-
1
-
-
40349105129
-
The emergence of industrial control networks for manufacturing control, diagnostics, and safety data
-
Jan
-
J. R. Moyne and D. Tilbury, "The emergence of industrial control networks for manufacturing control, diagnostics, and safety data," Proceedings of the IEEE, vol. 95, no. 1, pp. 29-47, Jan 2007.
-
(2007)
Proceedings of the IEEE
, vol.95
, Issue.1
, pp. 29-47
-
-
Moyne, J.R.1
Tilbury, D.2
-
2
-
-
70149102885
-
Understanding the physical and economic consequences of attacks on control systems
-
Y.-L. Huang, A. A. Cárdenas, S. Amin, Z.-S. Lin, H.-Y. Tsai, and S. Sastry, "Understanding the physical and economic consequences of attacks on control systems," International Journal of Critical Infrastructure Protection, vol. 2, no. 3, pp. 73-83, 2009. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S1874548209000213
-
(2009)
International Journal of Critical Infrastructure Protection
, vol.2
, Issue.3
, pp. 73-83
-
-
Huang, Y.-L.1
Cárdenas, A.A.2
Amin, S.3
Lin, Z.-S.4
Tsai, H.-Y.5
Sastry, S.6
-
3
-
-
84964426687
-
Security issue of wirelesshart based SCADA systems
-
Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Selected Papers, ser. Lecture Notes in Computer Science, C. Lambrinoudakis and A. Gabillon, Eds. Springer
-
L. Bayou, D. Espes, N. Cuppens-Boulahia, and F. Cuppens, "Security issue of wirelesshart based SCADA systems," in Risks and Security of Internet and Systems - 10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Selected Papers, ser. Lecture Notes in Computer Science, C. Lambrinoudakis and A. Gabillon, Eds., vol. 9572. Springer, 2015, pp. 225-241. [Online]. Available: http://dx.doi.org/10.1007/978-3-319-31811-0-14
-
(2015)
Risks and Security of Internet and Systems - 10Th International Conference, CRiSIS 2015
, vol.9572
, pp. 225-241
-
-
Bayou, L.1
Espes, D.2
Cuppens-Boulahia, N.3
Cuppens, F.4
-
4
-
-
33747302351
-
An intrusion detection system for wireless sensor networks
-
Aug 3
-
I. Onat and A. Miri, "An intrusion detection system for wireless sensor networks," in Wireless And Mobile Computing, Networking And Communications, 2005. (WiMob'2005), IEEE International Conference on, vol. 3, Aug 2005, pp. 253-259 Vol. 3.
-
(2005)
Wireless and Mobile Computing, Networking and Communications, 2005. (WiMob'2005), IEEE International Conference on
, vol.3
, pp. 253-259
-
-
Onat, I.1
Miri, A.2
-
5
-
-
84900637145
-
A survey of intrusion detection in wireless network applications
-
R. Mitchell and I. Chen, "A survey of intrusion detection in wireless network applications," Computer Communications, vol. 42, pp. 1-23, 2014. [Online]. Available: http://dx.doi.org/10.1016/j.comcom.2014.01.012
-
(2014)
Computer Communications
, vol.42
, pp. 1-23
-
-
Mitchell, R.1
Chen, I.2
-
6
-
-
78649951433
-
An intrusion detection system for critical information infrastructures using wireless sensor network technologies
-
Sept
-
L. Coppolino, S. D'Antonio, L. Romano, and G. Spagnuolo, "An intrusion detection system for critical information infrastructures using wireless sensor network technologies," in Critical Infrastructure (CRIS), 2010 5th International Conference on, Sept 2010, pp. 1-8.
