-
1
-
-
85037048004
-
-
Accessed on Sep. 21
-
NIST & The Smart Grid. Accessed on Sep. 21, 2016. [Online]. Available: http://www.nist.gov/smartgrid/nistandsmartgrid.cfm
-
(2016)
NIST & The Smart Grid
-
-
-
2
-
-
85037038755
-
-
Open Source RFID Software Platform
-
Fosstrak: Open Source RFID Software Platform. [Online]. Available: https://fosstrak.github.io/
-
-
-
-
3
-
-
85037046131
-
-
Google Self-Driving Car
-
Google Self-Driving Car. [Online]. Available: http://www.google.com/ selfdrivingcar/how/
-
-
-
-
5
-
-
84893545247
-
Cyber physical system: Architecture, applications and research challenges
-
Valencia, Spain, Nov
-
S. H. Ahmed, G. Kim, and D. Kim, "Cyber physical system: Architecture, applications and research challenges," in Proc. IFIP Wireless Days (WD), Valencia, Spain, Nov. 2013, pp. 1-5.
-
(2013)
Proc. IFIP Wireless Days (WD)
, pp. 1-5
-
-
Ahmed, S.H.1
Kim, G.2
Kim, D.3
-
6
-
-
0036688074
-
A survey on sensor networks
-
Aug
-
I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "A survey on sensor networks," IEEE Commun. Mag., vol. 40, no. 8, pp. 102-114, Aug. 2002.
-
(2002)
IEEE Commun. Mag.
, vol.40
, Issue.8
, pp. 102-114
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
7
-
-
84941085241
-
Internet of things: A survey on enabling technologies, protocols, and applications
-
4th Quart
-
A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. Ayyash, "Internet of Things: A survey on enabling technologies, protocols, and applications," IEEE Commun. Surveys Tuts., vol. 17, no. 4, pp. 2347-2376, 4th Quart., 2015.
-
(2015)
IEEE Commun. Surveys Tuts.
, vol.17
, Issue.4
, pp. 2347-2376
-
-
Al-Fuqaha, A.1
Guizani, M.2
Mohammadi, M.3
Aledhari, M.4
Ayyash, M.5
-
8
-
-
84961943315
-
Internet of things: Security vulnerabilities and challenges
-
Larnaca, Cyprus, Jul
-
I. Andrea, C. Chrysostomou, and G. Hadjichristofi, "Internet of Things: Security vulnerabilities and challenges," in Proc. IEEE Symp. Comput. Commun. (ISCC), Larnaca, Cyprus, Jul. 2015, pp. 180-187.
-
(2015)
Proc. IEEE Symp. Comput. Commun. (ISCC)
, pp. 180-187
-
-
Andrea, I.1
Chrysostomou, C.2
Hadjichristofi, G.3
-
10
-
-
77956877124
-
The internet of things: A survey
-
Oct
-
L. Atzori, A. Iera, and G. Morabito, "The Internet of Things: A survey," Comput. Netw., vol. 54, no. 15, pp. 2787-2805, Oct. 2010.
-
(2010)
Comput. Netw.
, vol.54
, Issue.15
, pp. 2787-2805
-
-
Atzori, L.1
Iera, A.2
Morabito, G.3
-
11
-
-
84866034380
-
The social internet of things (siot)-when social networks meet the internet of things: Concept, architecture and network characterization
-
Nov
-
L. Atzori, A. Iera, G. Morabito, and M. Nitti, "The social Internet of Things (SIoT)-When social networks meet the Internet of Things: Concept, architecture and network characterization," Comput. Netw., vol. 56, no. 16, pp. 3594-3608, Nov. 2012.
-
(2012)
Comput. Netw.
, vol.56
, Issue.16
, pp. 3594-3608
-
-
Atzori, L.1
Iera, A.2
Morabito, G.3
Nitti, M.4
-
12
-
-
84863231842
-
Novel antiforensics approaches for smart phones
-
S. Azadegan, W. Yu, H. Liu, A. Sistani, and S. Acharya, "Novel antiforensics approaches for smart phones," in Proc. 45th Hawaii Int. Conf. Syst. Sci. (HICSS), 2012, pp. 5424-5431.
