-
1
-
-
79952087250
-
Distributed Event Detection in Wireless Sensor Networks for Disaster Management
-
Thessaloniki, Greece, 24-26 November
-
Bahrepour, M.; Meratnia, N.; Poel, M.; Taghikhaki, Z.; Havinga, P.J.M. Distributed Event Detection in Wireless Sensor Networks for Disaster Management. In Proceedings of the 2nd International Conference on Intelligent Networking and Collaborative Systems, Thessaloniki, Greece, 24-26 November 2010; pp. 507-512
-
(2010)
Proceedings of the 2nd International Conference on Intelligent Networking and Collaborative Systems
, pp. 507-512
-
-
Bahrepour, M.1
Meratnia, N.2
Poel, M.3
Taghikhaki, Z.4
Havinga, P.J.M.5
-
3
-
-
78149231253
-
Emergency Response Simulation Using Wireless Sensor Networks
-
Quebec, Canada, 11-14 February
-
Filippoupolitis, A.; Hey, L.; Loukas, G.; Gelenbe, E.; Timotheou, S. Emergency Response Simulation Using Wireless Sensor Networks. In Proceedings of the The 1st International Conference on Ambient Media and Systems, Quebec, Canada, 11-14 February 2008.
-
(2008)
Proceedings of the The 1st International Conference on Ambient Media and Systems
-
-
Filippoupolitis, A.1
Hey, L.2
Loukas, G.3
Gelenbe, E.4
Timotheou, S.5
-
4
-
-
84878271783
-
Research on urban public safety emergency management early warning system based on technologies for the Internet of things
-
Du, C.; Zhu, S. Research on urban public safety emergency management early warning system based on technologies for the Internet of things. Procedia Eng. 2012, 45, 748-754.
-
(2012)
Procedia Eng.
, vol.45
, pp. 748-754
-
-
Du, C.1
Zhu, S.2
-
5
-
-
84881491740
-
ARGUS: A Coordination System to Provide First Responders with Live Aerial Imagery of the Scene of a Disaster (Demonstration)
-
Valencia, Spain, 4-8 June
-
Delle Fave, F.M.; Rogers, A.; Jennings, N.R. ARGUS: A Coordination System to Provide First Responders with Live Aerial Imagery of the Scene of a Disaster (Demonstration). In Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems, Valencia, Spain, 4-8 June 2012; Volume 3, pp. 1467-1468.
-
(2012)
Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems
, vol.3
, pp. 1467-1468
-
-
Delle Fave, F.M.1
Rogers, A.2
Jennings, N.R.3
-
6
-
-
72949084378
-
Autonomous Networked Robots for the Establishment of Wireless Communication in Uncertain Emergency Response Scenarios
-
Hawaii, USA, 8-12 March
-
Timotheou, S.; Loukas, G. Autonomous Networked Robots for the Establishment of Wireless Communication in Uncertain Emergency Response Scenarios. In Proceedings of ACM Symposium on Applied Computing, Hawaii, USA, 8-12 March 2009; pp. 1171-1175.
-
(2009)
Proceedings of ACM Symposium on Applied Computing
, pp. 1171-1175
-
-
Timotheou, S.1
Loukas, G.2
-
7
-
-
78650189990
-
An online social network for emergency management
-
White, C.; Plotnick, L.; Hiltz, S.R.; Turoff, M. An online social network for emergency management. Int. J. Emerg. Manag. 2009, 6, 369-382.
-
(2009)
Int. J. Emerg. Manag.
, vol.6
, pp. 369-382
-
-
White, C.1
Plotnick, L.2
Hiltz, S.R.3
Turoff, M.4
-
8
-
-
78650516347
-
Emergency knowledge management and social media technologies: A case study of the 2010 Haitian earthquake
-
Yates, D.; Paquette, S. Emergency knowledge management and social media technologies: A case study of the 2010 Haitian earthquake. Int. J. Inf. Manag. 2011, 31, 6-13.
-
(2011)
Int. J. Inf. Manag.
, vol.31
, pp. 6-13
-
-
Yates, D.1
Paquette, S.2
-
9
-
-
34548777587
-
CIMS: A Framework for Infrastructure Interdependency Modeling and Analysis
-
Monterey, CA, USA, 3-6 December
-
Dudenhoeffer, D.; Permann, M.; Manic, M. CIMS: A Framework for Infrastructure Interdependency Modeling and Analysis. In Proceedings of the 2006 IEEE Winter Simulation Conference,Monterey, CA, USA, 3-6 December 2006; pp. 478-485.
-
(2006)
Proceedings of the 2006 IEEE Winter Simulation Conference
, pp. 478-485
-
-
Dudenhoeffer, D.1
Permann, M.2
Manic, M.3
-
10
-
-
79954587527
-
Interdependency Modeling and Emergency Response
-
San Diego, CA, USA, 15-18 July 2007; SCS: San Diego, CA, USA
-
Dudenhoeffer, D.D.; Permann, M.R.; Woolsey, S.; Timpany, R.; Miller, C.; McDermott, A.; Manic, M. Interdependency Modeling and Emergency Response. In Proceedings of the 2007 Summer Computer Simulation Conference, San Diego, CA, USA, 15-18 July 2007; SCS: San Diego, CA, USA; pp. 1230-1237.
-
Proceedings of the 2007 Summer Computer Simulation Conference
, pp. 1230-1237
-
-
Dudenhoeffer, D.D.1
Permann, M.R.2
Woolsey, S.3
Timpany, R.4
Miller, C.5
McDermott, A.6
Manic, M.7
-
11
-
-
84881527106
-
A Taxonomy of Cyber Attack and Defence Mechanisms for Emergency Management Networks
-
San Diego, CA, USA, 18-22 March
-
Loukas, G.; Gan, D.; Vuong, T. A Taxonomy of Cyber Attack and Defence Mechanisms for Emergency Management Networks. In Proceedings of the Third International Workshop on Pervasive Networks for Emergency Management (IEEE PerNem 2013), San Diego, CA, USA, 18-22 March 2013.
-
(2013)
Proceedings of the Third International Workshop on Pervasive Networks for Emergency Management (IEEE PerNem 2013)
-
-
Loukas, G.1
Gan, D.2
Vuong, T.3
-
12
-
-
24044548795
-
Prevention, preparedness, response, recovery-An outdated concept?
-
Crondstedt, M. Prevention, preparedness, response, recovery-An outdated concept? Aust. J. Emerg. Manag. 2002, 17, 10-13.