-
(2010)
Critical Infrastructure (CRIS), 2010 5th International Conference on
, pp. 1-8
-
-
Coppolino, L.1
D'Antonio, S.2
Romano, L.3
Spagnuolo, G.4
-
7
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: attacks and countermeasures," Ad Hoc Networks, vol. 1, no. 2-3, pp. 293-315, 2003. [Online]. Available: http://dx.doi.org/10.1016/S1570-8705(03)00008-8
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.2-3
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
8
-
-
84947273682
-
The sybil attack
-
Cambridge, USA, ser. Lecture Notes in Computer Science, P. Druschel, M. F. Kaashoek, and A. I. T. Rowstron, Eds. Springer
-
J. R. Douceur, "The sybil attack," in Peer-to-Peer Systems, First International Workshop, IPTPS 2002, Cambridge, USA, ser. Lecture Notes in Computer Science, P. Druschel, M. F. Kaashoek, and A. I. T. Rowstron, Eds., vol. 2429. Springer, 2002, pp. 251-260. [Online]. Available: http://dx.doi.org/10.1007/3-540-45748-8-24
-
(2002)
Peer-to-Peer Systems, First International Workshop, IPTPS 2002
, vol.2429
, pp. 251-260
-
-
Douceur, J.R.1
-
9
-
-
3042785862
-
The sybil attack in sensor networks: Analysis & defenses
-
IPSN, USA, K. Ramchandran, J. Sztipanovits, J. C. Hou, and T. N. Pappas, Eds. ACM
-
J. Newsome, E. Shi, D. X. Song, and A. Perrig, "The sybil attack in sensor networks: analysis & defenses," in Proceedings of the Third International Symposium on Information Processing in Sensor Networks, IPSN, USA, K. Ramchandran, J. Sztipanovits, J. C. Hou, and T. N. Pappas, Eds. ACM, 2004, pp. 259-268. [Online]. Available: http://doi.acm.org/10.1145/984622.984660
-
(2004)
Proceedings of the Third International Symposium on Information Processing in Sensor Networks
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.X.3
Perrig, A.4
-
10
-
-
34447283779
-
Liteworp: Detection and isolation of the wormhole attack in static multihop wireless networks
-
I. Khalil, S. Bagchi, and N. B. Shroff, "Liteworp: Detection and isolation of the wormhole attack in static multihop wireless networks," Computer Networks, vol. 51, no. 13, pp. 3750-3772, 2007. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S1389128607001004
-
(2007)
Computer Networks
, vol.51
, Issue.13
, pp. 3750-3772
-
-
Khalil, I.1
Bagchi, S.2
Shroff, N.B.3
-
11
-
-
33749041485
-
Applying intrusion detection systems to wireless sensor networks
-
CCNC 2006. 3rd IEEE Jan
-
R. Roman, J. Zhou, and J. Lopez, "Applying intrusion detection systems to wireless sensor networks," in Consumer Communications and Networking Conference, 2006. CCNC 2006. 3rd IEEE, vol. 1, Jan 2006, pp. 640-644.
-
(2006)
Consumer Communications and Networking Conference, 2006
, vol.1
, pp. 640-644
-
-
Roman, R.1
Zhou, J.2
Lopez, J.3
-
12
-
-
79551514612
-
Edge self-monitoring for wireless sensor networks
-
March
-
D. Dong, X. Liao, Y. Liu, C. Shen, and X. Wang, "Edge self-monitoring for wireless sensor networks," Parallel and Distributed Systems, IEEE Transactions on, vol. 22, no. 3, pp. 514-527, March 2011.
-
(2011)
Parallel and Distributed Systems, IEEE Transactions on
, vol.22
, Issue.3
, pp. 514-527
-
-
Dong, D.1
Liao, X.2
Liu, Y.3
Shen, C.4
Wang, X.5
-
13
-
-
84908262197
-
A self-stabilizing algorithm for edge monitoring problem
-
Paderborn, Germany, September 28 - October 1, 2014. Proceedings, ser. Lecture Notes in Computer Science, P. Felber and V. K. Garg, Eds. Springer
-
B. Neggazi, M. Haddad, V. Turau, and H. Kheddouci, "A self-stabilizing algorithm for edge monitoring problem," in Stabilization, Safety, and Security of Distributed Systems - 16th International Symposium, SSS 2014, Paderborn, Germany, September 28 - October 1, 2014. Proceedings, ser. Lecture Notes in Computer Science, P. Felber and V. K. Garg, Eds., vol. 8756. Springer, 2014, pp. 93-105. [Online]. Available: http://dx.doi.org/10.1007/978-3-319-11764-5-7
-
(2014)
Stabilization, Safety, and Security of Distributed Systems - 16Th International Symposium, SSS 2014
, vol.8756
, pp. 93-105
-
-
Neggazi, B.1
Haddad, M.2
Turau, V.3
Kheddouci, H.4
-
14
-
-
84881313532
-
On the vital areas of intrusion detection systems in wireless sensor networks
-
A. Abduvaliyev, A. K. Pathan, J. Zhou, R. Roman, and W. Wong, "On the vital areas of intrusion detection systems in wireless sensor networks," IEEE Communications Surveys and Tutorials, vol. 15, no. 3, pp. 1223-1237, 2013. [Online]. Available: http://dx.doi.org/10.1109/SURV.2012.121912.00006