-
(2012)
Proc. 45th Hawaii Int. Conf. Syst. Sci. (HICSS)
, pp. 5424-5431
-
-
Azadegan, S.1
Yu, W.2
Liu, H.3
Sistani, A.4
Acharya, S.5
-
13
-
-
34047126869
-
Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards
-
May
-
P. Baronti et al., "Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards," Comput. Commun., vol. 30, no. 7, pp. 1655-1695, May 2007.
-
(2007)
Comput. Commun.
, vol.30
, Issue.7
, pp. 1655-1695
-
-
Baronti, P.1
-
14
-
-
84865367037
-
-
Forrester Res., Cambridge, MA, USA, Tech. Rep., Nov
-
J. Bélissent, "Getting clever about smart cities: New opportunities require new business models," Forrester Res., Cambridge, MA, USA, Tech. Rep., Nov. 2010. [Online]. Available: https://www.forrester.com/ report/Getting+Clever+About+Smart+Cities+New+Opportunities+ Require+New+Business+Models/-/E-RES56701?aid=AST127312
-
(2010)
Getting Clever about Smart Cities: New Opportunities Require New Business Models
-
-
Bélissent, J.1
-
15
-
-
84877939273
-
Node capture attack in wireless sensor network: A survey
-
Coimbatore, India, Dec
-
M. V. Bharathi, R. C. Tanguturi, C. Jayakumar, and K. Selvamani, "Node capture attack in wireless sensor network: A survey," in Proc. IEEE Int. Conf. Comput. Intell. Comput. Res. (ICCIC), Coimbatore, India, Dec. 2012, pp. 1-3.
-
(2012)
Proc. IEEE Int. Conf. Comput. Intell. Comput. Res. (ICCIC)
, pp. 1-3
-
-
Bharathi, M.V.1
Tanguturi, R.C.2
Jayakumar, C.3
Selvamani, K.4
-
16
-
-
84866627419
-
Fog computing and its role in the Internet of Things
-
Helsinki, Finland, Aug
-
F. Bonomi, R. A. Milito, J. Zhu, and S. Addepalli, "Fog computing and its role in the Internet of Things," in Proc. 1st Edition MCC Workshop Mobile Cloud Comput., Helsinki, Finland, Aug. 2012, pp. 13-16.
-
(2012)
Proc. 1st Edition MCC Workshop Mobile Cloud Comput
, pp. 13-16
-
-
Bonomi, F.1
Milito, R.A.2
Zhu, J.3
Addepalli, S.4
-
17
-
-
84858171962
-
CoAP: An application protocol for billions of tiny Internet nodes
-
Mar./Apr
-
C. Bormann, A. P. Castellani, and Z. Shelby, "CoAP: An application protocol for billions of tiny Internet nodes," IEEE Internet Comput., vol. 16, no. 2, pp. 62-67, Mar./Apr. 2012.
-
(2012)
IEEE Internet Comput.
, vol.16
, Issue.2
, pp. 62-67
-
-
Bormann, C.1
Castellani, A.P.2
Shelby, Z.3
-
18
-
-
84922544728
-
On the integration of cloud computing and Internet of Things
-
Barcelona, Spain, Aug
-
A. Botta, W. de Donato, V. Persico, and A. Pescapé, "On the integration of cloud computing and Internet of Things," in Proc. Int. Conf. Future Internet Things Cloud (FiCloud), Barcelona, Spain, Aug. 2014, pp. 23-30.
-
(2014)
Proc. Int. Conf. Future Internet Things Cloud (FiCloud)
, pp. 23-30
-
-
Botta, A.1
De Donato, W.2
Persico, V.3
Pescapé, A.4
-
19
-
-
85010882210
-
The deployment of a smart monitoring system using wireless sensor and actuator networks
-
Gaithersburg, MD, USA, Oct
-
N. Bressan et al., "The deployment of a smart monitoring system using wireless sensor and actuator networks," in Proc. 1st IEEE Int. Conf. Smart Grid Commun. (SmartGridComm), Gaithersburg, MD, USA, Oct. 2010, pp. 49-54.