-
(2002)
Aust. J. Emerg. Manag.
, vol.17
, pp. 10-13
-
-
Crondstedt, M.1
-
13
-
-
78149260701
-
A Simulation Framework for the Investigation of Adaptive Behaviours in Largely Populated Building Evacuation Scenarios
-
Estoril, Portugal, 12-16 May
-
Gianni, D.; Loukas, G.; Gelenbe, E. A Simulation Framework for the Investigation of Adaptive Behaviours in Largely Populated Building Evacuation Scenarios. In Proceedings of the Seventh International Joint Conference on Autonomous Agents and Multi-Agent Systems (AAMAS 08), Estoril, Portugal, 12-16 May 2008.
-
(2008)
Proceedings of the Seventh International Joint Conference on Autonomous Agents and Multi-Agent Systems (AAMAS 08)
-
-
Gianni, D.1
Loukas, G.2
Gelenbe, E.3
-
14
-
-
42649104394
-
Approximating the evacuation of the World Trade Center north tower using computer simulation
-
Galea, E.R.; Sharp, G.; Lawrence, P.J.; Holden, R. Approximating the evacuation of the World Trade Center north tower using computer simulation. J. Fire Prot. Eng. 2008, 18, 85-115.
-
(2008)
J. Fire Prot. Eng.
, vol.18
, pp. 85-115
-
-
Galea, E.R.1
Sharp, G.2
Lawrence, P.J.3
Holden, R.4
-
17
-
-
85044257724
-
Cyberterrorism: Is the U.S. healthcare system safe?
-
Harries, D.; Yellowlees, P.M. Cyberterrorism: Is the U.S. healthcare system safe? Telemed. e-Health 2012, 19, 1-6.
-
(2012)
Telemed. e-Health
, vol.19
, pp. 1-6
-
-
Harries, D.1
Yellowlees, P.M.2
-
18
-
-
84880940274
-
-
Emergency Management; Eksioglu, B., Ed.; InTech: Rijeka, Croatia
-
Walker, J. Cyber Security Concerns for Emergency Management. In Emergency Management; Eksioglu, B., Ed.; InTech: Rijeka, Croatia, 2012; pp. 39-59.
-
(2012)
Cyber Security Concerns for Emergency Management
, pp. 39-59
-
-
Walker, J.1
-
19
-
-
79952182106
-
Guest editors' introduction: Software protection
-
Falcarin, P.; Collberg, C.; Atallah, M.; Jakubowski, M. Guest editors' introduction: Software protection. IEEE Softw. 2011, 28, 24-27.
-
(2011)
IEEE Softw.
, vol.28
, pp. 24-27
-
-
Falcarin, P.1
Collberg, C.2
Atallah, M.3
Jakubowski, M.4
-
20
-
-
84881520793
-
Cyber Terrorism: Problems, Perspectives and Prescription
-
Schmallager, F., Pittaro, M., Eds.; The ACM Digital Library: New York, NY, USA
-
Madhava, S.S.P.; Jaishankar, K. Cyber Terrorism: Problems, Perspectives and Prescription. In Crimes of the Internet; Schmallager, F., Pittaro, M., Eds.; The ACM Digital Library: New York, NY, USA, 2008; pp. 593-611.
-
(2008)
Crimes of the Internet
, pp. 593-611
-
-
Madhava, S.S.P.1
Jaishankar, K.2
-
21
-
-
84860380324
-
Characterizing the security implications of third-party emergency alert systems over cellular text messaging services
-
Traynor, P. Characterizing the security implications of third-party emergency alert systems over cellular text messaging services. IEEE Trans. Mob. Comput. 2012, 11, 983-994.
-
(2012)
IEEE Trans. Mob. Comput.
, vol.11
, pp. 983-994
-
-
Traynor, P.1
-
22
-
-
85019217337
-
Message Transmission System and Method, and Utilization of the Transmission System to Investigate Services Offered
-
US Patent, 31 October
-
Fournier, J.-C.; Rose, S. Message Transmission System and Method, and Utilization of the Transmission System to Investigate Services Offered. US Patent 7,130,648, 31 October 2006.
-
(2006)
-
-
Fournier, J.-C.1
Rose, S.2
-
23
-
-
85019194070
-
Method and Apparatus for Transmitting Secure Cell Broadcast Messages in a Cellular Communication Network
-
WIPO Patent Application WO/2012/108803, 18 June
-
Kristiansson, U.; Osth, K.-J.; Blomqvist, E.; Claassen, G. Method and Apparatus for Transmitting Secure Cell Broadcast Messages in a Cellular Communication Network. WIPO Patent Application WO/2012/108803, 18 June 2012.
-
(2012)
-
-
Kristiansson, U.1
Osth, K.-J.2
Blomqvist, E.3
Claassen, G.4
-
24
-
-
67651183943
-
Mitigation of control channel jamming under node capture attacks
-
Tague, P.; Li, M.; Poovendran, R. Mitigation of control channel jamming under node capture attacks. IEEE Trans. Mob. Comput. 2009, 8, 1221-1234.
-
(2009)
IEEE Trans. Mob. Comput.
, vol.8
, pp. 1221-1234
-
-
Tague, P.1
Li, M.2
Poovendran, R.3
-
25
-
-
51649118582
-
Broadcast Control Channel Jamming: Resilience and Identification of Traitors
-
Istanbul, Turkey, 7-12 July
-
Chan, A.; Liu, X.; Noubir, G.; Thapa, B. Broadcast Control Channel Jamming: Resilience and Identification of Traitors. In Proceedings of the IEEE International Symposium on Information Theory, Istanbul, Turkey, 7-12 July 2007; pp. 2496-2500.
-
(2007)
Proceedings of the IEEE International Symposium on Information Theory
, pp. 2496-2500
-
-
Chan, A.1
Liu, X.2
Noubir, G.3
Thapa, B.4
-
26
-
-
85008524827
-
Thwarting control-channel jamming attacks from inside jammers
-
Liu, S.; Lazos, L.; Krunz, M. Thwarting control-channel jamming attacks from inside jammers. IEEE Trans. Mob. Comput. 2012, 11, 1545-1558.
-
(2012)
IEEE Trans. Mob. Comput.
, vol.11
, pp. 1545-1558
-
-
Liu, S.1
Lazos, L.2
Krunz, M.3
-
27
-
-
84862677964
-
Mobile menace: Why SDR poses such a threat
-
Jones, G. Mobile menace: Why SDR poses such a threat. Netw. Secur. 2012, 6, 5-7.
