-
2
-
-
84555193265
-
-
Introduction to NISTIR 7628 Guidelines for Smart Grid Cyber Security. Cyber Security Working Group Sep. [Online] retrieved in Mar. 2011
-
SIGiP, the Smart Grid Interoperability Panel. Introduction to NISTIR 7628 Guidelines for Smart Grid Cyber Security. Cyber Security Working Group Sep. 2010 [Online]. Available: http://csrc.nist.gov/publications/PubsNISTIRs.html, retrieved in Mar. 2011
-
(2010)
SIGiP, the Smart Grid Interoperability Panel
-
-
-
5
-
-
84876690535
-
Coupling wireless sensor networks and the sensor observation service-Bridging the interoperability gap
-
K. Walter and E. Nash, "Coupling wireless sensor networks and the sensor observation service-Bridging the interoperability gap," in Proc. 12th Agile Int. Conf. Geographic Inf. Sci., 2009.
-
(2009)
Proc. 12th Agile Int. Conf. Geographic Inf. Sci.
-
-
Walter, K.1
Nash, E.2
-
6
-
-
77953688880
-
A security analysis for wireless sensor mesh networks in highly critical systems
-
Jul.
-
C. Alcaraz and J. Lopez, "A security analysis for wireless sensor mesh networks in highly critical systems," IEEE Trans. Syst., Man, Cybern. C, Appl. Rev., vol. 40, no. 4, pp. 419-428, Jul. 2010.
-
(2010)
IEEE Trans. Syst., Man, Cybern. C, Appl. Rev.
, vol.40
, Issue.4
, pp. 419-428
-
-
Alcaraz, C.1
Lopez, J.2
-
7
-
-
82155186879
-
-
Sep. [Online]
-
ZigBee ZigBee Technology, Sep. 2010 [Online]. Available: http://www.zigbee.org/
-
(2010)
ZigBee ZigBee Technology
-
-
-
8
-
-
82155186885
-
-
Sep. [Online]
-
WirelessHART WirelessHART, Sep. 2010 [Online]. Available: http://WirelessHART.hartcomm.org/
-
(2010)
WirelessHART WirelessHART
-
-
-
9
-
-
58449094834
-
A review of trust modeling in ad hoc networks
-
M. Mejia, N. Pea, J. L. Muoz, and O. Esparza, "A review of trust modeling in ad hoc networks," Internet Res., vol. 19, pp. 88-104, 2009.
-
(2009)
Internet Res.
, vol.19
, pp. 88-104
-
-
Mejia, M.1
Pea, N.2
Muoz, J.L.3
Esparza, O.4
-
10
-
-
84883055822
-
Chapter trust and reputation systems for wireless sensor networks
-
Leicester, U.K.: Troubador
-
R. Roman, M. C. Fernandez-Gago, J. Lopez, and H.-H. Chen, "Chapter trust and reputation systems for wireless sensor networks," in On Security and Privacy inMobile andWireless Networking. Leicester, U.K.: Troubador, 2009.
-
(2009)
On Security and Privacy InMobile AndWireless Networking
-
-
Roman, R.1
Fernandez-Gago, M.C.2
Lopez, J.3
Chen, H.-H.4
-
11
-
-
84886718641
-
Featuring trust and reputation management systems for constrained hardware devices
-
Rome, Italy, Oct.
-
R. Roman, C. Fernandez-Gago, and J. Lopez, "Featuring trust and reputation management systems for constrained hardware devices," in Proc. 1st Int. Conf. Auton. Comput. Commun. Syst. (Autonomics 2007), Rome, Italy, Oct. 2007, vol. 302.
-
(2007)
Proc. 1st Int. Conf. Auton. Comput. Commun. Syst. (Autonomics 2007)
, vol.302
-
-
Roman, R.1
Fernandez-Gago, C.2
Lopez, J.3
-
12
-
-
51849166945
-
A novel CDS-based reputation monitoring system for wireless sensor networks
-
Beijing, China Jun.
-
F. Li, A. Srinivasan, and J. Wu, "A novel CDS-based reputation monitoring system for wireless sensor networks," in Proc. 28th Int. Conf. Distrib. Comput. Syst. Workshops (ICDCS), Beijing, China, Jun. 2008.
-
(2008)
Proc. 28th Int. Conf. Distrib. Comput. Syst. Workshops (ICDCS)
-
-
Li, F.1
Srinivasan, A.2
Wu, J.3
-
13
-
-
27544433189
-
TIBFIT: Trust index based fault tolerance for arbitrary data faults in sensor networks
-
Washington, DC
-
M. Krasniewski and B. Rabeler, "TIBFIT: Trust index based fault tolerance for arbitrary data faults in sensor networks," in Proc. Int. Conf. Dependable Syst. Netw. (DSN'05), Washington, DC, pp. 672-681.
-
Proc. Int. Conf. Dependable Syst. Netw. (DSN'05)
, pp. 672-681
-
-
Krasniewski, M.1
Rabeler, B.2
-
15
-
-
70350600944
-
Adaptive dispatching of incidences based on reputation for SCADA systems
-
Sep. Lecture Notes on Computer Science
-
C. Alcaraz, I. Agudo, C. Fernandez-Gago, R. Roman, G. Fernandez, and J. Lopez, "Adaptive dispatching of incidences based on reputation for SCADA systems," in Proc. 6th Int. Conf. Trust, Privacy and Security Digital Business (TrustBus), Sep. 2009, vol. 5695, Lecture Notes on Computer Science, pp. 86-94.
-
(2009)
Proc. 6th Int. Conf. Trust, Privacy and Security Digital Business (TrustBus)
, vol.5695
, pp. 86-94
-
-
Alcaraz, C.1
Agudo, I.2
Fernandez-Gago, C.3
Roman, R.4
Fernandez, G.5
Lopez, J.6
-
16
-
-
58049091574
-
-
[Online] retrieved on March 2011
-
E. Brewer, D. Culler, D. Gay, P. Levis, R. Behren, and M. Welsh, "NesC:Aprogramming language for deeply networked systems," 2004 [Online]. Available: http://nescc.sourceforge.net/, retrieved on March 2011
-
(2004)
NesC:Aprogramming Language for Deeply Networked Systems
-
-
Brewer, E.1
Culler, D.2
Gay, D.3
Levis, P.4
Behren, R.5
Welsh, M.6
|