-
1
-
-
3543059320
-
Telecommunications demand and pricing structure: An econometric analysis
-
DOI 10.1023/B:TELS.0000011198.50511.a4
-
M. Aldebert, M. Ivaldi, and C. Roucolle, "Telecommunications demand and pricing structure: An econometric analysis," Telecommun. Syst., vol. 25, nos. 1-2, pp. 89-115, 2004. (Pubitemid 39019049)
-
(2004)
Telecommunication Systems
, vol.25
, Issue.1-2
, pp. 89-115
-
-
Aldebert, M.1
Ivaldi, M.2
Roucolle, C.3
-
2
-
-
0037709592
-
Reliability of systems with fuzzy-failure criterion
-
Jan.
-
F. B. Bastani, I. R. Chen, and T. W. Tsao, "Reliability of systems with fuzzy-failure criterion," in Proc. Annu. Rel. Maintainability Symp., Jan. 1994, pp. 442-448.
-
(1994)
Proc. Annu. Rel. Maintainability Symp.
, pp. 442-448
-
-
Bastani, F.B.1
Chen, I.R.2
Tsao, T.W.3
-
3
-
-
55349120874
-
Managing reputation over MANETs
-
Sep.
-
G. Bella, G. Costantino, and S. Riccobene, "Managing reputation over MANETs," in Proc. 4th Int. Conf. Inf. Assur. Security, Sep. 2008, pp. 255-260.
-
(2008)
Proc. 4th Int. Conf. Inf. Assur. Security
, pp. 255-260
-
-
Bella, G.1
Costantino, G.2
Riccobene, S.3
-
4
-
-
84860726638
-
Measuring the worthiness of situation assessment
-
Jul.
-
E. Blasch, J. Salerno, and G. Tadda, "Measuring the worthiness of situation assessment," in Proc. IEEE Nat. Aerosp. Electron. Conf., Jul. 2011, pp. 87-94.
-
(2011)
Proc. IEEE Nat. Aerosp. Electron. Conf.
, pp. 87-94
-
-
Blasch, E.1
Salerno, J.2
Tadda, G.3
-
6
-
-
0042084285
-
Effect of artificial-intelligence planningprocedures on system reliability
-
Aug.
-
I. R. Chen and F. B. Bastani, "Effect of artificial-intelligence planningprocedures on system reliability," IEEE Trans. Reliab., vol. 40, no. 3, pp. 364-369, Aug. 1991.
-
(1991)
IEEE Trans. Reliab.
, vol.40
, Issue.3
, pp. 364-369
-
-
Chen, I.R.1
Bastani, F.B.2
-
7
-
-
0029250814
-
On the reliability of AI planning software in real-time applications
-
Feb.
-
I. R. Chen, F. B. Bastani, and T. W. Tsao, "On the reliability of AI planning software in real-time applications," IEEE Trans. Knowl. Data Eng., vol. 7, no. 1, pp. 4-13, Feb. 1995.
-
(1995)
IEEE Trans. Knowl. Data Eng.
, vol.7
, Issue.1
, pp. 4-13
-
-
Chen, I.R.1
Bastani, F.B.2
Tsao, T.W.3
-
8
-
-
0032121578
-
Performance analysis of admission control algorithms based on reward optimization for real-time multimedia servers
-
I. R. Chen and T. H. Hsi, "Performance analysis of admission control algorithms based on reward optimization for real-time multimedia servers," Perform. Eval., vol. 33, no. 2, pp. 89-112, 1998.
-
(1998)
Perform. Eval.
, vol.33
, Issue.2
, pp. 89-112
-
-
Chen, I.R.1
Hsi, T.H.2
-
9
-
-
77954171454
-
Insurgents hack U.S. Drones
-
Dec.
-
S. Gorman, Y. J. Dreazen, and A. Cole, "Insurgents hack U.S. drones," Wall Street J., vol. 17, p. A.1, Dec. 2009.
-
(2009)
Wall Street J.
, vol.17
-
-
Gorman, S.1
Dreazen, Y.J.2
Cole, A.3
-
10
-
-
78651347601
-
Routing, security, resource management, and monitoring in ad hoc networks: Implementation and integration
-
G. C. Hadjichristofi, L. A. DaSilva, S. F. Midkiff, U. Lee, and W. D. Sousa, "Routing, security, resource management, and monitoring in ad hoc networks: Implementation and integration," Comput. Netw., vol. 55, no. 1, pp. 282-299, 2011.
-
(2011)
Comput. Netw.
, vol.55
, Issue.1
, pp. 282-299
-
-
Hadjichristofi, G.C.1
Dasilva, L.A.2
Midkiff, S.F.3
Lee, U.4
Sousa, W.D.5
-
11
-
-
84858397500
-
Highly reliable communication protocol for WSN-UAV system employing TDMA and PFS scheme
-
Dec.
-
D.-T. Ho and S. Shimamoto, "Highly reliable communication protocol for WSN-UAV system employing TDMA and PFS scheme," in Proc. Global Commun. Conf. Workshops, Dec. 2011, pp. 1320-1324.
