-
1
-
-
0037086890
-
Wireless sensor networks: A survey
-
Akyildiz I.F., Su W., Sankarasubramaniam Y., Cayirci E. Wireless sensor networks: a survey. Computer Networks, 38(4): 393-422, 2002.
-
(2002)
Computer Networks
, vol.38
, Issue.4
, pp. 393-422
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
3
-
-
0036986465
-
Wireless sensor networks for habitat monitoring
-
ACM
-
Mainwaring A., Culler D., Polastre J., Szewczyk R., Anderson J. Wireless sensor networks for habitat monitoring. In Proceedings of the 1st ACM International Workshop on Wireless Sensor Networks and Applications, pp. 88-97. ACM, 2002.
-
(2002)
Proceedings of the 1st ACM International Workshop on Wireless Sensor Networks and Applications
, pp. 88-97
-
-
Mainwaring, A.1
Culler, D.2
Polastre, J.3
Szewczyk, R.4
Anderson, J.5
-
4
-
-
42249106275
-
A design and implementation of forest-fires surveillance system based on wireless sensor networks for South Korea mountains
-
Son B., Her Y., Kim J.G. A design and implementation of forest-fires surveillance system based on wireless sensor networks for South Korea mountains. International Journal of Computer Science and Network Security, 6(9): 124-130, 2006.
-
(2006)
International Journal of Computer Science and Network Security
, vol.6
, Issue.9
, pp. 124-130
-
-
Son, B.1
Her, Y.2
Kim, J.G.3
-
5
-
-
79960924365
-
From wireless sensor networks towards cyber physical systems
-
Wu F.J., Kao Y.F., Tseng Y.C. From wireless sensor networks towards cyber physical systems. Pervasive and Mobile Computing, 7(4): 397-413, 2011.
-
(2011)
Pervasive and Mobile Computing
, vol.7
, Issue.4
, pp. 397-413
-
-
Wu, F.J.1
Kao, Y.F.2
Tseng, Y.C.3
-
7
-
-
84155167085
-
Cyber-physical system security for the electric power grid
-
Sridhar S., Hahn A., Govindarasu M. Cyber-physical system security for the electric power grid. Proceedings of the IEEE, 100(1): 210-224, 2012.
-
(2012)
Proceedings of the IEEE
, vol.100
, Issue.1
, pp. 210-224
-
-
Sridhar, S.1
Hahn, A.2
Govindarasu, M.3
-
8
-
-
67650822699
-
Security and privacy challenges in the smart grid
-
May
-
McDaniel P., McLaughlin S. Security and privacy challenges in the smart grid. IEEE Security Privacy, 7(3/May): 75-77, 2009.
-
(2009)
IEEE Security Privacy
, vol.7
, Issue.3
, pp. 75-77
-
-
McDaniel, P.1
McLaughlin, S.2
-
10
-
-
84878266591
-
Smart meter privacy: A theoretical framework
-
Sankar L., Rajagopalan S.R., Mohajer S., Poor H.V. Smart meter privacy: A theoretical framework. IEEE Transactions on Smart Grid, 4(2): 837-846, 2013.
-
(2013)
IEEE Transactions on Smart Grid
, vol.4
, Issue.2
, pp. 837-846
-
-
Sankar, L.1
Rajagopalan, S.R.2
Mohajer, S.3
Poor, H.V.4
-
11
-
-
77956882701
-
Wireless sensor networks for healthcare: A survey
-
Alemdar H., Ersoy C. Wireless sensor networks for healthcare: A survey. Computer Networks, 54(15): 2688-2710, 2010.
-
(2010)
Computer Networks
, vol.54
, Issue.15
, pp. 2688-2710
-
-
Alemdar, H.1
Ersoy, C.2
-
14
-
-
84906788733
-
A survey on electric power demand forecasting: Future trends in smart grids, microgrids and smart buildings
-
Hernandez L., Baladrón C., Aguiar J., et al. A survey on electric power demand forecasting: Future trends in smart grids, microgrids and smart buildings. IEEE Communications Surveys & Tutorials, 16(3): 1460-1495, 2014.
-
(2014)
IEEE Communications Surveys & Tutorials
, vol.16
, Issue.3
, pp. 1460-1495
-
-
Hernandez, L.1
Baladrón, C.2
Aguiar, J.3
-
15
-
-
84894718618
-
Demand forecasting in smart grids
-
Mirowski P., Chen S., Ho T.K., Yu C.N. Demand forecasting in smart grids. Bell Labs Technical Journal, 18(4): 135-158, 2014.