-
(2012)
Netw. Secur.
, vol.6
, pp. 5-7
-
-
Jones, G.1
-
28
-
-
77952489027
-
The Vulnerability Analysis and Improvement of the TETRA Authentication Protocol
-
Gangwon-Do, Korea, 7-10 February
-
Park, Y.S.; Kim, C.S.; Ryou, J.C. The Vulnerability Analysis and Improvement of the TETRA Authentication Protocol. In Proceedings of the 12th International Conference on Advanced Communication Technology (ICACT), Gangwon-Do, Korea, 7-10 February 2010; pp. 1469-1473.
-
(2010)
Proceedings of the 12th International Conference on Advanced Communication Technology (ICACT)
, pp. 1469-1473
-
-
Park, Y.S.1
Kim, C.S.2
Ryou, J.C.3
-
29
-
-
84870687180
-
-
Technical Report MS-CIS-10-34; University of Pennsylvania: Philadelphia, PA, USA
-
Clark, S.; Metzger, P.; Wasserman, Z.; Xu, K.; Blaze, M.A. Security Weaknesses in the APCO Project 25 Two-Way Radio System; Technical Report MS-CIS-10-34; University of Pennsylvania: Philadelphia, PA, USA, 2010.
-
(2010)
Security Weaknesses in the APCO Project 25 Two-Way Radio System
-
-
Clark, S.1
Metzger, P.2
Wasserman, Z.3
Xu, K.4
Blaze, M.A.5
-
30
-
-
84869595947
-
Insecurity in Public-Safety Communications: APCO Project 25
-
SecureComm 2011, London, UK, 7-9 September
-
Glass, S.; Muthukkumarasamy, V.; Portmann, M.; Robert, M. Insecurity in Public-Safety Communications: APCO Project 25. In Proceedings of the 7th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2011, London, UK, 7-9 September 2011.
-
(2011)
Proceedings of the 7th International ICST Conference on Security and Privacy in Communication Networks
-
-
Glass, S.1
Muthukkumarasamy, V.2
Portmann, M.3
Robert, M.4
-
31
-
-
84870578272
-
Don't Trust Satellite Phones: A Security Analysis of Two Satphone Standards
-
San Diego, CA, USA, 20-23 May
-
Driessen, B.; Hund, R; Willems, C.; Paar, C.; Holz, T. Don't Trust Satellite Phones: A Security Analysis of Two Satphone Standards. In Proceedings of the IEEE Symposium on Security and Privacy (SP), San Diego, CA, USA, 20-23 May 2013; pp. 128-143.
-
(2013)
Proceedings of the IEEE Symposium on Security and Privacy (SP)
, pp. 128-143
-
-
Driessen, B.1
Hund, R.2
Willems, C.3
Paar, C.4
Holz, T.5
-
32
-
-
85019254655
-
Securing Hastily Formed Networks for Disaster Relief and Emergency Response
-
San Diego, CA, USA, 10-14 June
-
Bharania, R. Securing Hastily Formed Networks for Disaster Relief and Emergency Response. Presented at CISCO Live, San Diego, CA, USA, 10-14 June 2012.
-
(2012)
Presented at CISCO Live
-
-
Bharania, R.1
-
33
-
-
85019246896
-
A Mobile Crisis Management System for Emergency Services: From Concept to Field Test
-
Waterloo, Canada, 7-9 August
-
Bouckaert, S.; Bergs, J.; Naudts, D. A Mobile Crisis Management System for Emergency Services: From Concept to Field Test. In Proceedings of the 3rd International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks, Waterloo, Canada, 7-9 August 2006.
-
(2006)
Proceedings of the 3rd International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks
-
-
Bouckaert, S.1
Bergs, J.2
Naudts, D.3
-
34
-
-
39549088728
-
Wireless mesh networks for public safety and crisis management applications
-
Portmann, M.; Pirzada, A.A. Wireless mesh networks for public safety and crisis management applications. IEEE Internet Comput. 2008, 12, 18-25.
-
(2008)
IEEE Internet Comput.
, vol.12
, pp. 18-25
-
-
Portmann, M.1
Pirzada, A.A.2
-
35
-
-
84963573544
-
Ensuring Data Privacy and Security in MANET: Case in Emergency Rescue Mission
-
Kuala Lumpur, Malaysia, 24-26 July
-
Bakar, A.; Roslan, I.; Ahmad, A.R.; Abd Manan, J.-L. Ensuring Data Privacy and Security in MANET: Case in Emergency Rescue Mission. In Proceedings of the International Conference on Information and Knowledge Management (ICIKM), Kuala Lumpur, Malaysia, 24-26 July 2012.
-
(2012)
Proceedings of the International Conference on Information and Knowledge Management (ICIKM)
-
-
Bakar, A.1
Roslan, I.2
Ahmad, A.R.3
Abd Manan, J.-L.4
-
36
-
-
84869786899
-
Towards an Adaptive QoS-Oriented and Secure Framework for Wireless Sensor Networks in Emergency Situations
-
Tangier, Morocco, 10-12 May
-
Haji, R.; Hasbi, A.; Ghallali, M.; El Ouahidi, B. Towards an Adaptive QoS-Oriented and Secure Framework for Wireless Sensor Networks in Emergency Situations. In Proceedings of the International Conference on Multimedia Computing and Systems, Tangier, Morocco, 10-12 May 2012; pp. 1007-1011.
-
(2012)
Proceedings of the International Conference on Multimedia Computing and Systems
, pp. 1007-1011
-
-
Haji, R.1
Hasbi, A.2
Ghallali, M.3
El Ouahidi, B.4
-
37
-
-
84863307160
-
An Adaptive Security Management Model for Emergency Networks
-
Quito, Ecuador, 10-11 October
-
De Oliveira, T.R.; de Oliveira, S.; Macedo, D.F.; Nogueira, J.M. An Adaptive Security Management Model for Emergency Networks. In 7th Latin American Network Operations and Management Symposium (LANOMS), Quito, Ecuador, 10-11 October 2011.
-
(2011)
7th Latin American Network Operations and Management Symposium (LANOMS)
-
-
De Oliveira, T.R.1
de Oliveira, S.2
Macedo, D.F.3
Nogueira, J.M.4
-
38
-
-
77955030763
-
RFID-Based Secure Mobile Communication Framework for Emergency Response Management
-
Sydney, Australia, 18-21 April
-
Tran, T.; Yousaf, F.Z.; Wietfeld, C. RFID-Based Secure Mobile Communication Framework for Emergency Response Management. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), Sydney, Australia, 18-21 April 2010.