-
(2011)
Proc. Global Commun. Conf. Workshops
, pp. 1320-1324
-
-
Ho, D.-T.1
Shimamoto, S.2
-
12
-
-
33845868556
-
A survey on real-world implementations of mobile ad-hoc networks
-
DOI 10.1016/j.adhoc.2005.12.003, PII S1570870505001149
-
W. Kiess and M. Mauve, "A survey on real-world implementations of mobile ad-hoc networks," Ad Hoc Netw., vol. 5, no. 3, pp. 324-339, 2007. (Pubitemid 46027750)
-
(2007)
Ad Hoc Networks
, vol.5
, Issue.3
, pp. 324-339
-
-
Kiess, W.1
Mauve, M.2
-
13
-
-
85088338101
-
Cyber attack vulnerabilities analysis for unmanned aerial vehicles
-
Jun.
-
A. Kim, B. Wampler, J. Goppert, I. Hwang, and H. Aldridge, "Cyber attack vulnerabilities analysis for unmanned aerial vehicles," in Proc. AIAA Infotech@Aerospace Conf., Jun. 2012, pp. 1-30.
-
(2012)
Proc. AIAA Infotech@Aerospace Conf.
, pp. 1-30
-
-
Kim, A.1
Wampler, B.2
Goppert, J.3
Hwang, I.4
Aldridge, H.5
-
14
-
-
79951658804
-
Fault-tolerant distributed reconnaissance
-
Nov.
-
A. Lauf and W. Robinson, "Fault-tolerant distributed reconnaissance," in Proc. Military Commun. Conf., Nov. 2010, pp. 1812-1817.
-
(2010)
Proc. Military Commun. Conf.
, pp. 1812-1817
-
-
Lauf, A.1
Robinson, W.2
-
15
-
-
72949113634
-
A distributed intrusion detection system for resource-constrained devices in ad-hoc networks
-
A. P. Lauf, R. A. Peters, and W. H. Robinson, "A distributed intrusion detection system for resource-constrained devices in ad-hoc networks," Ad Hoc Netw., vol. 8, no. 3, pp. 253-266, 2010.
-
(2010)
Ad Hoc Netw.
, vol.8
, Issue.3
, pp. 253-266
-
-
Lauf, A.P.1
Peters, R.A.2
Robinson, W.H.3
-
17
-
-
84874959990
-
Effect of intrusion detection and response on reliability of cyber physical systems
-
Mar.
-
R. Mitchell and I. R. Chen, "Effect of intrusion detection and response on reliability of cyber physical systems," IEEE Trans. Rel., vol. 62, no. 1, pp. 199-210, Mar. 2013.
-
(2013)
IEEE Trans. Rel.
, vol.62
, Issue.1
, pp. 199-210
-
-
Mitchell, R.1
Chen, I.R.2
-
18
-
-
21844439715
-
Enhancing transport layer capability in HAPS-satellite integrated architecture
-
DOI 10.1007/s11277-005-0751-2
-
C. E. Palazzi, C. Roseti, M. Luglio, M. Gerla, M. Y. Sanadidi, and J. Stepanek, "Enhancing transport layer capability in HAPS-satellite integrated architecture," Wireless Pers. Commun., vol. 32, nos. 3-4, pp. 339-356, 2005. (Pubitemid 40952234)
-
(2005)
Wireless Personal Communications
, vol.32
, Issue.3-4
, pp. 339-356
-
-
Palazzi, C.E.1
Roseti, C.2
Luglio, M.3
Gerla, M.4
Sanadidi, M.Y.5
Stepanek, J.6
-
19
-
-
0002629036
-
EMERALD: Event monitoring enabling responses to anomalous live disturbances
-
Oct.
-
P. Porras and P. Neumann, "EMERALD: Event monitoring enabling responses to anomalous live disturbances," in Proc. 20th Nat. Inf. Syst. Security Conf., Oct. 1997, pp. 353-365.
-
(1997)
Proc. 20th Nat. Inf. Syst. Security Conf.
, pp. 353-365
-
-
Porras, P.1
Neumann, P.2
-
21
-
-
47949132863
-
Adaptive Markov game theoretic data fusion approach for cyber network defense
-
Oct.
-
D. Shen, G. Chen, E. Blasch, and G. Tadda, "Adaptive Markov game theoretic data fusion approach for cyber network defense," in Proc. Military Commun. Conf., Oct. 2007, pp. 1-7.
-
(2007)
Proc. Military Commun. Conf.
, pp. 1-7
-
-
Shen, D.1
Chen, G.2
Blasch, E.3
Tadda, G.4
-
22
-
-
49349113752
-
A game theoretic data fusion aided path planning approach for cooperative UAV ISR
-
Mar.
-
D. Shen, G. Chen, J. Cruz, and E. Blasch, "A game theoretic data fusion aided path planning approach for cooperative UAV ISR," in Proc. Aerosp. Conf., Mar. 2008, pp. 1-9.