-
(2014)
Bell Labs Technical Journal
, vol.18
, Issue.4
, pp. 135-158
-
-
Mirowski, P.1
Chen, S.2
Ho, T.K.3
Yu, C.N.4
-
16
-
-
84921496860
-
Game-theoretic models of electricity theft detection in smart utility networks: Providing new capabilities with advanced metering infrastructure
-
Amin S., Schwartz G., Cardenas A., Sastry S. Game-theoretic models of electricity theft detection in smart utility networks: Providing new capabilities with advanced metering infrastructure. IEEE Control Systems, 35 (1): 66-81, 2015.
-
(2015)
IEEE Control Systems
, vol.35
, Issue.1
, pp. 66-81
-
-
Amin, S.1
Schwartz, G.2
Cardenas, A.3
Sastry, S.4
-
17
-
-
84880210183
-
A multi-sensor energy theft detection framework for advanced metering infrastructures
-
McLaughlin S., Holbert B., Fawaz A., Berthier R., Zonouz S. A multi-sensor energy theft detection framework for advanced metering infrastructures. IEEE Journal on Selected Areas in Communications, 31(7): 1319-1330, 2013.
-
(2013)
IEEE Journal on Selected Areas in Communications
, vol.31
, Issue.7
, pp. 1319-1330
-
-
McLaughlin, S.1
Holbert, B.2
Fawaz, A.3
Berthier, R.4
Zonouz, S.5
-
18
-
-
84898006994
-
Smart grid - the new and improved power grid: A survey
-
Fang X., Misra S., Xue G., Yang D. Smart grid - the new and improved power grid: A survey. IEEE Communications Surveys & Tutorials, 14(4): 944-980, 2012.
-
(2012)
IEEE Communications Surveys & Tutorials
, vol.14
, Issue.4
, pp. 944-980
-
-
Fang, X.1
Misra, S.2
Xue, G.3
Yang, D.4
-
19
-
-
77956607253
-
Opportunities and challenges of wireless sensor networks in smart grid
-
Gungor V.C., Lu B., Hancke G.P. Opportunities and challenges of wireless sensor networks in smart grid. IEEE Transactions on Industrial Electronics, 57(10): 3557-3564, 2010.
-
(2010)
IEEE Transactions on Industrial Electronics
, vol.57
, Issue.10
, pp. 3557-3564
-
-
Gungor, V.C.1
Lu, B.2
Hancke, G.P.3
-
20
-
-
85084160169
-
Green lights forever: Analyzing the security of traffic infrastructure
-
USENIX Association
-
Ghena B., Beyer W., Hillaker A., Pevarnek J., Halderman J.A. Green lights forever: Analyzing the security of traffic infrastructure. In Proceedings of the 8th USENIX Workshop on Offensive Technologies (WOOT’14), pp. 1-10. USENIX Association, 2014.
-
(2014)
Proceedings of the 8th USENIX Workshop on Offensive Technologies (WOOT’14)
, pp. 1-10
-
-
Ghena, B.1
Beyer, W.2
Hillaker, A.3
Pevarnek, J.4
Halderman, J.A.5
-
21
-
-
63049085459
-
Wireless sensor networks in intelligent transportation systems
-
Tubaishat M., Zhuang P., Qi Q., Shang Y. Wireless sensor networks in intelligent transportation systems. Wireless Communications and Mobile Computing, 9(3): 287-302, 2009.
-
(2009)
Wireless Communications and Mobile Computing
, vol.9
, Issue.3
, pp. 287-302
-
-
Tubaishat, M.1
Zhuang, P.2
Qi, Q.3
Shang, Y.4
-
22
-
-
0031472064
-
Traffic flow forecasting: Comparison of modeling approaches
-
Smith B.L., Demetsky M.J. Traffic flow forecasting: Comparison of modeling approaches. Journal of Transportation Engineering, 123(4): 261-266, 1997.
-
(1997)
Journal of Transportation Engineering
, vol.123
, Issue.4
, pp. 261-266
-
-
Smith, B.L.1
Demetsky, M.J.2
-
23
-
-
78651316181
-
Gaussian processes for short-term traffic volume forecasting
-
Xie Y., Zhao K., Sun Y., Chen D. Gaussian processes for short-term traffic volume forecasting. Journal of the Transportation Research Board, 2165(1): 69-78, 2010.
