-
1
-
-
84865621915
-
Code division multiple access/pulse position modulation ultra-wideband radio frequency identification for Internet of Things: Concept and analysis
-
Zhang, Z.; Lu, Z.; Chen, Q.; Yan, X.; Zheng, L.R. Code division multiple access/pulse position modulation ultra-wideband radio frequency identification for Internet of Things: Concept and analysis. Int. J. Commun. Syst. 2012, 25, 1103-1121.
-
(2012)
Int. J. Commun. Syst
, vol.25
, pp. 1103-1121
-
-
Zhang, Z.1
Lu, Z.2
Chen, Q.3
Yan, X.4
Zheng, L.R.5
-
2
-
-
84865624460
-
Technology classification, industry, and education for Future Internet of Things
-
Ning, H.; Hu, S. Technology classification, industry, and education for Future Internet of Things. Int. J. Commun. Syst. 2012, 25, 1230-1241.
-
(2012)
Int. J. Commun. Syst
, vol.25
, pp. 1230-1241
-
-
Ning, H.1
Hu, S.2
-
3
-
-
84865649356
-
An integrated scheme based on service classification in pervasive mobile services
-
Liu, Y.; Chen, Z.; Xia, F.; Lv, X.; Bu, F. An integrated scheme based on service classification in pervasive mobile services. Int. J. Commun. Syst. 2012, 25, 1178-1188.
-
(2012)
Int. J. Commun. Syst
, vol.25
, pp. 1178-1188
-
-
Liu, Y.1
Chen, Z.2
Xia, F.3
Lv, X.4
Bu, F.5
-
4
-
-
77956064262
-
Smart transmission grid:Vision and framework
-
Li, F.; Qiao, W.; Sun, H.; Wan, H.; Wang, J.; Xia, Y.; Xu, Z.; Zhang, P. Smart transmission grid:Vision and framework. IEEE Trans. Smart Grid 2010, 1, 168-177.
-
(2010)
IEEE Trans. Smart Grid
, vol.1
, pp. 168-177
-
-
Li, F.1
Qiao, W.2
Sun, H.3
Wan, H.4
Wang, J.5
Xia, Y.6
Xu, Z.7
Zhang, P.8
-
5
-
-
67649655903
-
Standards for the smart grid
-
Atlanta, GA, USA, 17-18 November
-
DeBlasio, R.; Tom, C. Standards for the smart grid. In Proceedings of the Energy 2030 Conference (ENERGY 2008), Atlanta, GA, USA, 17-18 November 2008.
-
(2008)
Proceedings of the Energy 2030 Conference (ENERGY 2008)
-
-
DeBlasio, R.1
Tom, C.2
-
6
-
-
84872133588
-
Bad data injection in smart grid: Attack and defense mechanisms
-
Huang, Y.; Esmalifalak, M.; Nguyen, H.; Zheng, R.; Han, Z.; Li, H.; Song, L. Bad data injection in smart grid: Attack and defense mechanisms. IEEE Commun. Mag. 2013, 51, 27-33.
-
(2013)
IEEE Commun. Mag
, vol.51
, pp. 27-33
-
-
Huang, Y.1
Esmalifalak, M.2
Nguyen, H.3
Zheng, R.4
Han, Z.5
Li, H.6
Song, L.7
-
7
-
-
84866894875
-
A Novel En-Route Filtering Scheme against False Data Injection Attacks in Cyber-Physical Networked Systems
-
Macau, China, 18-21 June
-
Yang, X.; Lin, J.; Moulema, P.; Yu, W.; Fu, X.; Zhao, W. A Novel En-Route Filtering Scheme against False Data Injection Attacks in Cyber-Physical Networked Systems. In Proceedings of the IEEE 32nd International Conference on Distributed Computing Systems(ICDCS), Macau, China, 18-21 June 2012; pp. 92-101.