-
(2010)
Proc. 1st IEEE Int. Conf. Smart Grid Commun. (SmartGridComm)
, pp. 49-54
-
-
Bressan, N.1
-
20
-
-
85049030563
-
Collective data-sanitization for preventing sensitive information inference attacks in social networks
-
to be published
-
Z. Cai, Z. He, X. Guan, and Y. Li, "Collective data-sanitization for preventing sensitive information inference attacks in social networks," IEEE Trans. Depend. Secure Comput., to be published, doi: 10.1109/TDSC.2016.2613521.
-
IEEE Trans. Depend. Secure Comput
-
-
Cai, Z.1
He, Z.2
Guan, X.3
Li, Y.4
-
21
-
-
84877659567
-
Pro-energy: A novel energy prediction model for solar and wind energy-harvesting wireless sensor networks
-
Las Vegas, NV, USA, Oct
-
A. Cammarano, C. Petrioli, and D. Spenza, "Pro-energy: A novel energy prediction model for solar and wind energy-harvesting wireless sensor networks," in Proc. IEEE 9th Int. Conf. Mobile Ad-Hoc Sensor Syst. (MASS), Las Vegas, NV, USA, Oct. 2012, pp. 75-83.
-
(2012)
Proc. IEEE 9th Int. Conf. Mobile Ad-Hoc Sensor Syst. (MASS)
, pp. 75-83
-
-
Cammarano, A.1
Petrioli, C.2
Spenza, D.3
-
22
-
-
0242678584
-
Self-organized publickey management for mobile ad hoc networks
-
Jan./Mar
-
S. Capkun, L. Buttyan, and J.-P. Hubaux, "Self-organized publickey management for mobile ad hoc networks," IEEE Trans. Mobile Comput., vol. 2, no. 1, pp. 52-64, Jan./Mar. 2003.
-
(2003)
IEEE Trans. Mobile Comput.
, vol.2
, Issue.1
, pp. 52-64
-
-
Capkun, S.1
Buttyan, L.2
Hubaux, J.-P.3
-
23
-
-
51849091527
-
Secure control: Towards survivable cyber-physical systems
-
Beijing, China, Jun
-
A. A. Cardenas, S. Amin, and S. Sastry, "Secure control: Towards survivable cyber-physical systems," in Proc. 28th Int. Conf. Distrib. Comput. Syst. Workshops, Beijing, China, Jun. 2008, pp. 495-500.
-
(2008)
Proc. 28th Int. Conf. Distrib. Comput. Syst. Workshops
, pp. 495-500
-
-
Cardenas, A.A.1
Amin, S.2
Sastry, S.3
-
24
-
-
67649600839
-
The 'wireless sensor networks for city-wide ambient intelligence (WISE-WAI)' project
-
May
-
P. Casari et al., "The 'wireless sensor networks for city-wide ambient intelligence (WISE-WAI)' project," Sensors, vol. 9, no. 6, pp. 4056-4082, May 2009.
-
(2009)
Sensors
, vol.9
, Issue.6
, pp. 4056-4082
-
-
Casari, P.1
-
25
-
-
84866914974
-
Challenges in middleware solutions for the Internet of Things
-
Denver, CO, USA, May
-
M. A. Chaqfeh and N. Mohamed, "Challenges in middleware solutions for the Internet of Things," in Proc. Int. Conf. Collaboration Technol. Syst. (CTS), Denver, CO, USA, May 2012, pp. 21-26.
-
(2012)
Proc. Int. Conf. Collaboration Technol. Syst. (CTS)
, pp. 21-26
-
-
Chaqfeh, M.A.1
Mohamed, N.2
-
26
-
-
84886554181
-
MAODV: Modified wormhole detection AODV protocol
-
Noida, India, Aug
-
U. K. Chaurasia and V. Singh, "MAODV: Modified wormhole detection AODV protocol," in Proc. 6th Int. Conf. Contemp. Comput. (IC3), Noida, India, Aug. 2013, pp. 239-243.
-
(2013)
Proc. 6th Int. Conf. Contemp. Comput. (IC3)
, pp. 239-243
-
-
Chaurasia, U.K.1
Singh, V.2
-
27
-
-
85058010955
-
User differentiated verifiable file search on the cloud
-
to be published
-
F. Chen, T. Xiang, X. Fu, and W. Yu, "User differentiated verifiable file search on the cloud," IEEE Trans. Services Comput., to be published, doi: 10.1109/TSC.2016.2589245.