-
(2010)
Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC)
-
-
Tran, T.1
Yousaf, F.Z.2
Wietfeld, C.3
-
39
-
-
70350647493
-
-
Springer-Verlag: Berlin, Germany
-
Levin, T.E.; Irvine, C.E.; Benzel, T.V; Nguyen, T.D.; Clark, P.C.; Bhaskara, G. Idea: Trusted Emergency Management. In Engineering Secure Software and Systems (ESSoS); Springer-Verlag: Berlin, Germany, 2009; pp. 32-36.
-
(2009)
Idea: Trusted Emergency Management. In Engineering Secure Software and Systems (ESSoS)
, pp. 32-36
-
-
Levin, T.E.1
Irvine, C.E.2
Benzel, T.V.3
Nguyen, T.D.4
Clark, P.C.5
Bhaskara, G.6
-
40
-
-
79953786886
-
Selective jamming/dropping insider attacks in wireless mesh networks
-
Lazos, L.; Krunz, M. Selective jamming/dropping insider attacks in wireless mesh networks. IEEE Netw. 2011, 25, 30-34.
-
(2011)
IEEE Netw.
, vol.25
, pp. 30-34
-
-
Lazos, L.1
Krunz, M.2
-
41
-
-
84869797232
-
Resilience and Security of Opportunistic Communications for Emergency Evacuation
-
Paphos, Cyprus, 21-22 October
-
Gorbil, G.; Gelenbe, E. Resilience and Security of Opportunistic Communications for Emergency Evacuation. In Proceedings of the 7th ACM Workshop on Performance Monitoring and Measurement of HeterogeneousWireless andWired Networks (PM2HW2N'12), Paphos, Cyprus, 21-22 October 2012; pp. 115-124.
-
(2012)
Proceedings of the 7th ACM Workshop on Performance Monitoring and Measurement of HeterogeneousWireless andWired Networks (PM2HW2N'12)
, pp. 115-124
-
-
Gorbil, G.1
Gelenbe, E.2
-
42
-
-
80052117632
-
Classification on Attacks in Wireless Ad Hoc Networks: A Game Theoretic View
-
Gyeongju, Korea, 21-23 June
-
Liao, X.; Hao, D.; Sakurai, K. Classification on Attacks in Wireless Ad Hoc Networks: A Game Theoretic View. In Proceedings of 7th International Conference on Networked Computing and Advanced Information Management (NCM), Gyeongju, Korea, 21-23 June 2011.
-
(2011)
Proceedings of 7th International Conference on Networked Computing and Advanced Information Management (NCM)
-
-
Liao, X.1
Hao, D.2
Sakurai, K.3
-
43
-
-
80052432563
-
Security Issues in Emergency Networks
-
Istanbul, Turkey, 4-8 July
-
Casoni, M. and Paganelli, A. Security Issues in Emergency Networks. In Proceedings of the 7th International Wireless Communications and Mobile Computing Conference (IWCMC), Istanbul, Turkey, 4-8 July 2011; pp. 2145-2150,
-
(2011)
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference (IWCMC)
, pp. 2145-2150
-
-
Casoni, M.1
Paganelli, A.2
-
44
-
-
84867753779
-
Emergency Cyber-Physical-Human Systems
-
Munich, Germany, 30 June-2 August
-
Gelenbe, E.; Gorbil, G.; Wu, F.-J. Emergency Cyber-Physical-Human Systems. In Proceedings of the 21st International Conference on Computer Communications and Networks (ICCCN), Munich, Germany, 30 June-2 August 2012.
-
(2012)
Proceedings of the 21st International Conference on Computer Communications and Networks (ICCCN)
-
-
Gelenbe, E.1
Gorbil, G.2
Wu, F.-J.3
-
45
-
-
77957587422
-
Towards a Formal Foundation of Web Security
-
Edinburgh, Scotland, UK, 17-19 July
-
Akhawe, D.; Barth, A.; Lam, P.E.; Mitchell, J.; Song, D. Towards a Formal Foundation of Web Security. In Proceedings of the 23rd IEEE Computer Security Foundations Symposium (CSF), Edinburgh, Scotland, UK, 17-19 July 2010; pp. 290-304.
-
(2010)
Proceedings of the 23rd IEEE Computer Security Foundations Symposium (CSF)
, pp. 290-304
-
-
Akhawe, D.1
Barth, A.2
Lam, P.E.3
Mitchell, J.4
Song, D.5
-
46
-
-
70350156792
-
A survey of attacks on web services
-
Jensen, M.; Gruschka, N.; Herkenhöner, R. A survey of attacks on web services. Comput. Sci.-Res. Dev. 2009, 24, 185-197.
-
(2009)
Comput. Sci.-Res. Dev.
, vol.24
, pp. 185-197
-
-
Jensen, M.1
Gruschka, N.2
Herkenhöner, R.3
-
47
-
-
84871545443
-
New Privacy Threats for Facebook and Twitter Users
-
Victoria, Canada, 12-14 November
-
Mahmood, S. New Privacy Threats for Facebook and Twitter Users. In Proceedings of the Seventh International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), Victoria, Canada, 12-14 November 2012; pp. 164-169.
-
(2012)
Proceedings of the Seventh International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)
, pp. 164-169
-
-
Mahmood, S.1
-
48
-
-
84897792134
-
Assessing and Improving the Trustworthiness of Social Media for Emergency Management: A Literature Review
-
Bodo, Norway, 19-21 November
-
Hiltz, S.R.; Gonzalez, J.J. Assessing and Improving the Trustworthiness of Social Media for Emergency Management: A Literature Review. In Proceedings of the Norwegian Information Security Conference (NISK), Bodo, Norway, 19-21 November 2012.
-
(2012)
Proceedings of the Norwegian Information Security Conference (NISK)
-
-
Hiltz, S.R.1
Gonzalez, J.J.2
-
49
-
-
84866593784
-
Detecting automation of twitter accounts: Are you a human, bot or cyborg?
-
Chu, Z.; Gianvecchio, S.; Wang, H.; Jajodia, S. Detecting automation of twitter accounts: Are you a human, bot or cyborg? IEEE Trans. Dependable Secur. Comput. 2012, 9, 811-824.