-
(2012)
Proceedings of the IEEE 32nd International Conference on Distributed Computing Systems(ICDCS)
, pp. 92-101
-
-
Yang, X.1
Lin, J.2
Moulema, P.3
Yu, W.4
Fu, X.5
Zhao, W.6
-
8
-
-
82155175605
-
Integrity Data Attacks in Power Market Operations
-
Xie, L.; Mo, Y.; Sinopoli, B. Integrity Data Attacks in Power Market Operations. IEEE Trans. Smart Grid 2011, 2, 659-666.
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, pp. 659-666
-
-
Xie, L.1
Mo, Y.2
Sinopoli, B.3
-
9
-
-
34247361254
-
SCUBA: Secure code update by attestation in sensor networks
-
Los Angeles, CA, USA, 29 September
-
Seshadri, A.; Luk, M.; Perrig, A.; van Doorn, L.; Khosla, P. SCUBA: Secure code update by attestation in sensor networks. In Proceedings of the 5th ACM Workshop on Wireless Security, Los Angeles, CA, USA, 29 September 2006; pp. 85-94.
-
(2006)
Proceedings of the 5th ACM Workshop on Wireless Security
, pp. 85-94
-
-
Seshadri, A.1
Luk, M.2
Perrig, A.3
Van Doorn, L.4
Khosla, P.5
-
10
-
-
80051971317
-
OMAP: One-way memory attestation protocol for smart meters
-
Busan, Korea, 26-28 May
-
Song, K.; Seo, D.; Park, H.; Lee, H.; Perrig, A. OMAP: One-way memory attestation protocol for smart meters. In Proceedings of the Ninth IEEE International Symposium on Parallel and Distributed Processing with Applications Workshops (ISPAW), Busan, Korea, 26-28 May 2011; pp. 111-118.
-
(2011)
Proceedings of the Ninth IEEE International Symposium on Parallel and Distributed Processing with Applications Workshops (ISPAW)
, pp. 111-118
-
-
Song, K.1
Seo, D.2
Park, H.3
Lee, H.4
Perrig, A.5
-
11
-
-
3042738543
-
Swatt: Software-based attestation for embedded devices
-
Oakland, CA, USA, 9-12 May
-
Seshadri, A.; Perrig, A.; van Doorn, L.; Khosla, P. Swatt: Software-based attestation for embedded devices. In Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, USA, 9-12 May 2004; pp. 272-282.
-
(2004)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 272-282
-
-
Seshadri, A.1
Perrig, A.2
Van Doorn, L.3
Khosla, P.4
-
12
-
-
84893444022
-
A Secure and Trusted Channel Protocol for the User Centric Smart Card Ownership Model
-
Melbourne, VIC, Australia, 16-18 July
-
Akram, R.N.; Markantonakis, K.; Mayes, K. A Secure and Trusted Channel Protocol for the User Centric Smart Card Ownership Model. In Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Melbourne, VIC, Australia, 16-18 July 2013; pp. 336-345.
-
(2013)
Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
, pp. 336-345
-
-
Akram, R.N.1
Markantonakis, K.2
Mayes, K.3
-
13
-
-
84889015000
-
A security framework for the analysis and design of software attestation
-
Berlin, Germany, 4-8 November
-
Armknecht, F.; Sadeghi, A.R.; Schulz, S.; Wachsmann, C. A security framework for the analysis and design of software attestation. In Proceedings of the 2013 ACM SIGSAC conference on Computer & Communications Security, Berlin, Germany, 4-8 November 2013; pp. 1-12.
-
(2013)
Proceedings of the 2013 ACM SIGSAC conference on Computer & Communications Security
, pp. 1-12
-
-
Armknecht, F.1
Sadeghi, A.R.2
Schulz, S.3
Wachsmann, C.4
-
14
-
-
47249110641
-
Distributed software-based attestation for node compromise detection in sensor networks
-
Beijing, China, 10-12 October
-
Yang, Y.; Wang, X.; Zhu, S.; Cao, G. Distributed software-based attestation for node compromise detection in sensor networks. In Proceedings of the 26th IEEE International Symposium on Reliable Distributed Systems (SRDS), Beijing, China, 10-12 October 2007; pp. 219-230.