-
(2010)
Journal of the Transportation Research Board
, vol.2165
, Issue.1
, pp. 69-78
-
-
Xie, Y.1
Zhao, K.2
Sun, Y.3
Chen, D.4
-
24
-
-
38349154579
-
Denial-of-service in wireless sensor networks: Attacks and defenses
-
Raymond D.R., Midkiff S.F. Denial-of-service in wireless sensor networks: Attacks and defenses. IEEE Pervasive Computing, 7(1): 74-81, 2008.
-
(2008)
IEEE Pervasive Computing
, vol.7
, Issue.1
, pp. 74-81
-
-
Raymond, D.R.1
Midkiff, S.F.2
-
25
-
-
56949088196
-
A survey of security issues in wireless sensor networks
-
Wang Y., Attebury G., Ramamurthy B. A survey of security issues in wireless sensor networks. IEEE Communications Surveys & Tutorials, 8(8): 2-23, 2006.
-
(2006)
IEEE Communications Surveys & Tutorials
, vol.8
, Issue.8
, pp. 2-23
-
-
Wang, Y.1
Attebury, G.2
Ramamurthy, B.3
-
26
-
-
0036793924
-
Denial of service in sensor networks
-
Wood A., Stankovic J.A. Denial of service in sensor networks. Computer, 35 (10): 54-62, 2002.
-
(2002)
Computer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.1
Stankovic, J.A.2
-
27
-
-
33745062882
-
Jamming sensor networks: Attack and defense strategies
-
Xu W., Ma K., Trappe W., Zhang Y. Jamming sensor networks: Attack and defense strategies. Network, IEEE, 20(3): 41-47, 2006.
-
(2006)
Network, IEEE
, vol.20
, Issue.3
, pp. 41-47
-
-
Xu, W.1
Ma, K.2
Trappe, W.3
Zhang, Y.4
-
29
-
-
33845916834
-
A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks
-
Poovendran R., Lazos L. A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks. Wireless Networks, 13(1): 27-59, 2007.
-
(2007)
Wireless Networks
, vol.13
, Issue.1
, pp. 27-59
-
-
Poovendran, R.1
Lazos, L.2
-
30
-
-
79251600457
-
A study of self-propagating mal-packets in sensor networks: Attacks and defenses
-
Gu Q., Ferguson C., Noorani R. A study of self-propagating mal-packets in sensor networks: Attacks and defenses. Computers & Security, 30(1): 13-27, 2011.
-
(2011)
Computers & Security
, vol.30
, Issue.1
, pp. 13-27
-
-
Gu, Q.1
Ferguson, C.2
Noorani, R.3
-
33
-
-
84901195399
-
Modeling the propagation of worms in networks: A survey
-
Wang Y., Wen S., Xiang Y., Zhou W. Modeling the propagation of worms in networks: A survey. IEEE Communications Surveys & Tutorials, 16(2): 942-960, 2014.
-
(2014)
IEEE Communications Surveys & Tutorials
, vol.16
, Issue.2
, pp. 942-960
-
-
Wang, Y.1
Wen, S.2
Xiang, Y.3
Zhou, W.4
-
34
-
-
79959856672
-
False data injection attacks against state estimation in electric power grids
-
Liu Y., Ning P., Reiter M.K. False data injection attacks against state estimation in electric power grids. ACM Transactions on Information and System Security, 14(1): 13, 2011.
-
(2011)
ACM Transactions on Information and System Security
, vol.14
, Issue.1
, pp. 13
-
-
Liu, Y.1
Ning, P.2
Reiter, M.K.3
-
36
-
-
3042785862
-
The sybil attack in sensor networks: Analysis and defenses
-
ACM
-
Newsome J., Shi E., Song D., Perrig A. The sybil attack in sensor networks: Analysis and defenses. In Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks, pp. 259-268. ACM, 2004.
-
(2004)
Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
39
-
-
77953044026
-
Stealthy deception attacks on water SCADA systems
-
ACM
-
Amin S., Litrico X., Sastry S., Bayen A.M. Stealthy deception attacks on water SCADA systems. In Proceedings of the 13th ACM International Conference on Hybrid Systems: Computation and Control, pp. 161-170. ACM, 2010.
