-
1
-
-
84919493647
-
-
(2010). CPS Week [Online]. Available: http://www.cpsweek2010.se/
-
(2010)
CPS Week
-
-
-
2
-
-
79960924365
-
From wireless sensor networks towards cyber physical systems
-
Aug.
-
F. Wu, Y. Kao, and Y. Tseng, "From wireless sensor networks towards cyber physical systems," Pervasive Mobile Comput., vol. 7, no. 4, pp. 397-413, Aug. 2011.
-
(2011)
Pervasive Mobile Comput.
, vol.7
, Issue.4
, pp. 397-413
-
-
Wu, F.1
Kao, Y.2
Tseng, Y.3
-
3
-
-
51849091527
-
Secure control: Towards survivable cyber-physical systems
-
A. A. Cardenas, S. Amin, and S. Sastry, "Secure control: Towards survivable cyber-physical systems," in Proc. 1st Int. Workshop Cyber-Phys. Syst. (WCPS), 2008, pp. 495-500.
-
(2008)
Proc. 1st Int. Workshop Cyber-Phys. Syst. (WCPS)
, pp. 495-500
-
-
Cardenas, A.A.1
Amin, S.2
Sastry, S.3
-
4
-
-
84872446684
-
Robust architectures for embedded wireless network control and actuations
-
article no. 82, Dec.
-
M. Pajic, A. Chernoguzov, and R. Mangharam, "Robust architectures for embedded wireless network control and actuations," Trans. Embedded Comput. Syst., vol. 11, no. 4, article no. 82, Dec. 2012.
-
Trans. Embedded Comput. Syst.
, vol.11
, Issue.4
, pp. 2012
-
-
Pajic, M.1
Chernoguzov, A.2
Mangharam, R.3
-
7
-
-
0142103313
-
Security and privacy in sensor networks
-
H. Chan and A. Perrig, "Security and privacy in sensor networks," Computer, vol. 36, no. 10, pp. 103-105, 2003.
-
(2003)
Computer
, vol.36
, Issue.10
, pp. 103-105
-
-
Chan, H.1
Perrig, A.2
-
8
-
-
74049160328
-
Filter-resistant code injection on arm
-
Y. Younan, P. Philippaerts, F. Piessens,W. Joosen, S. Lachmund, and T. Walter, "Filter-resistant code injection on arm," in Proc. 16thACM Conf. Comput. Commun. Security (CCS), 2009, pp. 11-20.
-
(2009)
Proc. 16thACM Conf. Comput. Commun. Security (CCS)
, pp. 11-20
-
-
Younan, Y.1
Philippaerts, P.2
Piessens, F.3
Joosen, W.4
Lachmund, S.5
Walter, T.6
-
9
-
-
77953307472
-
From time domain to space domain: Detecting replica attacks in mobile ad hoc networks
-
K. Xing and X. Cheng, "From time domain to space domain: Detecting replica attacks in mobile ad hoc networks," in Proc. 29th Conf. Inf. Commun. (INFOCOM), 2010, pp. 1595-1603.
-
(2010)
Proc. 29th Conf. Inf. Commun. (INFOCOM)
, pp. 1595-1603
-
-
Xing, K.1
Cheng, X.2
-
10
-
-
84863144482
-
On a hierarchical false data injection attack on power system state estimation
-
Q. Yang, J. Yang, W. Yu, N. Zhang, and W. Zhao, "On a hierarchical false data injection attack on power system state estimation," in Proc. IEEE Global Telecommun. Conf. (GLOBECOM'11), 2011, pp. 1-6.
-
(2011)
Proc. IEEE Global Telecommun. Conf. (GLOBECOM'11)
, pp. 1-6
-
-
Yang, Q.1
Yang, J.2
Yu, W.3
Zhang, N.4
Zhao, W.5
-
11
-
-
74049113264
-
False data injection attacks against state estimation in electric power grids
-
Y. Liu, M. K. Reiter, and P. Ning, "False data injection attacks against state estimation in electric power grids," in Proc. 16th ACM Conf. Comput. Commun. Security (CCS), 2009, pp. 21-32.
-
(2009)
Proc. 16th ACM Conf. Comput. Commun. Security (CCS)
, pp. 21-32
-
-
Liu, Y.1
Reiter, M.K.2
Ning, P.3
-
13
-
-
17144429277
-
Statistical en-route filtering of injection false data in sensor networks
-
Apr.
-
F. Ye, H. Luo, S. Lu, and L. Zhang, "Statistical en-route filtering of injection false data in sensor networks," IEEE J. Sel. Areas Commun., vol. 23, no. 4, pp. 839-850, Apr. 2005.