-
(2007)
Proceedings of the 26th IEEE International Symposium on Reliable Distributed Systems (SRDS)
, pp. 219-230
-
-
Yang, Y.1
Wang, X.2
Zhu, S.3
Cao, G.4
-
15
-
-
33745736071
-
Remote software-based attestation for wireless sensors
-
Springer: Visegrad, Hungary, 13-14 July
-
Shaneck, M.; Mahadevan, K.; Kher, V.; Kim, Y. Remote software-based attestation for wireless sensors. In Security and Privacy in Ad-Hoc and Sensor Networks; Springer: Visegrad, Hungary, 13-14 July 2005; pp. 27-41.
-
(2005)
Security and Privacy in Ad-Hoc and Sensor Networks
, pp. 27-41
-
-
Shaneck, M.1
Mahadevan, K.2
Kher, V.3
Kim, Y.4
-
16
-
-
78650856954
-
Determining the integrity of application binaries on unsecure legacy machines using software based remote attestation
-
Gandhinagar, India, 17-19 December
-
Srinivasan, R.; Dasgupta, P.; Gohad, T.; Bhattacharya, A. Determining the integrity of application binaries on unsecure legacy machines using software based remote attestation. In Proceedings of 6th International Conference on Information Systems Security (ICISS 2010), Gandhinagar, India, 17-19 December 2010; pp. 66-80.
-
(2010)
Proceedings of 6th International Conference on Information Systems Security (ICISS 2010)
, pp. 66-80
-
-
Srinivasan, R.1
Dasgupta, P.2
Gohad, T.3
Bhattacharya, A.4
-
17
-
-
79955927236
-
Practical and secure software-based attestation
-
Istanbul, Turkey, 14-15 March
-
Jakobsson, M.; Johansson, K.A. Practical and secure software-based attestation. In Proceedings of the IEEE Workshop on Lightweight Security & Privacy: Devices, Protocols and Applications (LightSec), Istanbul, Turkey, 14-15 March 2011; pp. 1-9.
-
(2011)
Proceedings of the IEEE Workshop on Lightweight Security & Privacy: Devices, Protocols and Applications (LightSec)
, pp. 1-9
-
-
Jakobsson, M.1
Johansson, K.A.2
-
18
-
-
74049112175
-
On the difficulty of software-based attestation of embedded devices
-
Chicago, IL, USA, 9-13 November
-
Castelluccia, C.; Francillon, A.; Perito, D.; Soriente, C. On the difficulty of software-based attestation of embedded devices. In Proceedings of the 16th ACM Conference on Computer and Communications Security, Chicago, IL, USA, 9-13 November 2009; pp. 400-409.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 400-409
-
-
Castelluccia, C.1
Francillon, A.2
Perito, D.3
Soriente, C.4
-
19
-
-
79951648231
-
Review and evaluation of security threats on the communication networks in the smart grid
-
San Jose, CA, USA, 31 October-3 November
-
Lu, Z.; Lu, X.; Wang, W.; Wang, C. Review and evaluation of security threats on the communication networks in the smart grid. In Proceedings of the IEEE Military Communications Conference (MILCOM), San Jose, CA, USA, 31 October-3 November 2010; pp. 1830-1835.
-
(2010)
Proceedings of the IEEE Military Communications Conference (MILCOM)
, pp. 1830-1835
-
-
Lu, Z.1
Lu, X.2
Wang, W.3
Wang, C.4
-
20
-
-
84863111146
-
A new security model to prevent denial-of-service attacks and violation of availability in wireless networks
-
Malekzadeh, M.; Ghani, A.A.A.; Subramaniam, S. A new security model to prevent denial-of-service attacks and violation of availability in wireless networks. Int. J. Commun. Syst.2012, 25, 903-925.