-
(2010)
Proceedings of the 13th ACM International Conference on Hybrid Systems: Computation and Control
, pp. 161-170
-
-
Amin, S.1
Litrico, X.2
Sastry, S.3
Bayen, A.M.4
-
40
-
-
84897628591
-
Cyber security of water SCADA systems - Part I: Analysis and experimentation of stealthy deception attacks
-
Amin S., Litrico X., Sastry S., Bayen A.M. Cyber security of water SCADA systems - Part I: Analysis and experimentation of stealthy deception attacks. IEEE Transactions on Control Systems Technology, 21(5): 1963-1970, 2013.
-
(2013)
IEEE Transactions on Control Systems Technology
, vol.21
, Issue.5
, pp. 1963-1970
-
-
Amin, S.1
Litrico, X.2
Sastry, S.3
Bayen, A.M.4
-
41
-
-
84903302626
-
Detecting integrity attacks on scada systems
-
Mo Y., Chabukswar R., Sinopoli B. Detecting integrity attacks on scada systems. IEEE Transactions on Control Systems Technology, 22(4): 1396-1407, 2014.
-
(2014)
IEEE Transactions on Control Systems Technology
, vol.22
, Issue.4
, pp. 1396-1407
-
-
Mo, Y.1
Chabukswar, R.2
Sinopoli, B.3
-
42
-
-
77949601382
-
Secure control against replay attacks
-
IEEE
-
Mo Y., Sinopoli B. Secure control against replay attacks. In Proceedings of the 47th Annual Allerton Conference on Communication, Control, and Computing, pp. 911-918. IEEE, 2009.
-
(2009)
Proceedings of the 47th Annual Allerton Conference on Communication, Control, and Computing
, pp. 911-918
-
-
Mo, Y.1
Sinopoli, B.2
-
43
-
-
84921417375
-
Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks
-
Rezvani M., Ignatovic A., Bertino E., Jha S. Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks. IEEE Transactions on Dependable and Secure Computing, 12(1): 98-110, 2015.
-
(2015)
IEEE Transactions on Dependable and Secure Computing
, vol.12
, Issue.1
, pp. 98-110
-
-
Rezvani, M.1
Ignatovic, A.2
Bertino, E.3
Jha, S.4
-
44
-
-
84874917979
-
The real story of Stuxnet
-
Kushner D. The real story of Stuxnet. IEEE Spectrum, 50(3): 48-53, 2013.
-
(2013)
IEEE Spectrum
, vol.50
, Issue.3
, pp. 48-53
-
-
Kushner, D.1
-
45
-
-
84928042204
-
-
24 September, Accessed: 1 May 2015
-
Kaspersky Lab. Kaspersky Lab provides its insights on Stuxnet worm, 24 September 2010. See http://www.kaspersky.com/about/news/virus/2010/Kaspersky_Lab_provides_its_insights_on_Stuxnet_worm. Accessed: 1 May 2015.
-
(2010)
Kaspersky Lab provides its insights on Stuxnet worm
-
-
-
46
-
-
84909605962
-
The Stuxnet attack on Iran’s nuclear plant was ‘far more dangerous’ than previously thought
-
20 November, Accessed: 27 April 2015
-
Kelley M.B. The Stuxnet attack on Iran’s nuclear plant was ‘far more dangerous’ than previously thought. Business Insider, 20 November 2013. See http://www.businessinsider.com/stuxnet-was-far-more-dangerous-than-previous-thought-2013-11. Accessed: 27 April 2015.
-
(2013)
Business Insider
-
-
Kelley, M.B.1
-
47
-
-
85014195759
-
Hacking US (and UK, Australia, France, etc.) traffic control systems
-
30 April, Accessed: 3 May 2015
-
Cerrudo C. Hacking US (and UK, Australia, France, etc.) traffic control systems. IOActive Labs Blog, 30 April 2014. See http://blog.ioactive.com/2014/04/hacking-us-and-uk-australia-france-etc.html. Accessed: 3 May 2015.
-
(2014)
IOActive Labs Blog
-
-
Cerrudo, C.1
-
48
-
-
84973447258
-
Hackers can mess with traffic lights to jam roads and reroute cars
-
30 April, Accessed: 3 May 2015
-
Zetter K. Hackers can mess with traffic lights to jam roads and reroute cars. Wired, 30 April 2014. See http://www.wired.com/2014/04/traffic-lights-hacking/. Accessed: 3 May 2015.