-
(2012)
IEEE Trans. Dependable Secur. Comput
, vol.9
, pp. 811-824
-
-
Chu, Z.1
Gianvecchio, S.2
Wang, H.3
Jajodia, S.4
-
50
-
-
80755144040
-
On the Requirements for Successful GPS Spoofing Attacks
-
Chicago, IL, USA, 17-21 October
-
Tippenhauer, N.O.; Popper, C.; Rasmussen, K.B.; Capkun, S. On the Requirements for Successful GPS Spoofing Attacks. In Proceedings of the 18th ACM Conference on Computer and Communications Security, Chicago, IL, USA, 17-21 October 2011; ISBN: 978-1-4503-0948-6, pp. 75-86.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security
, pp. 75-86
-
-
Tippenhauer, N.O.1
Popper, C.2
Rasmussen, K.B.3
Capkun, S.4
-
51
-
-
84864085461
-
Detection and Mitigation of Spoofing Attacks on a Vector Based Tracking GPS Receiver, ION ITM 2012
-
Newport Beach, CA, 30 January-1 February
-
Jafarnia-Jahromi, A.; Lin, T.; Broumandan, A.; Nielsen, J.; Lachapelle, G. Detection and Mitigation of Spoofing Attacks on a Vector Based Tracking GPS Receiver, ION ITM 2012, Newport Beach, CA, 30 January-1 February 2012.
-
(2012)
-
-
Jafarnia-Jahromi, A.1
Lin, T.2
Broumandan, A.3
Nielsen, J.4
Lachapelle, G.5
-
52
-
-
33646568855
-
GPS Spoofing Countermeasures
-
LAUR-03-6163
-
Warner, J.S.; Johnston, R.G. GPS Spoofing Countermeasures. Homel. Secur. J. 2003, LAUR-03-6163, 22-30.
-
(2003)
Homel. Secur. J.
, pp. 22-30
-
-
Warner, J.S.1
Johnston, R.G.2
-
53
-
-
84874328749
-
GPS Spoofing Attack on Time Synchronization in Wireless Networks and Detection Scheme Design
-
Orlando, FL, USA, 29 October-1 November
-
Zeng, Q.; Li, H.; Qian, L. GPS Spoofing Attack on Time Synchronization in Wireless Networks and Detection Scheme Design. In Proceedings of the Military Communications Conference (MILCOM), Orlando, FL, USA, 29 October-1 November 2012.
-
(2012)
Proceedings of the Military Communications Conference (MILCOM)
-
-
Zeng, Q.1
Li, H.2
Qian, L.3
-
54
-
-
84878383015
-
Designer satellite collisions from covert cyber war
-
Kallberg, J. Designer satellite collisions from covert cyber war. Strateg. Stud. Q. 2012, 124-136.
-
(2012)
Strateg. Stud. Q.
, pp. 124-136
-
-
Kallberg, J.1
-
55
-
-
84857207653
-
Status Study on Sustainability of Satellite Communication Systems Under Hostile Jamming Environment
-
Hyderabad, India, 16-18 December
-
Rao, G.K.; Rao, R.S.H. Status Study on Sustainability of Satellite Communication Systems Under Hostile Jamming Environment. In Proceedings of 2011 Annual IEEE India Conference (INDICON), Hyderabad, India, 16-18 December 2011; pp. 1-7.
-
(2011)
Proceedings of 2011 Annual IEEE India Conference (INDICON)
, pp. 1-7
-
-
Rao, G.K.1
Rao, R.S.H.2
-
56
-
-
79959306908
-
A Hierarchical Performance Model for Intrusion Detection in Cyber-Physical Systems
-
Cancun, Mexico, 28-31 March
-
Mitchell, R.; Chen, I.R. A Hierarchical Performance Model for Intrusion Detection in Cyber-Physical Systems. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), Cancun, Mexico, 28-31 March 2011; pp. 2095-2100.
-
(2011)
Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC)
, pp. 2095-2100
-
-
Mitchell, R.1
Chen, I.R.2
-
58
-
-
83755207008
-
A Cyber-Physical Integrated Security Framework with Fuzzy Logic Assessment for Cultural Heritages
-
Anchorage, AK, USA, 9-12 October
-
Chen, Y.J.; Shih, J.S.; Cheng, S.T. A Cyber-Physical Integrated Security Framework with Fuzzy Logic Assessment for Cultural Heritages. In Proceeding of the IEEE International Conference on Systems, Man and Cybernetics, Anchorage, AK, USA, 9-12 October 2011; ISBN 978-1-4577-0652-3, pp. 1843-1847.
-
(2011)
Proceeding of the IEEE International Conference on Systems, Man and Cybernetics
, pp. 1843-1847
-
-
Chen, Y.J.1
Shih, J.S.2
Cheng, S.T.3
-
59
-
-
84893472435
-
Detecting the sybil attack in wireless sensor network
-
Pramod, A.V.; Azeem, M.A.; Prakash, M.O. Detecting the sybil attack in wireless sensor network. Int. J. Comput. Technol. 2012, 3, 158-161.
-
(2012)
Int. J. Comput. Technol.
, vol.3
, pp. 158-161
-
-
Pramod, A.V.1
Azeem, M.A.2
Prakash, M.O.3
-
60
-
-
79960522083
-
Distributed detection of clone attacks in wireless sensor networks
-
Conti, M.; Di Pietro, R.; Mancini, L.V.; Mei, A. Distributed detection of clone attacks in wireless sensor networks. IEEE Trans. Dependable Secur. Comput. 2011, 8, 685-698.
-
(2011)
IEEE Trans. Dependable Secur. Comput.
, vol.8
, pp. 685-698
-
-
Conti, M.1
Di Pietro, R.2
Mancini, L.V.3
Mei, A.4
-
61
-
-
20544447851
-
Codeblue: An Ad Hoc Sensor Network Infrastructure for Emergency Medical Care
-
London, UK, 3-5 April
-
Malan, D.; Fulford-Jones, T.; Welsh, M.; Moulton, S. Codeblue: An Ad Hoc Sensor Network Infrastructure for Emergency Medical Care. In Proceedings of the International Workshop on Wearable and Implantable Body Sensor Networks, London, UK, 3-5 April 2004.
-
(2004)
Proceedings of the International Workshop on Wearable and Implantable Body Sensor Networks
-
-
Malan, D.1
Fulford-Jones, T.2
Welsh, M.3
Moulton, S.4
-
62
-
-
77649094379
-
Data security and privacy in wireless body area networks
-
Li, M.; Lou, W.; Ren, K. Data security and privacy in wireless body area networks. IEEE Wirel. Commun. 2010, 17, 51-58.
-
(2010)
IEEE Wirel. Commun.