-
IEEE Trans. Services Comput
-
-
Chen, F.1
Xiang, T.2
Fu, X.3
Yu, W.4
-
28
-
-
84912093152
-
Trust management for service composition in SOA-based IoT systems
-
Istanbul, Turkey, Apr
-
I.-R. Chen, J. Guo, and F. Bao, "Trust management for service composition in SOA-based IoT systems," in Proc. IEEE Wireless Commun. Netw. Conf. (WCNC), Istanbul, Turkey, Apr. 2014, pp. 3444-3449.
-
(2014)
Proc. IEEE Wireless Commun. Netw. Conf. (WCNC)
, pp. 3444-3449
-
-
Chen, I.-R.1
Guo, J.2
Bao, F.3
-
29
-
-
84949671050
-
A cloud computing based network monitoring and threat detection system for critical infrastructures
-
Apr
-
Z. Chen et al., "A cloud computing based network monitoring and threat detection system for critical infrastructures," Big Data Res., vol. 3, pp. 10-23, Apr. 2016.
-
(2016)
Big Data Res.
, vol.3
, pp. 10-23
-
-
Chen, Z.1
-
31
-
-
77749261552
-
Design of RFID mutual authentication protocol using time stamp
-
Seoul, South Korea, Nov
-
C.-H. Cho, K.-H. Do, J.-W. Kim, and M.-S. Jun, "Design of RFID mutual authentication protocol using time stamp," in Proc. 4th Int. Conf. Comput. Sci. Convergence Inf. Technol. (ICCIT), Seoul, South Korea, Nov. 2009, pp. 1047-1051.
-
(2009)
Proc. 4th Int. Conf. Comput. Sci. Convergence Inf. Technol. (ICCIT)
, pp. 1047-1051
-
-
Cho, C.-H.1
Do, K.-H.2
Kim, J.-W.3
Jun, M.-S.4
-
32
-
-
84907599949
-
TEAM: Trust-extended authentication mechanism for vehicular ad hoc networks
-
Sep
-
M.-C. Chuang and J.-F. Lee, "TEAM: Trust-extended authentication mechanism for vehicular ad hoc networks," IEEE Syst. J., vol. 8, no. 3, pp. 749-758, Sep. 2014.
-
(2014)
IEEE Syst. J.
, vol.8
, Issue.3
, pp. 749-758
-
-
Chuang, M.-C.1
Lee, J.-F.2
-
33
-
-
84893235690
-
Compose: Building smart & contextaware mobile applications utilizing IoT technologies
-
Trento, Italy, Oct
-
C. Doukas and F. Antonelli, "COMPOSE: Building smart & contextaware mobile applications utilizing IoT technologies," in Proc. 5th IEEE Glob. Inf. Infrastruct. Netw. Symp., Trento, Italy, Oct. 2013, pp. 1-6.
-
(2013)
Proc. 5th IEEE Glob. Inf. Infrastruct. Netw. Symp.
, pp. 1-6
-
-
Doukas, C.1
Antonelli, F.2
-
34
-
-
33750023217
-
An effective key management scheme for heterogeneous sensor networks
-
X. Du, Y. Xiao, M. Guizani, and H.-H. Chen, "An effective key management scheme for heterogeneous sensor networks," Ad Hoc Netw., vol. 5, no. 1, pp. 24-34, 2007.
-
(2007)
Ad Hoc Netw.
, vol.5
, Issue.1
, pp. 24-34
-
-
Du, X.1
Xiao, Y.2
Guizani, M.3
Chen, H.-H.4
-
35
-
-
79952018833
-
Cyber crime scene investigations (C2SI) through cloud computing
-
Genoa, Italy
-
X. Fu, Z. Ling, W. Yu, and J. Luo, "Cyber crime scene investigations (C2SI) through cloud computing," in Proc. IEEE 30th Int. Conf. Distrib. Comput. Syst. Workshops (ICDCSW), Genoa, Italy, 2010, pp. 26-31.