-
(2014)
Wired
-
-
Zetter, K.1
-
49
-
-
85014257600
-
-
28 October, Advisory (ICSA-14-247-01A), Accessed: 3 May 2015
-
ICS-CERT. Sensys Networks Traffic Sensor Vulnerabilities, 28 October 2014. Advisory (ICSA-14-247-01A). See http://ics-cert.us-cert.gov/advisories/ICSA-14-247-01A. Accessed: 3 May 2015.
-
(2014)
Sensys Networks Traffic Sensor Vulnerabilities
-
-
-
50
-
-
77955181796
-
Conflict narrows oil options for West
-
14 August, Accessed: 3 May 2015
-
Mouawad J. Conflict narrows oil options for West. The New York Times, 14 August 2008. See http://www.nytimes.com/2008/08/14/world/europe/14oil.html. Accessed: 3 May 2015.
-
(2008)
The New York Times
-
-
Mouawad, J.1
-
51
-
-
84996955895
-
Mysterious '08 Turkey pipeline blast opened new cyberwar
-
10 December, Accessed: 27 April 2015
-
Robertson J., Riley M.A. Mysterious '08 Turkey pipeline blast opened new cyberwar. Bloomberg, 10 December 2014. See http://www.bloomberg.com/news/articles/2014-12-10/mysterious-08-turkey-pipeline-blast-opened-newcyberwar. Accessed: 27 April 2015.
-
(2014)
Bloomberg
-
-
Robertson, J.1
Riley, M.A.2
-
54
-
-
77955848771
-
Robust solutions to Stackelberg games: Addressing bounded rationality and limited observations in human cognition
-
Pita J., Jain M., Tambe M., Ordóñez F., Kraus S. Robust solutions to Stackelberg games: Addressing bounded rationality and limited observations in human cognition. Artificial Intelligence, 174(15): 1142-1171, 2010.
-
(2010)
Artificial Intelligence
, vol.174
, Issue.15
, pp. 1142-1171
-
-
Pita, J.1
Jain, M.2
Tambe, M.3
Ordóñez, F.4
Kraus, S.5
-
55
-
-
0029547692
-
Efficient algorithms for learning to play repeated games against computationally bounded adversaries
-
IEEE
-
Freund Y., Kearns M., Mansour Y., Ron D., Rubinfeld R., Schapire R.E. Efficient algorithms for learning to play repeated games against computationally bounded adversaries. In Proceedings of the 36th Annual Symposium on Foundations of Computer Science (FOCS), pp. 332-341. IEEE, 1995.
-
(1995)
Proceedings of the 36th Annual Symposium on Foundations of Computer Science (FOCS)
, pp. 332-341
-
-
Freund, Y.1
Kearns, M.2
Mansour, Y.3
Ron, D.4
Rubinfeld, R.5
Schapire, R.E.6
-
57
-
-
11144277843
-
Routing techniques in wireless sensor networks: A survey
-
Al-Karaki J.N., Kamal A.E. Routing techniques in wireless sensor networks: A survey. Wireless Communications, 11(6): 6-28, 2004.
-
(2004)
Wireless Communications
, vol.11
, Issue.6
, pp. 6-28
-
-
Al-Karaki, J.N.1
Kamal, A.E.2
-
58
-
-
13944283393
-
A survey on routing protocols for wireless sensor networks
-
Akkaya K., Younis M. A survey on routing protocols for wireless sensor networks. Ad Hoc Networks, 3(3): 325-349, 2005.
-
(2005)
Ad Hoc Networks
, vol.3
, Issue.3
, pp. 325-349
-
-
Akkaya, K.1
Younis, M.2
-
59
-
-
39149099807
-
Strategies and techniques for node placement in wireless sensor networks: A survey
-
Younis M., Akkaya K. Strategies and techniques for node placement in wireless sensor networks: A survey. Ad Hoc Networks, 6(4): 621-655, 2008.
-
(2008)
Ad Hoc Networks
, vol.6
, Issue.4
, pp. 621-655
-
-
Younis, M.1
Akkaya, K.2
-
60
-
-
85029768876
-
Coverage in wireless sensor networks
-
eds Ilyas M., Mahgoub I., CRC Press
-
Cardei M., Wu J. Coverage in wireless sensor networks. In Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems, eds Ilyas M., Mahgoub I., pp. 422-433. CRC Press, 2004.