-
(2013)
IEEE Communications Surveys and Tutorials
, vol.15
, Issue.3
, pp. 1223-1237
-
-
Abduvaliyev, A.1
Pathan, A.K.2
Zhou, J.3
Roman, R.4
Wong, W.5
-
15
-
-
32144435943
-
Decentralized intrusion detection in wireless sensor networks
-
A. Boukerche and R. B. de Araujo, Eds. ACM
-
A. P. R. da Silva, M. H. T. Martins, B. P. S. Rocha, A. A. F. Loureiro, L. B. Ruiz, and H. C. Wong, "Decentralized intrusion detection in wireless sensor networks," in Q2SWinet'05 - Proceedings of the First ACM Workshop on Q2S and Security for Wireless and Mobile Networks, Montreal, Quebec, Canada, October 13, 2005, A. Boukerche and R. B. de Araujo, Eds. ACM, 2005, pp. 16-23. [Online]. Available: http://doi.acm.org/10.1145/1089761.1089765
-
(2005)
Q2SWinet'05 - Proceedings of the First ACM Workshop on Q2S and Security for Wireless and Mobile Networks, Montreal, Quebec, Canada, October 13, 2005
, pp. 16-23
-
-
Da Silva, A.P.R.1
Martins, M.H.T.2
Rocha, B.P.S.3
Loureiro, A.A.F.4
Ruiz, L.B.5
Wong, H.C.6
-
16
-
-
67650679664
-
An intrusion detection system for wireless process control systems
-
IEEE
-
T. Roosta, D. K. Nilsson, U. Lindqvist, and A. Valdes, "An intrusion detection system for wireless process control systems," in IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, MASS, USA. IEEE, 2008, pp. 866-872. [Online]. Available: http://dx.doi.org/10.1109/MAHSS.2008.4660125
-
(2008)
IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, MASS, USA
, pp. 866-872
-
-
Roosta, T.1
Nilsson, D.K.2
Lindqvist, U.3
Valdes, A.4
-
17
-
-
34247609717
-
Positioning of base stations in wireless sensor networks
-
April
-
K. Akkaya, M. Younis, and W. Youssef, "Positioning of base stations in wireless sensor networks," IEEE Communications Magazine, vol. 45, no. 4, pp. 96-102, April 2007.
-
(2007)
IEEE Communications Magazine
, vol.45
, Issue.4
, pp. 96-102
-
-
Akkaya, K.1
Younis, M.2
Youssef, W.3
-
18
-
-
34548850872
-
A survey on clustering algorithms for wireless sensor networks
-
network Coverage and Routing Schemes for Wireless Sensor Networks
-
A. A. Abbasi and M. Younis, "A survey on clustering algorithms for wireless sensor networks," Computer Communications, vol. 30, no. 14-15, pp. 2826-2841, 2007, network Coverage and Routing Schemes for Wireless Sensor Networks. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S0140366407002162
-
(2007)
Computer Communications
, vol.30
, Issue.14-15
, pp. 2826-2841
-
-
Abbasi, A.A.1
Younis, M.2
-
19
-
-
0020720357
-
On the security of public key protocols
-
D. Dolev and A. C. Yao, "On the security of public key protocols," IEEE Transactions on Information Theory, vol. 29, no. 2, pp. 198-207, 1983. [Online]. Available: http://dx.doi.org/10.1109/TIT.1983.1056650
-
(1983)
IEEE Transactions on Information Theory
, vol.29
, Issue.2
, pp. 198-207
-
-
Dolev, D.1
Yao, A.C.2
-
21
-
-
78049333048
-
IEEE 802.11 WLANs: A comparison on indoor coverage models
-
Calgary, Alberta, Canada, 2-5 May, 2010. IEEE
-
C. B. Andrade and R. P. F. Hoefel, "IEEE 802.11 WLANs: A comparison on indoor coverage models," in Proceedings of the 23rd Canadian Conference on Electrical and Computer Engineering, CCECE 2010, Calgary, Alberta, Canada, 2-5 May, 2010. IEEE, 2010, pp. 1-6. [Online]. Available: http://dx.doi.org/10.1109/CCECE.2010.5575205
-
(2010)
Proceedings of the 23rd Canadian Conference on Electrical and Computer Engineering, CCECE 2010
, pp. 1-6
-
-
Andrade, C.B.1
Hoefel, R.P.F.2
-
22
-
-
84871418616
-
Connected dominating sets in wireless ad hoc and sensor networks - A comprehensive survey
-
J. Yu, N. Wang, G. Wang, and D. Yu, "Connected dominating sets in wireless ad hoc and sensor networks - A comprehensive survey," Computer Communications, vol. 36, no. 2, pp. 121-134, 2013. [Online]. Available: http://dx.doi.org/10.1016/j.comcom.2012.10.005
-
(2013)
Computer Communications
, vol.36
, Issue.2
, pp. 121-134
-
-
Yu, J.1
Wang, N.2
Wang, G.3
Yu, D.4
-
23
-
-
19644369843
-
Approximation algorithms for connected dominating sets
-
Apr.
-
S. Guha and S. Khuller, "Approximation algorithms for connected dominating sets," Algorithmica, vol. 20, no. 4, pp. 374-387, Apr. 1998. [Online]. Available: http://dx.doi.org/10.1007/PL00009201
-
(1998)
Algorithmica
, vol.20
, Issue.4
, pp. 374-387
-
-
Guha, S.1
Khuller, S.2
-
24
-
-
84876476789
-
-
HART Communication Foundation, "WirelessHART," http://www.hartcom.org.
-
WirelessHART
-
-
|