, vol.17
, pp. 51-58
-
-
Li, M.1
Lou, W.2
Ren, K.3
-
63
-
-
78049507383
-
A novel intrusion detection system for wireless body area network in health care monitoring
-
Sundararajan, T.V.P.; Shanmugam, A. A novel intrusion detection system for wireless body area network in health care monitoring. J. Comput. Sci. 2010, 6, 1355-1361.
-
(2010)
J. Comput. Sci.
, vol.6
, pp. 1355-1361
-
-
Sundararajan, T.V.P.1
Shanmugam, A.2
-
64
-
-
80052411765
-
A Survey on SQL Injection: Vulnerabilities, Attacks, and Prevention Techniques
-
Singapore, 14-17 June
-
Kindy, D.A.; Pathan, A.K. A Survey on SQL Injection: Vulnerabilities, Attacks, and Prevention Techniques. In Proceedings of the IEEE International Symposium on Consumer Electronics, Singapore, 14-17 June 2011; pp. 468-471.
-
(2011)
Proceedings of the IEEE International Symposium on Consumer Electronics
, pp. 468-471
-
-
Kindy, D.A.1
Pathan, A.K.2
-
65
-
-
85032244491
-
The AMP attacker: A suite of tools for exploiting SQL injection vulnerabilities in web applications
-
in press
-
Cecchini, S.; Gan, D. The AMP attacker: A suite of tools for exploiting SQL injection vulnerabilities in web applications. Int. J. Electron. Secur. Digit. Forensics 2013, in press.
-
(2013)
Int. J. Electron. Secur. Digit. Forensics
-
-
Cecchini, S.1
Gan, D.2
-
66
-
-
74249088444
-
Survey of network security systems to counter SIP-based denial-of-service attacks
-
Ehlerta, S.; Geneiatakis, D.; Magedanza, T. Survey of network security systems to counter SIP-based denial-of-service attacks. Comput. Secur. 2010, 29, 225-243.
-
(2010)
Comput. Secur.
, vol.29
, pp. 225-243
-
-
Ehlerta, S.1
Geneiatakis, D.2
Magedanza, T.3
-
68
-
-
71549142981
-
Issues and challenges in securing VoIP
-
Dantu, R.; Fahmy, S.; Schulzrinne, H.; Cangussu, J. Issues and challenges in securing VoIP. Comput. Secur. 2009, 28, 743-753.
-
(2009)
Comput. Secur.
, vol.28
, pp. 743-753
-
-
Dantu, R.1
Fahmy, S.2
Schulzrinne, H.3
Cangussu, J.4
-
70
-
-
34250778315
-
Secure information sharing in a virtual multi-agency team environment
-
Adam, N.; Kozanoglu, A; Paliwal, A.; Shafiq, B. Secure information sharing in a virtual multi-agency team environment. Electron. Notes Theor. Comput. Sci. 2007, 179, 97-109.
-
(2007)
Electron. Notes Theor. Comput. Sci.
, vol.179
, pp. 97-109
-
-
Adam, N.1
Kozanoglu, A.2
Paliwal, A.3
Shafiq, B.4
-
71
-
-
78651501030
-
Cyber Security for Emergency Management
-
Waltham, MA, USA, 8-10 November
-
Walker, J.; Williams, B.J.; Skelton, G.W. Cyber Security for Emergency Management. In IEEE International Conference on Technologies for Homeland Security (HST), Waltham, MA, USA, 8-10 November 2010; pp. 476-480.
-
(2010)
IEEE International Conference on Technologies for Homeland Security (HST)
, pp. 476-480
-
-
Walker, J.1
Williams, B.J.2
Skelton, G.W.3
-
72
-
-
33745796561
-
Exploiting open functionality in SMS-capable cellular networks
-
Traynor, P.; Enck, W.; McDaniel, P.; La Porta, T. Exploiting open functionality in SMS-capable cellular networks. J. Comput. Secur. 2008, 16, 393-404.
-
(2008)
J. Comput. Secur.
, vol.16
, pp. 393-404
-
-
Traynor, P.1
Enck, W.2
McDaniel, P.3
La Porta, T.4
-
73
-
-
61449199429
-
Mitigating attacks on open functionality in SMS-capable cellular networks
-
Traynor, P.; Enck, W.; McDaniel, P.; La Porta, T. Mitigating attacks on open functionality in SMS-capable cellular networks. IEEE/ACM Trans. Netw. 2009, 17, 182-193.
-
(2009)
IEEE/ACM Trans. Netw.
, vol.17
, pp. 182-193
-
-
Traynor, P.1
Enck, W.2
McDaniel, P.3
La Porta, T.4
-
74
-
-
4644356459
-
Satellite radio interface and radio resource management strategy for the delivery of multicast/broadcast services via an integrated satellite-terrestrial system
-
Karaliopoulos, M.; Henrio, P.; Mazzella, M.; de Win, W.; Dieudonne, M.; Andrikopoulos, I.; Mertzanis, I.; Corazza, G.E.; Vanelli-Coralli, A.; Dimitriou, N.; Polydoros, A. Satellite radio interface and radio resource management strategy for the delivery of multicast/broadcast services via an integrated satellite-terrestrial system. IEEE Commun. Mag. 2004, 42, 108-117.
-
(2004)
IEEE Commun. Mag.
, vol.42
, pp. 108-117
-
-
Karaliopoulos, M.1
Henrio, P.2
Mazzella, M.3
de Win, W.4
Dieudonne, M.5
Andrikopoulos, I.6
Mertzanis, I.7
Corazza, G.E.8
Vanelli-Coralli, A.9
Dimitriou, N.10
Polydoros, A.11
-
75
-
-
71249111128
-
Network of Mobile Networks: Hybrid Terrestrial-Satellite Radio
-
Siena, Italy, 9-11 September
-
Vojcic, B.; Matheson, D.; Clark, H. Network of Mobile Networks: Hybrid Terrestrial-Satellite Radio. In Proceedings of the International Workshop on Satellite and Space Communications, Siena, Italy, 9-11 September 2009; pp. 451-455.
-
(2009)
Proceedings of the International Workshop on Satellite and Space Communications
, pp. 451-455
-
-
Vojcic, B.1
Matheson, D.2
Clark, H.3
-
76
-
-
78751515368
-
A Satellite Core Network System for Emergency Management and Disaster Recovery
-
Jeju Island, Korea, 17-19 November
-
Lee, Y.-M.; Ku, B.-J.; Ahn, D.-S. A Satellite Core Network System for Emergency Management and Disaster Recovery. In Proceedings of the 2010 International Conference on Information and Communication Technology Convergence, Jeju Island, Korea, 17-19 November 2010; pp. 549-552.