-
(2012)
Int. J. Commun. Syst
, vol.25
, pp. 903-925
-
-
Malekzadeh, M.1
Ghani, A.A.A.2
Subramaniam, S.3
-
21
-
-
84858114952
-
A Survey on Selective Forwarding Attack in Wireless Sensor Networks
-
Mesra, Ranchi, India, 24-25 February
-
Bysani, L.; Turuk, A. A Survey on Selective Forwarding Attack in Wireless Sensor Networks. In Proceedings of the IEEE International Conference on Devices and Communications (ICDeCom), Mesra, Ranchi, India, 24-25 February 2011; pp. 1-5.
-
(2011)
Proceedings of the IEEE International Conference on Devices and Communications (ICDeCom)
, pp. 1-5
-
-
Bysani, L.1
Turuk, A.2
-
22
-
-
84911951617
-
Secure multicast routing protocols in mobile ad-hoc networks
-
Moamen, A.A.; Hamza, H.S.; Saroit, I.A. Secure multicast routing protocols in mobile ad-hoc networks. Int. J. Commun. Syst. 2014, 27, 2808-2831.
-
(2014)
Int. J. Commun. Syst
, vol.27
, pp. 2808-2831
-
-
Moamen, A.A.1
Hamza, H.S.2
Saroit, I.A.3
-
23
-
-
79956370485
-
Multigate communication network for smart grid
-
Gharavi, H.; Hu, B. Multigate communication network for smart grid. IEEE Proc. 2011, 99, 1028-1045.
-
(2011)
IEEE Proc
, vol.99
, pp. 1028-1045
-
-
Gharavi, H.1
Hu, B.2
-
24
-
-
74049113264
-
False Data Injection Attacks against State Estimation in Electric Power Grids
-
Chicago, IL, USA, 9-13 November
-
Liu, Y.; Reiter, M.K.; Ning, P. False Data Injection Attacks against State Estimation in Electric Power Grids. In Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS), Chicago, IL, USA, 9-13 November 2009; pp. 21-32.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS)
, pp. 21-32
-
-
Liu, Y.1
Reiter, M.K.2
Ning, P.3
-
25
-
-
84919466772
-
A Novel En-Route Filtering Scheme against False Data Injection Attacks in Cyber-Physical Networked Systems
-
Yang, X.; Lin, J.; Moulema, P.; Yu, W.; Fu, X.; Zhao, W. (Eds.) A Novel En-Route Filtering Scheme against False Data Injection Attacks in Cyber-Physical Networked Systems. IEEE Trans. Comput. 2015, 64, 4-18.
-
(2015)
IEEE Trans. Comput
, vol.64
, pp. 4-18
-
-
Yang, X.1
Lin, J.2
Moulema, P.3
Yu, W.4
Fu, X.5
Zhao, W.6
-
26
-
-
84861506150
-
On False Data Injection Attacks against Distributed Energy Routing in Smart Grid
-
Beijing, China, 17-19 April
-
Lin, J.; Yu, W.; Yang, X.; Xu, G.; Zhao, W. On False Data Injection Attacks against Distributed Energy Routing in Smart Grid. In Proceedings of the 2012 IEEE/ACM Third International Conference on Cyber-Physical Systems (ICCPS), Beijing, China, 17-19 April 2012.
-
(2012)
Proceedings of the 2012 IEEE/ACM Third International Conference on Cyber-Physical Systems (ICCPS)
-
-
Lin, J.1
Yu, W.2
Yang, X.3
Xu, G.4
Zhao, W.5
-
27
-
-
84880882490
-
A Novel Delay-resilient Remote Memory Attestation for Smart Grid
-
Zhangjiajie, China, 7-10 August
-
He, X.; Yang, X.; Li, R.; Yang, Q. A Novel Delay-resilient Remote Memory Attestation for Smart Grid. In Proceedings of 8th International Conference on Wireless Algorithms, Systems, and Applications (WASA), Zhangjiajie, China, 7-10 August 2013; pp. 88-89.