-
(2010)
Proc. IEEE 30th Int. Conf. Distrib. Comput. Syst. Workshops (ICDCSW)
, pp. 26-31
-
-
Fu, X.1
Ling, Z.2
Yu, W.3
Luo, J.4
-
36
-
-
84856448398
-
Combining heterogeneous service technologies for building an Internet of Things middleware
-
Feb
-
K. Gama, L. Touseau, and D. Donsez, "Combining heterogeneous service technologies for building an Internet of Things middleware," Comput. Commun., vol. 35, no. 4, pp. 405-417, Feb. 2012.
-
(2012)
Comput. Commun.
, vol.35
, Issue.4
, pp. 405-417
-
-
Gama, K.1
Touseau, L.2
Donsez, D.3
-
37
-
-
80052855361
-
Internet of Things security analysis
-
Wuhan, China, Aug
-
G. Gan, Z. Lu, and J. Jiang, "Internet of Things security analysis," in Proc. Int. Conf. Internet Technol. Appl. (iTAP), Wuhan, China, Aug. 2011, pp. 1-4.
-
(2011)
Proc. Int. Conf. Internet Technol. Appl. (ITAP)
, pp. 1-4
-
-
Gan, G.1
Lu, Z.2
Jiang, J.3
-
38
-
-
85006725798
-
Assessing performance of constrained application protocol (CoAP) in MANET using emulation
-
Odense, Denmark
-
W. Gao, J. Nguyen, W. Yu, C. Lu, and D. Ku, "Assessing performance of constrained application protocol (CoAP) in MANET using emulation," in Proc. ACM Int. Conf. Rel. Convergent Syst. (RACS), Odense, Denmark, 2016, pp. 103-108.
-
(2016)
Proc. ACM Int. Conf. Rel. Convergent Syst. (RACS)
, pp. 103-108
-
-
Gao, W.1
Nguyen, J.2
Yu, W.3
Lu, C.4
Ku, D.5
-
39
-
-
24144459865
-
CDA: Concealed data aggregation for reverse multicast traffic in wireless sensor networks
-
Seoul, South Korea, May
-
J. Girao, D. Westhoff, and M. Schneider, "CDA: Concealed data aggregation for reverse multicast traffic in wireless sensor networks," in Proc. IEEE Int. Conf. Commun. (ICC), vol. 5. Seoul, South Korea, May 2005, pp. 3044-3049.
-
(2005)
Proc. IEEE Int. Conf. Commun. (ICC)
, vol.5
, pp. 3044-3049
-
-
Girao, J.1
Westhoff, D.2
Schneider, M.3
-
41
-
-
77953085540
-
Wireless home automation networks: A survey of architectures and technologies
-
Jun
-
C. Gomez and J. Paradells, "Wireless home automation networks: A survey of architectures and technologies," IEEE Commun. Mag., vol. 48, no. 6, pp. 92-101, Jun. 2010.
-
(2010)
IEEE Commun. Mag.
, vol.48
, Issue.6
, pp. 92-101
-
-
Gomez, C.1
Paradells, J.2
-
42
-
-
84959202946
-
On the equivalence between interference and eavesdropping in wireless communications
-
Dec
-
G. Gomez, F. J. Lopez-Martinez, D. Morales-Jimenez, and M. R. McKay, "On the equivalence between interference and eavesdropping in wireless communications," IEEE Trans. Veh. Technol., vol. 64, no. 12, pp. 5935-5940, Dec. 2015.
-
(2015)
IEEE Trans. Veh. Technol.
, vol.64
, Issue.12
, pp. 5935-5940
-
-
Gomez, G.1
Lopez-Martinez, F.J.2
Morales-Jimenez, D.3
McKay, M.R.4
-
43
-
-
78649872682
-
A triple space-based semantic distributed middleware for Internet of Things
-
Vienna, Austria, Jul
-
A. Gómez-Goiri and D. López-de Ipin&tild;a, "A triple space-based semantic distributed middleware for Internet of Things," in Proc. Int. Conf. Web Eng., Vienna, Austria, Jul. 2010, pp. 447-458.
-
(2010)
Proc. Int. Conf. Web Eng.
, pp. 447-458
-
-
Gómez-Goiri, A.1
De López, I.D.2
-
45
-
-
77956394831
-
Interacting with the SOA-based Internet of Things: Discovery, query, selection, and on-demand provisioning of Web services
-
Jul./Sep
-
D. Guinard, V. Trifa, S. Karnouskos, P. Spiess, and D. Savio, "Interacting with the SOA-based Internet of Things: Discovery, query, selection, and on-demand provisioning of Web services," IEEE Trans. Services Comput., vol. 3, no. 3, pp. 223-235, Jul./Sep. 2010.
