메뉴 건너뛰기




Volumn , Issue , 2015, Pages 55-66

Scheduling intrusion detection systems in resource-bounded cyber-physical systems

Author keywords

Cyber physical system; Dominating sets; Game theory; Intrusion detection systems; Scheduling; Sensor networks

Indexed keywords

COMPUTATION THEORY; COMPUTER CRIME; EMBEDDED SYSTEMS; GAME THEORY; HEURISTIC ALGORITHMS; MERCURY (METAL); OPTIMIZATION; SCHEDULING; SENSOR NETWORKS; WATER DISTRIBUTION SYSTEMS; WATER SUPPLY SYSTEMS;

EID: 84964801519     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2808705.2808711     Document Type: Conference Paper
Times cited : (13)

References (26)
  • 1
    • 84964871781 scopus 로고    scopus 로고
    • Characterizing heterogeneity in cooperative networks from a resource distribution view-point
    • W. Abbas and M. Egerstedt. Characterizing heterogeneity in cooperative networks from a resource distribution view-point. Communications in Information and Systems, 14:1-22, 2014.
    • (2014) Communications in Information and Systems , vol.14 , pp. 1-22
    • Abbas, W.1    Egerstedt, M.2
  • 4
    • 84855324392 scopus 로고    scopus 로고
    • A new mathematical formulation and a heuristic for the maximum disjoint set covers problem to improve the lifetime of the wireless sensor network
    • N. Ahn and S. Park. A new mathematical formulation and a heuristic for the maximum disjoint set covers problem to improve the lifetime of the wireless sensor network. Ad Hoc & Sensor Wireless Networks, 13(3-4):209-225, 2011.
    • (2011) Ad Hoc & Sensor Wireless Networks , vol.13 , Issue.3-4 , pp. 209-225
    • Ahn, N.1    Park, S.2
  • 6
    • 0038483826 scopus 로고    scopus 로고
    • Emergence of scaling in random networks
    • October
    • A.-L. Barabàsi and R. Albert. Emergence of scaling in random networks. Science, 286(5439):509-512, October 1999.
    • (1999) Science , vol.286 , Issue.5439 , pp. 509-512
    • Barabàsi, A.-L.1    Albert, R.2
  • 7
    • 43949168352 scopus 로고
    • The statistical mechanics of strategic interaction
    • L. E. Blume. The statistical mechanics of strategic interaction. Games and economic behavior, 5(3):387-424, 1993.
    • (1993) Games and Economic Behavior , vol.5 , Issue.3 , pp. 387-424
    • Blume, L.E.1
  • 8
  • 9
    • 24044520078 scopus 로고    scopus 로고
    • Improving wireless sensor network lifetime through power aware organization
    • M. Cardei and D.-Z. Du. Improving wireless sensor network lifetime through power aware organization. Wireless Networks, 11(3):333-340, 2005.
    • (2005) Wireless Networks , vol.11 , Issue.3 , pp. 333-340
    • Cardei, M.1    Du, D.-Z.2
  • 10
    • 84885598814 scopus 로고    scopus 로고
    • Optimal coverage of an infrastructure network using sensors with distance-decaying sensing quality
    • A. Deshpande, S. E. Sarma, K. Youcef-Toumi, and S. Mekid. Optimal coverage of an infrastructure network using sensors with distance-decaying sensing quality. Automatica, 49(11):3351-3358, 2013.
    • (2013) Automatica , vol.49 , Issue.11 , pp. 3351-3358
    • Deshpande, A.1    Sarma, S.E.2    Youcef-Toumi, K.3    Mekid, S.4
  • 12
    • 0038675712 scopus 로고    scopus 로고
    • A study on r-configurations|a resource assignment problem on graphs
    • S. Fujita, M. Yamashita, and T. Kameda. A study on r-configurations|a resource assignment problem on graphs. SIAM Journal on Discrete Mathematics, 13(2):227-254, 2000.
    • (2000) SIAM Journal on Discrete Mathematics , vol.13 , Issue.2 , pp. 227-254
    • Fujita, S.1    Yamashita, M.2    Kameda, T.3
  • 13
    • 84884510608 scopus 로고    scopus 로고
    • Approximating maximum disjoint coverage in wireless sensor networks
    • Springer
    • S. Henna and T. Erlebach. Approximating maximum disjoint coverage in wireless sensor networks. In Ad-hoc, Mobile, and Wireless Network, pages 148-159. Springer, 2013.
    • (2013) Ad-hoc, Mobile, and Wireless Network , pp. 148-159
    • Henna, S.1    Erlebach, T.2
  • 16
    • 84909605962 scopus 로고    scopus 로고
    • The Stuxnet attack on Iran's nuclear plant was 'far more dangerous' than previously thought
    • Nov. Accessed: June 21st, 2015
    • M. B. Kelley. The Stuxnet attack on Iran's nuclear plant was 'far more dangerous' than previously thought. Business Insider, http: //www.businessinsider.com/stuxnet-was-far-more-dangerous-than-previous-thought-2013-11, Nov 2013. Accessed: June 21st, 2015.
    • (2013) Business Insider
    • Kelley, M.B.1
  • 17
    • 84874917979 scopus 로고    scopus 로고
    • The real story of Stuxnet
    • D. Kushner. The real story of Stuxnet. IEEE Spectrum, 50(3):48-53, 2013.
    • (2013) IEEE Spectrum , vol.50 , Issue.3 , pp. 48-53
    • Kushner, D.1
  • 18
    • 84860623901 scopus 로고    scopus 로고
    • Revisiting log-linear learning: Asynchrony, completeness, and pay-off based implementation
    • J. Marden and J. Shamma. Revisiting log-linear learning: Asynchrony, completeness, and pay-off based implementation. Games and Economic Behavior, 75(2):788-808, 2012.
    • (2012) Games and Economic Behavior , vol.75 , Issue.2 , pp. 788-808
    • Marden, J.1    Shamma, J.2
  • 24
    • 84886625093 scopus 로고    scopus 로고
    • A game theoretic approach to distributed coverage of graphs by heterogeneous mobile agents
    • A. Y. Yazicioglu, M. Egerstedt, and J. S. Shamma. A game theoretic approach to distributed coverage of graphs by heterogeneous mobile agents. In Estimation and Control of Networked Systems, volume 4, pages 309-315, 2013.
    • (2013) Estimation and Control of Networked Systems , vol.4 , pp. 309-315
    • Yazicioglu, A.Y.1    Egerstedt, M.2    Shamma, J.S.3
  • 26
    • 84876120053 scopus 로고    scopus 로고
    • Distributed coverage games for energy-aware mobile sensor networks
    • M. Zhu and S. Martínez. Distributed coverage games for energy-aware mobile sensor networks. SIAM Journal on Control and Optimization, 51(1):1-27, 2013.
    • (2013) SIAM Journal on Control and Optimization , vol.51 , Issue.1 , pp. 1-27
    • Zhu, M.1    Martínez, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.