-
(2008)
Proc. Aerosp. Conf.
, pp. 1-9
-
-
Shen, D.1
Chen, G.2
Cruz, J.3
Blasch, E.4
-
23
-
-
78149468870
-
An experimental study of hierarchical intrusion detection for wireless industrial sensor networks
-
Nov.
-
S. Shin, T. Kwon, G.-Y. Jo, Y. Park, and H. Rhy, "An experimental study of hierarchical intrusion detection for wireless industrial sensor networks," IEEE Trans. Ind. Informat., vol. 6, no. 4, pp. 744-757, Nov. 2010.
-
(2010)
IEEE Trans. Ind. Informat.
, vol.6
, Issue.4
, pp. 744-757
-
-
Shin, S.1
Kwon, T.2
Jo, G.-Y.3
Park, Y.4
Rhy, H.5
-
24
-
-
84862861886
-
A unified cooperative control architecture for UAV missions
-
Apr.
-
X. Tian, Y. Bar-Shalom, G. Chen, E. Blasch, and K. Pham, "A unified cooperative control architecture for UAV missions," in Proc. SPIE Signal Process. Sensor Fusion Target Recognit. XXI, vol. 8392. Apr. 2012, pp. 83920X-1-83920X-9.
-
(2012)
Proc. SPIE Signal Process. Sensor Fusion Target Recognit. XXI
, vol.8392
-
-
Tian, X.1
Bar-Shalom, Y.2
Chen, G.3
Blasch, E.4
Pham, K.5
-
25
-
-
35148872201
-
The joint airborne network services suite
-
Oct.
-
R. Trafton and S. Pizzi, "The joint airborne network services suite," in Proc. Military Commun. Conf., Oct. 2006, pp. 1-5.
-
(2006)
Proc. Military Commun. Conf.
, pp. 1-5
-
-
Trafton, R.1
Pizzi, S.2
-
26
-
-
33847299487
-
Multi-agent intrusion detection system in industrial network using ant colony clustering approach and unsupervised feature extraction
-
Dec.
-
C.-H. Tsang and S. Kwong, "Multi-agent intrusion detection system in industrial network using ant colony clustering approach and unsupervised feature extraction," in Proc. Int. Conf. Ind. Technol., Dec. 2005, pp. 51-56.
-
(2005)
Proc. Int. Conf. Ind. Technol.
, pp. 51-56
-
-
Tsang, C.-H.1
Kwong, S.2
-
27
-
-
4544342574
-
A specification-based intrusion detection system for AODV
-
Oct.
-
C.-Y. Tseng, P. Balasubramanyam, C. Ko, R. Limprasittiporn, J. Rowe, and K. Levitt, "A specification-based intrusion detection system for AODV," in Proc. 1st Workshop Security Ad Hoc Sensor Netw., Oct. 2003, pp. 125-134.
-
(2003)
Proc. 1st Workshop Security Ad Hoc Sensor Netw.
, pp. 125-134
-
-
Tseng, C.-Y.1
Balasubramanyam, P.2
Ko, C.3
Limprasittiporn, R.4
Rowe, J.5
Levitt, K.6
-
28
-
-
84868596713
-
Systematic analysis of cyber-attacks on CPS-evaluating applicability of DFD-based approach
-
Aug.
-
M. Yampolskiy, P. Horvath, X. Koutsoukos, Y. Xue, and J. Sztipanovits, "Systematic analysis of cyber-attacks on CPS-evaluating applicability of DFD-based approach," in Proc. 5th Int. Symp. Resilient Control Syst., Aug. 2012, pp. 55-62.
-
(2012)
Proc. 5th Int. Symp. Resilient Control Syst.
, pp. 55-62
-
-
Yampolskiy, M.1
Horvath, P.2
Koutsoukos, X.3
Xue, Y.4
Sztipanovits, J.5
-
29
-
-
58149488760
-
Utilizing call admission control for pricing optimization of multiple service classes in wireless cellular networks
-
O. Yilmaz and I. R. Chen, "Utilizing call admission control for pricing optimization of multiple service classes in wireless cellular networks," Comput. Commun., vol. 32, no. 2, pp. 317-323, 2009.
-
(2009)
Comput. Commun.
, vol.32
, Issue.2
, pp. 317-323
-
-
Yilmaz, O.1
Chen, I.R.2
-
30
-
-
0033350703
-
Hidden Markov Model based algorithm for online fault diagnosis with partial and imperfect tests
-
J. Ying, T. Kirubarajan, K. Pattipati, and S. Deb, "A hidden Markov model based algorithm for online fault diagnosis with partial and imperfect tests," in Proc. Syst. Readiness Technol. Conf., Aug. 1999, pp. 355-366. (Pubitemid 30515511)
-
(1999)
AUTOTESTCON (Proceedings)
, pp. 355-366
-
-
Ying Jie1
Kirubarajan, T.2
Pattipati Krishna, R.3
Deb Somnath4
|