-
(2010)
IEEE Trans. Services Comput.
, vol.3
, Issue.3
, pp. 223-235
-
-
Guinard, D.1
Trifa, V.2
Karnouskos, S.3
Spiess, P.4
Savio, D.5
-
46
-
-
33646518088
-
Middleware: Middleware challenges and approaches for wireless sensor networks
-
Mar
-
S. Hadim and N. Mohamed, "Middleware: Middleware challenges and approaches for wireless sensor networks," IEEE Distrib. Syst. Online, vol. 7, no. 3, p. 1, Mar. 2006.
-
(2006)
IEEE Distrib. Syst. Online
, vol.7
, Issue.3
, pp. 1
-
-
Hadim, S.1
Mohamed, N.2
-
47
-
-
84875214013
-
A cross-layer communication module for the Internet of Things
-
Feb
-
C. Han, J. M. Jornet, E. Fadel, and I. F. Akyildiz, "A cross-layer communication module for the Internet of Things," Comput. Netw., vol. 57, no. 3, pp. 622-633, Feb. 2013.
-
(2013)
Comput. Netw.
, vol.57
, Issue.3
, pp. 622-633
-
-
Han, C.1
Jornet, J.M.2
Fadel, E.3
Akyildiz, I.F.4
-
48
-
-
34548301953
-
PDA: Privacy-preserving data aggregation in wireless sensor networks
-
Anchorage, AK, USA, May
-
W. He, X. Liu, H. Nguyen, K. Nahrstedt, and T. Abdelzaher, "PDA: Privacy-preserving data aggregation in wireless sensor networks," in Proc. 26th IEEE Int. Conf. Comput. Commun. (INFOCOM), Anchorage, AK, USA, May 2007, pp. 2045-2053.
-
(2007)
Proc. 26th IEEE Int. Conf. Comput. Commun. (INFOCOM)
, pp. 2045-2053
-
-
He, W.1
Liu, X.2
Nguyen, H.3
Nahrstedt, K.4
Abdelzaher, T.5
-
49
-
-
84880747406
-
The two-dimensional bar code application in book management
-
Sanya, China, Oct
-
X. He, "The two-dimensional bar code application in book management," in Proc. Int. Conf. Web Inf. Syst. Min. (WISM), vol. 1. Sanya, China, Oct. 2010, pp. 409-411.
-
(2010)
Proc. Int. Conf. Web Inf. Syst. Min. (WISM)
, vol.1
, pp. 409-411
-
-
He, X.1
-
50
-
-
84887284845
-
Cyber-physical system concepts for IT students
-
Orlando, FL, USA, Oct
-
R. G. Helps and S. J. Pack, "Cyber-physical system concepts for IT students," in Proc. 14th Annu. ACM SIGITE Conf. Inf. Technol. Educ. (SIGITE), Orlando, FL, USA, Oct. 2013, pp. 7-12.
-
(2013)
Proc. 14th Annu. ACM SIGITE Conf. Inf. Technol. Educ. (SIGITE)
, pp. 7-12
-
-
Helps, R.G.1
Pack, S.J.2
-
51
-
-
84865089693
-
Active wireless sensor with radio frequency identification chip
-
Opatija, Croatia, May
-
D. C ika, M. Draganic, and Z. Šipuš, "Active wireless sensor with radio frequency identification chip," in Proc. 35th Int. Conv., Opatija, Croatia, May 2012, pp. 727-732.
-
(2012)
Proc. 35th Int. Conv
, pp. 727-732
-
-
Ika, D.C.1
Draganic, M.2
Šipuš, Z.3
-
52
-
-
79952489796
-
Survey paper: A survey of applications and requirements of unique identification systems and RFID techniques
-
Apr
-
E. Ilie-Zudor, Z. Kemény, F. van Blommestein, L. Monostori, and A. van der Meulen, "Survey paper: A survey of applications and requirements of unique identification systems and RFID techniques," Comput. Ind. Eng., vol. 62, no. 3, pp. 227-252, Apr. 2011.