-
(2005)
IEEE J. Sel. Areas Commun.
, vol.23
, Issue.4
, pp. 839-850
-
-
Ye, F.1
Luo, H.2
Lu, S.3
Zhang, L.4
-
14
-
-
29844441128
-
Toward resilient security in wireless sensor networks
-
H. Yang, F. Ye, Y. Yuan, S. Lu, and W. Arbaugh, "Toward resilient security in wireless sensor networks," in Proc. 6th ACM Int. Symp. Mobile Ad Hoc Netw. Comput. (MobiHoc'05), 2005, pp. 34-45.
-
(2005)
Proc. 6th ACM Int. Symp. Mobile Ad Hoc Netw. Comput. (MobiHoc'05)
, pp. 34-45
-
-
Yang, H.1
Ye, F.2
Yuan, Y.3
Lu, S.4
Arbaugh, W.5
-
15
-
-
70349653217
-
Grouping-based resilient statistical en-route filtering for sensor networks
-
L. Yu and J. Li, "Grouping-based resilient statistical en-route filtering for sensor networks," in Proc. 28th IEEE Int. Conf. Comput. Commun. (INFOCOM), 2009, pp. 1782-1790.
-
(2009)
Proc. 28th IEEE Int. Conf. Comput. Commun. (INFOCOM)
, pp. 1782-1790
-
-
Yu, L.1
Li, J.2
-
16
-
-
41449098948
-
Leds: Providing location-aware endto-end data security in wireless sensor networks
-
May
-
K. Ren, W. Lou, and Y. Zhang, "Leds: Providing location-aware endto-end data security in wireless sensor networks," IEEE Trans. Mobile Comput., vol. 7, no. 5, pp. 585-598, May 2008.
-
(2008)
IEEE Trans. Mobile Comput.
, vol.7
, Issue.5
, pp. 585-598
-
-
Ren, K.1
Lou, W.2
Zhang, Y.3
-
17
-
-
34548390509
-
An interleaved hop-by-hop authentication scheme for filtering of injection false data in sensor networks
-
S. Zhu, S. Setia, S. Jajodia, and P. Ning, "An interleaved hop-by-hop authentication scheme for filtering of injection false data in sensor networks," ACM Trans. Sensor Netw., vol. 3, no. 4, pp. 259-271, 2007.
-
(2007)
ACM Trans. Sensor Netw.
, vol.3
, Issue.4
, pp. 259-271
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
Ning, P.4
-
18
-
-
84919474373
-
Commutative cipher based en-route filtering in wireless sensor networks
-
H. Yang and S. Lu, "Commutative cipher based en-route filtering in wireless sensor networks," in Proc. 60th IEEE Veh. Technol. Conf. (VTC), 2004, pp. 12-23.
-
(2004)
Proc. 60th IEEE Veh. Technol. Conf. (VTC)
, pp. 12-23
-
-
Yang, H.1
Lu, S.2
-
19
-
-
77249083598
-
A dynamic en-route filtering scheme for data reporting in wireless sensor networks
-
Z. Yu and Y. Guan, "A dynamic en-route filtering scheme for data reporting in wireless sensor networks," IEEE/ACM Trans. Networking (ToN), vol. 18, pp. 150-163, 2010.
-
(2010)
IEEE/ACM Trans. Networking (ToN)
, vol.18
, pp. 150-163
-
-
Yu, Z.1
Guan, Y.2
-
21
-
-
62849119348
-
Kaef: An en-route scheme of filtering false data in wireless sensor networks
-
T. Yuan, S. Zhang, Y.-P. Zhong, and J. Ma, "Kaef: An en-route scheme of filtering false data in wireless sensor networks," in Proc. IEEE Int. Perform. Comput. Commun. Conf. (IPCCC), 2008, pp. 193-200.
-
(2008)
Proc. IEEE Int. Perform. Comput. Commun. Conf. (IPCCC)
, pp. 193-200
-
-
Yuan, T.1
Zhang, S.2
Zhong, Y.-P.3
Ma, J.4
-
22
-
-
80053276871
-
A method to control the probability of attempts to verify a report in statistical en-route filtering
-
H. W. Lee, S. Y. Moon, and T. H. Cho, "A method to control the probability of attempts to verify a report in statistical en-route filtering," in Proc. 7th Int. Conf. Digital Content Multimedia Technol. Appl. (IDCTA), 2011, pp. 160-164.