-
(2013)
Proceedings of 8th International Conference on Wireless Algorithms, Systems, and Applications (WASA)
, pp. 88-89
-
-
He, X.1
Yang, X.2
Li, R.3
Yang, Q.4
-
29
-
-
83055180235
-
A TPM-enabled remote attestation protocol (TRAP) in wireless sensor networks
-
Miami Beach, FL, USA, 31 October-4 November
-
Tan, H.; Hu, W.; Jha, S. A TPM-enabled remote attestation protocol (TRAP) in wireless sensor networks. In Proceedings of the 6th ACMWorkshop on PerformanceMonitoring andMeasurement of HeterogeneousWireless andWired Networks,Miami Beach, FL, USA, 31 October-4 November 2011; pp. 9-16.
-
(2011)
Proceedings of the 6th ACMWorkshop on PerformanceMonitoring andMeasurement of HeterogeneousWireless andWired Networks
, pp. 9-16
-
-
Tan, H.1
Hu, W.2
Jha, S.3
-
31
-
-
84880889946
-
-
Technical Report CMU-CS-04-187; School of Computer Science, Carnegie Mellon University: Carnegie Mellon, PA, USA
-
Seshadri, A.; Luk, M.; Perrig, A.; van Doorn, L.; Khosla, P. Using FIRE & ICE for Detecting and Recovering Compromised Nodes in Sensor Networks; Technical Report CMU-CS-04-187; School of Computer Science, Carnegie Mellon University: Carnegie Mellon, PA, USA, 2004.
-
(2004)
Using FIRE & ICE for Detecting and Recovering Compromised Nodes in Sensor Networks
-
-
Seshadri, A.1
Luk, M.2
Perrig, A.3
Van Doorn, L.4
Khosla, P.5
-
32
-
-
79955594692
-
SAKE: Software attestation for key establishment in sensor networks
-
Seshadri, A.; Luk, M.; Perrig, A. SAKE: Software attestation for key establishment in sensor networks. Ad Hoc Netw. 2011, 9, 1059-1067.
-
(2011)
Ad Hoc Netw
, vol.9
, pp. 1059-1067
-
-
Seshadri, A.1
Luk, M.2
Perrig, A.3
-
33
-
-
84885617227
-
Pioneer: Verifying code integrity and enforcing untampered code execution on legacy systems
-
Seshadri, A.; Luk, M.; Shi, E.; Perrig, A.; van Doorn, L.; Khosla, P. Pioneer: Verifying code integrity and enforcing untampered code execution on legacy systems. ACM SIGOPS Oper. Syst. Rev. 2005, 39, 1-16.
-
(2005)
ACM SIGOPS Oper. Syst. Rev
, vol.39
, pp. 1-16
-
-
Seshadri, A.1
Luk, M.2
Shi, E.3
Perrig, A.4
Van Doorn, L.5
Khosla, P.6
-
34
-
-
84868557944
-
SMATT: Smart Meter ATTestation Using Multiple Target Selection and Copy-Proof Memory
-
Jeju, Korea, 22-25 November
-
Park, H.; Seo, D.; Lee, H.; Perrig, A. SMATT: Smart Meter ATTestation Using Multiple Target Selection and Copy-Proof Memory. In Proceedings of 4th FTRA International Conference on Computer Science and its Applications (CSA 2012), Jeju, Korea, 22-25 November 2012; pp. 875-887.
-
(2012)
Proceedings of 4th FTRA International Conference on Computer Science and its Applications (CSA 2012)
, pp. 875-887
-
-
Park, H.1
Seo, D.2
Lee, H.3
Perrig, A.4
-
35
-
-
84861881940
-
Cumulative attestation kernels for embedded systems
-
LeMay, M.; Gunter, C.A. Cumulative attestation kernels for embedded systems. IEEE Trans. Smart Grid 2012, 3, 744-760.
-
(2012)
IEEE Trans. Smart Grid
, vol.3
, pp. 744-760
-
-
LeMay, M.1
Gunter, C.A.2
|