-
(2011)
Comput. Ind. Eng.
, vol.62
, Issue.3
, pp. 227-252
-
-
Ilie-Zudor, E.1
Kemény, Z.2
Van Blommestein, F.3
Monostori, L.4
Van Blommestein, A.5
-
53
-
-
84930355694
-
Who is investing in machineto-machine communications?
-
Florence, Italy, Oct
-
A. Laya, V.-I. Bratu, and J. Markendahl, "Who is investing in machineto-machine communications?" in Proc. 24th Eur. Regional Conf. Int. Telecommun. Soc., Florence, Italy, Oct. 2013, pp. 1-21.
-
(2013)
Proc. 24th Eur. Regional Conf. Int. Telecommun. Soc.
, pp. 1-21
-
-
Laya, A.1
Bratu, V.-I.2
Markendahl, J.3
-
54
-
-
34848911641
-
Social phishing
-
Oct
-
T. N. Jagatic, N. A. Johnson, M. Jakobsson, and F. Menczer, "Social phishing," Commun. ACM, vol. 50, no. 10, pp. 94-100, Oct. 2007.
-
(2007)
Commun. ACM
, vol.50
, Issue.10
, pp. 94-100
-
-
Jagatic, T.N.1
Johnson, N.A.2
Jakobsson, M.3
Menczer, F.4
-
55
-
-
84867696565
-
Light-weight multicast DNS and DNS-SD (lmDNS-SD): IPv6-based resource and service discovery for the Web of Things
-
Palermo, Italy, Jul
-
A. J. Jara, P. Martinez-Julia, and A. Skarmeta, "Light-weight multicast DNS and DNS-SD (lmDNS-SD): IPv6-based resource and service discovery for the Web of Things," in Proc. 6th Int. Conf. Innov. Mobile Internet Services Ubiquitous Comput. (IMIS), Palermo, Italy, Jul. 2012, pp. 731-738.
-
(2012)
Proc. 6th Int. Conf. Innov. Mobile Internet Services Ubiquitous Comput. (IMIS)
, pp. 731-738
-
-
Jara, A.J.1
Martinez-Julia, P.2
Skarmeta, A.3
-
56
-
-
70350713978
-
RFID access authorization by face recognition
-
Jul
-
B.-Z. Jing et al., "RFID access authorization by face recognition," in Proc. Int. Conf. Mach. Learn. Cybern., vol. 1. Jul. 2009, pp. 302-307.
-
(2009)
Proc. Int. Conf. Mach. Learn. Cybern.
, vol.1
, pp. 302-307
-
-
Jing, B.-Z.1
-
57
-
-
84992035688
-
QoS based multipath routing for intrusion detection of sinkhole attack in wireless sensor networks
-
Mar
-
G. Kalnoor and J. Agarkhed, "QoS based multipath routing for intrusion detection of sinkhole attack in wireless sensor networks," in Proc. Int. Conf. Circuit Power Comput. Technol. (ICCPCT), Mar. 2016, pp. 1-6.
-
(2016)
Proc. Int. Conf. Circuit Power Comput. Technol. (ICCPCT)
, pp. 1-6
-
-
Kalnoor, G.1
Agarkhed, J.2
-
58
-
-
84863683973
-
Route guidance systems: Review and classification
-
Valencia, Spain, May
-
M. Khanjary and S. M. Hashemi, "Route guidance systems: Review and classification," in Proc. 6th Euro Amer. Conf. Telematics Inf. Syst. (EATIS), Valencia, Spain, May 2012, pp. 1-7.
-
(2012)
Proc. 6th Euro Amer. Conf. Telematics Inf. Syst. (EATIS)
, pp. 1-7
-
-
Khanjary, M.1
Hashemi, S.M.2
-
59
-
-
56349124194
-
When HART goes wireless: Understanding and implementing the wirelessHART standard
-
Hamburg, Germany, Sep
-
A. N. Kim, F. Hekland, S. Petersen, and P. Doyle, "When HART goes wireless: Understanding and implementing the wirelessHART standard," in Proc. IEEE Int. Conf. Emerg. Technol. Factory Autom., Hamburg, Germany, Sep. 2008, pp. 899-907.
-
(2008)
Proc. IEEE Int. Conf. Emerg. Technol. Factory Autom.