-
(2011)
Proc. 7th Int. Conf. Digital Content Multimedia Technol. Appl. (IDCTA)
, pp. 160-164
-
-
Lee, H.W.1
Moon, S.Y.2
Cho, T.H.3
-
23
-
-
48149096744
-
Ras: A robust authentication scheme for filtering false data in wireless sensor networks
-
Y. Hu, Y. Lin, Y. Liu, and W. Zeng, "Ras: A robust authentication scheme for filtering false data in wireless sensor networks," in Proc. 15th IEEE Int. Conf. Netw. (ICON), 2007, pp. 200-205.
-
(2007)
Proc. 15th IEEE Int. Conf. Netw. (ICON)
, pp. 200-205
-
-
Hu, Y.1
Lin, Y.2
Liu, Y.3
Zeng, W.4
-
24
-
-
34548186480
-
Stef: A secure ticket-based en-route filtering scheme for wireless sensor networks
-
C. Kraub, M. Schneider, K. Bayarou, and C. Eckert, "Stef: A secure ticket-based en-route filtering scheme for wireless sensor networks," in Proc. 2nd Int. Conf. Availability Reliability Security (ARES), 2007, pp. 200-205.
-
(2007)
Proc. 2nd Int. Conf. Availability Reliability Security (ARES)
, pp. 200-205
-
-
Kraub, C.1
Schneider, M.2
Bayarou, K.3
Eckert, C.4
-
25
-
-
84863148738
-
Towards effective en-route filtering against injected false data in wireless sensor networks
-
J. Lin, X. Yang, W. Yu, and X. Fu, "Towards effective en-route filtering against injected false data in wireless sensor networks," in Proc. IEEE Global Telecommun. Conf. (GLOBECOM), 2011, pp. 1-6.
-
(2011)
Proc. IEEE Global Telecommun. Conf. (GLOBECOM)
, pp. 1-6
-
-
Lin, J.1
Yang, X.2
Yu, W.3
Fu, X.4
-
26
-
-
51349136300
-
Lightweight and compromise-resilient message authentication in sensor networks
-
W. Zhang, N. Subramanian, and G. Wang, "Lightweight and compromise-resilient message authentication in sensor networks," in Proc. 27th IEEE Int. Conf. Comput. Commun. (INFOCOM), 2008, pp. 1418-1426.
-
(2008)
Proc. 27th IEEE Int. Conf. Comput. Commun. (INFOCOM)
, pp. 1418-1426
-
-
Zhang, W.1
Subramanian, N.2
Wang, G.3
-
27
-
-
74049147013
-
Attacking cryptographic schemes based on perturbation polynomials
-
M. Albrecht, C. Gentry, S. Halevi, and J. Katz, "Attacking cryptographic schemes based on perturbation polynomials," in Proc. 16th ACM Conf. Comput. Commun. Security (CCS), 2009, pp. 1-10.
-
(2009)
Proc. 16th ACM Conf. Comput. Commun. Security (CCS)
, pp. 1-10
-
-
Albrecht, M.1
Gentry, C.2
Halevi, S.3
Katz, J.4
-
28
-
-
79953146655
-
False data injection attacks against state estimation in wireless sensor networks
-
Y. Mo, E. Garone, A. Casavola, and B. Sinopoli, "False data injection attacks against state estimation in wireless sensor networks," in Proc. 49th IEEE Conf. Decision Control (CDC'10), 2010, pp. 5967-5972.
-
(2010)
Proc. 49th IEEE Conf. Decision Control (CDC'10)
, pp. 5967-5972
-
-
Mo, Y.1
Garone, E.2
Casavola, A.3
Sinopoli, B.4
-
29
-
-
34547645758
-
Securing distributed data storage and retrieval in sensor networks
-
N. Subramanian, C. Yang, andW.Zhang, "Securing distributed data storage and retrieval in sensor networks," in Proc. 27th IEEE Int. Conf. Pervasive Comput. Commun. (PerCom), 2007, pp. 191-200.
-
(2007)
Proc. 27th IEEE Int. Conf. Pervasive Comput. Commun. (PerCom)
, pp. 191-200
-
-
Subramanian, N.1
Yang, C.2
Zhang, W.3
-
30
-
-
37849028668
-
A random perturbationbased pairwise key establishment scheme for sensor networks
-
W. Zhang, M. Tran, S. Zhu, and G. Cao, "A random perturbationbased pairwise key establishment scheme for sensor networks," in Proc. 8th ACM Int. Symp. Mobile Ad Hoc Netw. Comput. (MobiHoc), 2007, pp. 90-99.
-
(2007)
Proc. 8th ACM Int. Symp. Mobile Ad Hoc Netw. Comput. (MobiHoc)
, pp. 90-99
-
-
Zhang, W.1
Tran, M.2
Zhu, S.3
Cao, G.4
|