-
1
-
-
84894668409
-
Context aware computing for the internet of things: A survey
-
C. Perera et al., "Context Aware Computing for the Internet of Things: A Survey," IEEE Comm. Surveys & Tutorials, vol. 16, no. 1, 2014, pp. 414-454.
-
(2014)
IEEE Comm. Surveys & Tutorials
, vol.16
, Issue.1
, pp. 414-454
-
-
Perera, C.1
-
2
-
-
84928741396
-
Processing distributed internet of things data in clouds
-
L. Wang and R. Ranjan, "Processing Distributed Internet of Things Data in Clouds," IEEE Cloud Computing, vol. 2, no. 1, 2015, pp. 76-80.
-
(2015)
IEEE Cloud Computing
, vol.2
, Issue.1
, pp. 76-80
-
-
Wang, L.1
Ranjan, R.2
-
3
-
-
84961627543
-
Streaming big data processing in datacenter clouds
-
R. Ranjan, "Streaming Big Data Processing in Datacenter Clouds," IEEE Cloud Computing, vol. 1, no. 1, 2014, pp. 78-80.
-
(2014)
IEEE Cloud Computing
, vol.1
, Issue.1
, pp. 78-80
-
-
Ranjan, R.1
-
5
-
-
77949684516
-
Biotex-biosensing textiles for personalised healthcare management
-
S. Coyle et al., "BIOTEX-Biosensing Textiles for Personalised Healthcare Management," IEEE Trans. Information Technology in Biomedicine, vol. 14, no. 2, 2010, pp. 364-370.
-
(2010)
IEEE Trans. Information Technology in Biomedicine
, vol.14
, Issue.2
, pp. 364-370
-
-
Coyle, S.1
-
6
-
-
84921059375
-
Fine-grained analysis of packet losses in wireless sensor networks
-
B. Shebaro, D. Midi, and E. Bertino, "Fine-Grained Analysis of Packet Losses in Wireless Sensor Networks," Proc. 11th Ann. IEEE Int'l Conf. Sensing, Comm., and Networking (SECON 14), 2014.
-
(2014)
Proc. 11th Ann. IEEE Int'l Conf. Sensing, Comm., and Networking (SECON 14)
-
-
Shebaro, B.1
Midi, D.2
Bertino, E.3
-
7
-
-
84868318852
-
A comprehensive model for provenance
-
Springer
-
S. Sultana and E. Bertino, "A Comprehensive Model for Provenance," Advances in Conceptual Modeling, LNCS 7518, Springer, 2012, pp. 121-130.
-
(2012)
Advances in Conceptual Modeling, LNCS
, vol.7518
, pp. 121-130
-
-
Sultana, S.1
Bertino, E.2
-
8
-
-
84969911373
-
Demonstrating a lightweight data provenance for sensor networks
-
B. Shebaro et al., "Demonstrating a Lightweight Data Provenance for Sensor Networks," Proc. ACM Conf. Computer and Comm. Security (CCS 12), 2012, pp. 320-328.
-
(2012)
Proc. ACM Conf. Computer and Comm. Security (CCS 12)
, pp. 320-328
-
-
Shebaro, B.1
-
9
-
-
84929326090
-
A lightweight secure scheme for detecting provenance forgery and packet drop attacks in wireless sensor networks
-
S. Sultana et al., "A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks," IEEE Trans. Dependable and Secure Computing, vol. 12, no. 3, 2015, pp. 256-269.
-
(2015)
IEEE Trans. Dependable and Secure Computing
, vol.12
, Issue.3
, pp. 256-269
-
-
Sultana, S.1
-
12
-
-
84867604390
-
A survey of intrusion detection schemes in wireless sensor networks
-
M. A. Rassam, M. A. Maarof, and A. Zainal, "A Survey of Intrusion Detection Schemes in Wireless Sensor Networks," Am. J. Applied Sciences, vol. 9, no. 10, 2012, pp. 1636-1652.
-
(2012)
Am. J. Applied Sciences
, vol.9
, Issue.10
, pp. 1636-1652
-
-
Rassam, M.A.1
Maarof, M.A.2
Zainal, A.3
-
13
-
-
84921344790
-
Effective key management in dynamic wireless sensor networks
-
S. H. Seo et al., "Effective Key Management in Dynamic Wireless Sensor Networks," IEEE Trans. Information Forensics and Security, vol. 10, no. 2, 2015, pp. 371-383.
-
(2015)
IEEE Trans. Information Forensics and Security
, vol.10
, Issue.2
, pp. 371-383
-
-
Seo, S.H.1
-
16
-
-
84914106859
-
Kinesis: A security incident response and prevention system for wireless sensor networks
-
S. Sultana, D. Midi, and E. Bertino, "Kinesis: A Security Incident Response and Prevention System for Wireless Sensor Networks," Proc. 12th ACM Conf. Embedded Network Sensor Systems (SenSys 14), 2014, pp. 148-162.
-
(2014)
Proc. 12th ACM Conf. Embedded Network Sensor Systems (SenSys 14)
, pp. 148-162
-
-
Sultana, S.1
Midi, D.2
Bertino, E.3
-
17
-
-
1442296009
-
The cougar approach to in-network query processing in sensor networks
-
Y. Yao and J. Gehrke, "The Cougar Approach to In-Network Query Processing in Sensor Networks," ACM SIGMOD Record, vol. 31, no. 3, 2002, pp. 9-18.
-
(2002)
ACM SIGMOD Record
, vol.31
, Issue.3
, pp. 9-18
-
-
Yao, Y.1
Gehrke, J.2
-
18
-
-
33244476757
-
Operator placement for in-network stream query processing
-
U. Srivastava, K. Munagala, and J. Widom, "Operator Placement for In-Network Stream Query Processing," Proc. 24th ACM SIGMODSIGACT-SIGART Symp. Principles of Database Systems (PODS 05), 2005, pp. 250-258.
-
(2005)
Proc. 24th ACM SIGMODSIGACT-SIGART Symp. Principles of Database Systems (PODS 05)
, pp. 250-258
-
-
Srivastava, U.1
Munagala, K.2
Widom, J.3
-
20
-
-
84996757871
-
Finding your way in the fog: Towards a comprehensive definition of fog computing
-
L. M. Vaquero and L. Rodero-Merino, "Finding Your Way in the Fog: Towards a Comprehensive Definition of Fog Computing," SIGComm Computing Comm. Rev., vol. 44, no. 5, 2014, pp. 27-32.
-
(2014)
SIGComm Computing Comm. Rev.
, vol.44
, Issue.5
, pp. 27-32
-
-
Vaquero, L.M.1
Rodero-Merino, L.2
|