-
(2010)
Proceedings of the 2010 International Conference on Information and Communication Technology Convergence
, pp. 549-552
-
-
Lee, Y.-M.1
Ku, B.-J.2
Ahn, D.-S.3
-
77
-
-
84855850317
-
The Evolution of Hastily Formed Networks for Disaster Response
-
Seattle, WA, USA, 30 October-1 November
-
Nelson, C.; Steckler, B.D.; Stamberger, J.A. The Evolution of Hastily Formed Networks for Disaster Response. In Proceedings of Global Humanitarian Technology Conference, IEEE, Seattle, WA, USA, 30 October-1 November 2011.
-
(2011)
Proceedings of Global Humanitarian Technology Conference, IEEE
-
-
Nelson, C.1
Steckler, B.D.2
Stamberger, J.A.3
-
78
-
-
77249166094
-
A survey on security in wireless mesh networks
-
Yi, P.; Wu, Y.; Zou, F.; Liu, N. A survey on security in wireless mesh networks. IETE Tech. Rev. 2010, 27, 6-14.
-
(2010)
IETE Tech. Rev.
, vol.27
, pp. 6-14
-
-
Yi, P.1
Wu, Y.2
Zou, F.3
Liu, N.4
-
79
-
-
85029731561
-
A survey of attacks and countermeasures in mobile ad hoc networks
-
Wu, B.; Chen, J.; Wu, J.; Cardei, M. A survey of attacks and countermeasures in mobile ad hoc networks. Wirel. Netw. Secur. 2007, 103-135.
-
(2007)
Wirel. Netw. Secur.
, pp. 103-135
-
-
Wu, B.1
Chen, J.2
Wu, J.3
Cardei, M.4
-
80
-
-
84864205747
-
Secure and Trusted Communication in Emergency Situations
-
Newark, NJ, USA, 21-22 May
-
Michalas, A.; Bakopoulos, M.; Komninos, N.; Prasad, N.R. Secure and Trusted Communication in Emergency Situations. In Proceedings of the 35th IEEE Sarnoff Symposium (SARNOFF), Newark, NJ, USA, 21-22 May 2012; pp. 228-232.
-
(2012)
Proceedings of the 35th IEEE Sarnoff Symposium (SARNOFF)
, pp. 228-232
-
-
Michalas, A.1
Bakopoulos, M.2
Komninos, N.3
Prasad, N.R.4
-
81
-
-
0036704573
-
Watermarking, tamper-proofing, and obfuscation-tools for software protection
-
Collberg, C.; Thomborson, C.Watermarking, tamper-proofing, and obfuscation-tools for software protection. IEEE Trans. Softw. Eng. 2002, 28, 735-746.
-
(2002)
IEEE Trans. Softw. Eng.
, vol.28
, pp. 735-746
-
-
Collberg, C.1
Thomborson, C.2
-
82
-
-
33846199593
-
A self-aware approach to denial of service defence
-
Gelenbe, E.; Loukas, G. A self-aware approach to denial of service defence. Comput. Netw. 2007, 51, 1299-1314.
-
(2007)
Comput. Netw.
, vol.51
, pp. 1299-1314
-
-
Gelenbe, E.1
Loukas, G.2
-
83
-
-
78650012077
-
Demonstrating Cognitive Packet Network Resilience to Worm Attacks
-
Chicago, IL, USA, 4-8 October
-
Sakellari, G.; Gelenbe, E. Demonstrating Cognitive Packet Network Resilience to Worm Attacks. In Proceedings of the 17th ACM Conference on Computer and Communications Security, Chicago, IL, USA, 4-8 October 2010; ISBN 978-1-4503-0245-6, pp. 636-638.
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security
, pp. 636-638
-
-
Sakellari, G.1
Gelenbe, E.2
-
84
-
-
84879602248
-
Evaluation of network resilience, survivability, and disruption tolerance: Analysis, topology generation, simulation, and experimentation
-
Sterbenz, J.P.G.; Cetinkaya, E.K.; Hameed, M.A.; Jabbar, A.; Qian, S.; Rohrer, J.P. Evaluation of network resilience, survivability, and disruption tolerance: Analysis, topology generation, simulation, and experimentation. Telecommun. Syst. 2011, 1-34; doi:10.1007/s11235-011-9573-6.
-
(2011)
Telecommun. Syst.
, pp. 1-34
-
-
Sterbenz, J.P.G.1
Cetinkaya, E.K.2
Hameed, M.A.3
Jabbar, A.4
Qian, S.5
Rohrer, J.P.6
-
85
-
-
78149263145
-
Emergency Response Systems for Disaster Management in Buildings
-
Bucharest, Romania, 11-12 May
-
Filippoupolitis, A.; Loukas, G.; Timotheou, S.; Dimakis, N.; Gelenbe, E. Emergency Response Systems for Disaster Management in Buildings. In Proceedings of NATO Symposium on C3I for Crisis, Emergency and Consequence Management, Bucharest, Romania, 11-12 May 2009.
-
(2009)
Proceedings of NATO Symposium on C3I for Crisis, Emergency and Consequence Management
-
-
Filippoupolitis, A.1
Loukas, G.2
Timotheou, S.3
Dimakis, N.4
Gelenbe, E.5
-
86
-
-
84881504804
-
Disruption Tolerant Communications for Large Scale Emergency Evacuation
-
San Diego, CA, USA, 18-22 March
-
Gorbil, G.; Gelenbe, E. Disruption Tolerant Communications for Large Scale Emergency Evacuation. In Proceedings of the 11th IEEE International Conference on Pervasive Computing and Communication, San Diego, CA, USA, 18-22 March 2013.
-
(2013)
Proceedings of the 11th IEEE International Conference on Pervasive Computing and Communication
-
-
Gorbil, G.1
Gelenbe, E.2
-
87
-
-
84881528596
-
Resilient Emergency Evacuation Using Opportunistic Communications
-
Gelenbe, E., Lent, R., Ed.; Springer: Berlin, Germany
-
Gorbil, G.; Gelenbe, E. Resilient Emergency Evacuation Using Opportunistic Communications. In Computer and Information Sciences III; Gelenbe, E., Lent, R., Ed.; Springer: Berlin, Germany, 2013; pp. 249-257.