-
(2004)
Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems
, pp. 422-433
-
-
Cardei, M.1
Wu, J.2
-
61
-
-
49349106443
-
Distributed deployment schemes for mobile wireless sensor networks to ensure multilevel coverage
-
Wang Y.C., Tseng Y.C. Distributed deployment schemes for mobile wireless sensor networks to ensure multilevel coverage. IEEE Transactions on Parallel and Distributed Systems, 19(9): 1280-1294, 2008.
-
(2008)
IEEE Transactions on Parallel and Distributed Systems
, vol.19
, Issue.9
, pp. 1280-1294
-
-
Wang, Y.C.1
Tseng, Y.C.2
-
65
-
-
84878649481
-
Designing robust network topologies for wireless sensor networks in adversarial environments
-
Laszka A., Buttyán L., Szeszlér D. Designing robust network topologies for wireless sensor networks in adversarial environments. Pervasive and Mobile Computing, 9(4): 546-563, 2013.
-
(2013)
Pervasive and Mobile Computing
, vol.9
, Issue.4
, pp. 546-563
-
-
Laszka, A.1
Buttyán, L.2
Szeszlér, D.3
-
66
-
-
27344446387
-
Topology control in wireless ad hoc and sensor networks
-
Santi P. Topology control in wireless ad hoc and sensor networks. ACM Computing Surveys, 37(2): 164-194, 2005.
-
(2005)
ACM Computing Surveys
, vol.37
, Issue.2
, pp. 164-194
-
-
Santi, P.1
-
68
-
-
84875593698
-
Resilient asymptotic consensus in robust networks
-
LeBlanc H.J., Zhang H., Koutsoukos X., Sundaram S. Resilient asymptotic consensus in robust networks. IEEE Journal on Selected Areas in Communications, 31(4): 766-781, 2013
-
(2013)
IEEE Journal on Selected Areas in Communications
, vol.31
, Issue.4
, pp. 766-781
-
-
LeBlanc, H.J.1
Zhang, H.2
Koutsoukos, X.3
Sundaram, S.4
-
69
-
-
79960124958
-
Distributed function calculation via linear iterative strategies in the presence of malicious agents
-
Sundaram S., Hadjicostis C.N. Distributed function calculation via linear iterative strategies in the presence of malicious agents. IEEE Transactions on Automatic Control, 56(7): 1495-1508, 2011.
-
(2011)
IEEE Transactions on Automatic Control
, vol.56
, Issue.7
, pp. 1495-1508
-
-
Sundaram, S.1
Hadjicostis, C.N.2
-
70
-
-
58649109373
-
Distributed detection in the presence of byzantine attacks
-
Marano S., Matta V., Tong L. Distributed detection in the presence of byzantine attacks. IEEE Transactions on Signal Processing, 57(1): 16-29, 2009.
-
(2009)
IEEE Transactions on Signal Processing
, vol.57
, Issue.1
, pp. 16-29
-
-
Marano, S.1
Matta, V.2
Tong, L.3
-
71
-
-
79951919001
-
Belief consensus and distributed hypothesis testing in sensor networks
-
eds Antsaklis P.J., Tabuada P., Lecture Notes in Control and Information Science, Springer
-
Olfati-Saber R., Franco E., Frazzoli E., Shamma J. Belief consensus and distributed hypothesis testing in sensor networks. In Networked Embedded Sensing and Control, eds Antsaklis P.J., Tabuada P., Lecture Notes in Control and Information Science, pp. 169-182. Springer, 2006.
-
(2006)
Networked Embedded Sensing and Control
, pp. 169-182
-
-
Olfati-Saber, R.1
Franco, E.2
Frazzoli, E.3
Shamma, J.4
-
72
-
-
85032750887
-
Distributed inference with byzantine data: State-of-the-art review on data falsification attacks
-
Vempaty A., Tong L., Varshney P. Distributed inference with byzantine data: state-of-the-art review on data falsification attacks. IEEE Signal Processing Magazine, 30(5): 65-75, 2013.
-
(2013)
IEEE Signal Processing Magazine
, vol.30
, Issue.5
, pp. 65-75
-
-
Vempaty, A.1
Tong, L.2
Varshney, P.3
|