerjee, and V. Kumar. Anomaly detection for discrete sequences: A survey. Knowledge and Data Engineering, IEEE Transactions on, 2010. http://doi.ieeecomputersociety.org/10.1109/TKDE.2010.235.
-
(2010)
Knowledge and Data Engineering
-
-
Chandola, V.1
Banerjee, A.2
Kumar, V.3
-
4
-
-
77954310491
-
Impact of feature reduction on the efficiency of wireless intrusion detection systems
-
K. El-Khatib. Impact of feature reduction on the efficiency of wireless intrusion detection systems. IEEE Transactions on Knowledge and Data Engineering, 21(8):1143-1149, 2010.
-
(2010)
IEEE Transactions on Knowledge and Data Engineering
, vol.21
, Issue.8
, pp. 1143-1149
-
-
El-Khatib, K.1
-
5
-
-
84976699318
-
The byzantine generals problem
-
L. Lamport, R. Shostak, and M. Pease. The byzantine generals problem. ACM Transactions on Programming Languages and Systems, 4(3):382-401, 1982.
-
(1982)
ACM Transactions on Programming Languages and Systems
, vol.4
, Issue.3
, pp. 382-401
-
-
Lamport, L.1
Shostak, R.2
Pease, M.3
-
6
-
-
70449368657
-
A survey of survivability in mobile ad hoc networks
-
IEEE
-
M. Lima, A. dos Santos, and G. Pujolle. A survey of survivability in mobile ad hoc networks. Communications Surveys Tutorials, IEEE, 11(1):66-77, 2009.
-
(2009)
Communications Surveys Tutorials
, vol.11
, Issue.1
, pp. 66-77
-
-
Lima, M.1
Dos Santos, A.2
Pujolle, G.3
-
7
-
-
79959306908
-
A hierarchical performance model for intrusion detection in cyber-physical systems
-
Cancun, Mexico, March
-
R. Mitchell and I. Chen. A hierarchical performance model for intrusion detection in cyber-physical systems. In IEEE Wireless Communication and Networking Conference, Cancun, Mexico, March 2011.
-
(2011)
IEEE Wireless Communication and Networking Conference
-
-
Mitchell, R.1
Chen, I.2
-
11
-
-
36849062699
-
Intrusion detection techniques in mobile ad hoc and wireless sensor networks
-
B. Sun, L. Osborne, Y. Xiao, and S. Guizani. Intrusion detection techniques in mobile ad hoc and wireless sensor networks. IEEE Wireless Communications, 14(5):56-63, 2007.
-
(2007)
IEEE Wireless Communications
, vol.14
, Issue.5
, pp. 56-63
-
-
Sun, B.1
Osborne, L.2
Xiao, Y.3
Guizani, S.4
-
12
-
-
42649126015
-
Intrusion detection in homogenerous and heterogeneous wireless sensor networks
-
Y. Wang, X. Wang, B. Xie, D. Wang, and D. Agrawal. Intrusion detection in homogenerous and heterogeneous wireless sensor networks. IEEE Transactions on Mobile Computing, 7(6):698-711, 2008.
-
(2008)
IEEE Transactions on Mobile Computing
, vol.7
, Issue.6
, pp. 698-711
-
-
Wang, Y.1
Wang, X.2
Xie, B.3
Wang, D.4
Agrawal, D.5
|