-
(2013)
Computer and Information Sciences III
, pp. 249-257
-
-
Gorbil, G.1
Gelenbe, E.2
-
88
-
-
77955689268
-
Protection against denial of service attacks: A survey
-
Loukas, G.; Oke, G. Protection against denial of service attacks: A survey. Comput. J. Br. Comput. Soc. 2010, 53, 1020-1037.
-
(2010)
Comput. J. Br. Comput. Soc.
, vol.53
, pp. 1020-1037
-
-
Loukas, G.1
Oke, G.2
-
89
-
-
84889742206
-
Disaster Management and Community Warning Systems: Inter-Organisational Collaboration and ICT Innovation
-
Hyderabad, India, 10-12 July
-
Bunker, D.; Smith, S. Disaster Management and Community Warning Systems: Inter-Organisational Collaboration and ICT Innovation. In Proceedings of the Pacific Asia Conference on Information Systems, Hyderabad, India, 10-12 July 2009.
-
(2009)
Proceedings of the Pacific Asia Conference on Information Systems
-
-
Bunker, D.1
Smith, S.2
-
91
-
-
84912093114
-
Information and communication technology and crisis management
-
Wojciechowicz, W.; Zych, J.; Holubowicz, W. Information and communication technology and crisis management. Tech. Sci. 2012, 15, 101-110.
-
(2012)
Tech. Sci.
, vol.15
, pp. 101-110
-
-
Wojciechowicz, W.1
Zych, J.2
Holubowicz, W.3
-
92
-
-
84896895465
-
Social Media for Crisis Management: Problems and Challenges from an IT-Perspective
-
2012, Jindřichův Hradec, Czech Republic, 12-14 September
-
Kreiner, K.; Neubaur, G. Social Media for Crisis Management: Problems and Challenges from an IT-Perspective. In Proceedings of Interdisciplinary Information and Management Talks IDIMT 2012, Jindřichův Hradec, Czech Republic, 12-14 September 2012.
-
(2012)
Proceedings of Interdisciplinary Information and Management Talks IDIMT
-
-
Kreiner, K.1
Neubaur, G.2
-
93
-
-
84870530690
-
Harnessing the Crowds for Smart City Sensing
-
Maui, Hawaii, USA, 29 October-2 November
-
Roitman, H.; Mamou, J.; Mehta, S.; Satt, A.; Subramaniam, L.V. Harnessing the Crowds for Smart City Sensing. In Proceedings of the 1st International Workshop on Multimodal Crowd Sensing, Maui, Hawaii, USA, 29 October-2 November 2012; pp. 17-18.
-
(2012)
Proceedings of the 1st International Workshop on Multimodal Crowd Sensing
, pp. 17-18
-
-
Roitman, H.1
Mamou, J.2
Mehta, S.3
Satt, A.4
Subramaniam, L.V.5
-
94
-
-
69949156439
-
Assessing the Spoofing Threat: Development of a Portable GPS Civilian Spoofer
-
Institute of Navigation, Savanna, GA, USA, 16-19 September
-
Humphreys, T.E.; Ledvina, B.M.; Psiaki, M.L.; O'Hanlon, B.W.; Kintner, P.M., Jr. Assessing the Spoofing Threat: Development of a Portable GPS Civilian Spoofer. In Proceedings of ION GNSS Conference, Institute of Navigation, Savanna, GA, USA, 16-19 September 2008.
-
(2008)
Proceedings of ION GNSS Conference
-
-
Humphreys, T.E.1
Ledvina, B.M.2
Psiaki, M.L.3
O'Hanlon, B.W.4
Kintner, P.M.5
-
95
-
-
10944253573
-
Sensor networks for emergency response: Challenges and opportunities
-
Lorincz, K.; Malan, D.J.; Fulford-Jones, T.E.F.; Nawoj, A.; Clavel, A.; Shnayder, V.; Mainland, G.;Welsh, M. Sensor networks for emergency response: Challenges and opportunities. IEEE Pervasive Comput. 2004, 3, 16-23.
-
(2004)
IEEE Pervasive Comput.
, vol.3
, pp. 16-23
-
-
Lorincz, K.1
Malan, D.J.2
Fulford-Jones, T.E.F.3
Nawoj, A.4
Clavel, A.5
Shnayder, V.6
Mainland, G.7
Welsh, M.8
-
97
-
-
84861506150
-
On False Data Injection Attacks against Distributed Energy Routing in Smart Grid
-
Beijing, China, 17-19 April
-
Lin, J.; Yu, W.; Yang, X.; Xu, G.; Zhao, W. On False Data Injection Attacks against Distributed Energy Routing in Smart Grid. In Proceedings of the ACM/IEEE Third International Conference on Cyber-Physical Systems, Beijing, China, 17-19 April 2012.
-
(2012)
Proceedings of the ACM/IEEE Third International Conference on Cyber-Physical Systems
-
-
Lin, J.1
Yu, W.2
Yang, X.3
Xu, G.4
Zhao, W.5
-
98
-
-
78249231217
-
Security vulnerabilities in wireless sensor networks: A survey
-
Kavitha, T.; Sridharan, D. Security vulnerabilities in wireless sensor networks: A survey. J. Inf. Assur. Secur. 2010, 5, 31-44.
-
(2010)
J. Inf. Assur. Secur.
, vol.5
, pp. 31-44
-
-
Kavitha, T.1
Sridharan, D.2
-
99
-
-
70350692585
-
Securing wireless sensor networks: A survey
-
Zhou, Y.; Fang, Y.; Zhang, Y. Securing wireless sensor networks: A survey. Commun. Surv. Tutor. IEEE 2008, 10, 6-28.
-
(2008)
Commun. Surv. Tutor. IEEE
, vol.10
, pp. 6-28
-
-
Zhou, Y.1
Fang, Y.2
Zhang, Y.3
-
100
-
-
84881487006
-
Resilience of Cyber-Physical System: A Case Study of Safe School Environment
-
Odense, Denmark, 22-24 August
-
Rajamaki, J.; Rathod, P.; Ahlgren, A.; Aho, J.; Takari, M.; Ahlgren, S. Resilience of Cyber-Physical System: A Case Study of Safe School Environment. In Proceedings of the Intelligence and Security Informatics Conference (EISIC), Odense, Denmark, 22-24 August 2012.
-
(2012)
Proceedings of the Intelligence and Security Informatics Conference (EISIC)
-
-
Rajamaki, J.1
Rathod, P.2
Ahlgren, A.3
Aho, J.4
Takari, M.5
Ahlgren, S.6
|