, pp. 899-907
-
-
Kim, A.N.1
Hekland, F.2
Petersen, S.3
Doyle, P.4
-
60
-
-
38949170182
-
Access control and authorization for security of RFID multi-domain using SAML and XACML
-
Nov
-
D. S. Kim, T.-H. Shin, and J. S. Park, "Access control and authorization for security of RFID multi-domain using SAML and XACML," in Proc. Int. Conf. Comput. Intell. Security, vol. 2. Nov. 2006, pp. 1587-1590.
-
(2006)
Proc. Int. Conf. Comput. Intell. Security
, vol.2
, pp. 1587-1590
-
-
Kim, D.S.1
Shin, T.-H.2
Park, J.S.3
-
61
-
-
84959330414
-
Prefetching-based data dissemination in vehicular cloud systems
-
Jan
-
R. Kim, H. Lim, and B. Krishnamachari, "Prefetching-based data dissemination in vehicular cloud systems," IEEE Trans. Veh. Technol., vol. 65, no. 1, pp. 292-306, Jan. 2015.
-
(2015)
IEEE Trans. Veh. Technol.
, vol.65
, Issue.1
, pp. 292-306
-
-
Kim, R.1
Lim, H.2
Krishnamachari, B.3
-
63
-
-
33845622376
-
A fully integrated 2.4-GHz IEEE 802.15.4-compliant transceiver for ZigBeeTM trade applications
-
Dec
-
W. Kluge et al., "A fully integrated 2.4-GHz IEEE 802.15.4-compliant transceiver for ZigBeeTM trade applications," IEEE J. Solid-State Circuits, vol. 41, no. 12, pp. 2767-2775, Dec. 2006.
-
(2006)
IEEE J. Solid-State Circuits
, vol.41
, Issue.12
, pp. 2767-2775
-
-
Kluge, W.1
-
64
-
-
33749346563
-
-
Upper Saddle River, NJ, USA: IBM Press
-
S. Lahiri, RFID Sourcebook. Upper Saddle River, NJ, USA: IBM Press, 2005.
-
(2005)
RFID Sourcebook
-
-
Lahiri, S.1
-
65
-
-
77956382087
-
A survey of mobile phone sensing
-
Sep
-
N. D. Lane et al., "A survey of mobile phone sensing," IEEE Commun. Mag., vol. 48, no. 9, pp. 140-150, Sep. 2010.
-
(2010)
IEEE Commun. Mag.
, vol.48
, Issue.9
, pp. 140-150
-
-
Lane, N.D.1
-
66
-
-
34250363162
-
A dynamic geographic hash table for data-centric storage in sensor networks
-
Las Vegas, NV, USA
-
T. N. Le, W. Yu, X. Bai, and D. Xuan, "A dynamic geographic hash table for data-centric storage in sensor networks," in Proc. IEEE Int. Conf. Comput. Netw. Commun. (WCNC), Las Vegas, NV, USA, 2007, pp. 2168-2174.
-
(2007)
Proc. IEEE Int. Conf. Comput. Netw. Commun. (WCNC)
, pp. 2168-2174
-
-
Le, T.N.1
Yu, W.2
Bai, X.3
Xuan, D.4
-
67
-
-
84914162268
-
A passivity framework for modeling and mitigating wormhole attacks on networked control systems
-
Dec
-
P. Lee, A. Clark, L. Bushnell, and R. Poovendran, "A passivity framework for modeling and mitigating wormhole attacks on networked control systems," IEEE Trans. Autom. Control, vol. 59, no. 12, pp. 3224-3237, Dec. 2014.
-
(2014)
IEEE Trans. Autom. Control
, vol.59
, Issue.12
, pp. 3224-3237
-
-
Lee, P.1
Clark, A.2
Bushnell, L.3
Poovendran, R.4
-
68
-
-
84921509489
-
A federated architecture approach for Internet of Things security
-
Naples, Italy, Nov
-
M. Leo, F. Battisti, M. Carli, and A. Neri, "A federated architecture approach for Internet of Things security," in Proc. Euro Med Telco Conf. (EMTC), Naples, Italy, Nov. 2014, pp. 1-5.
-
(2014)
Proc. Euro Med Telco Conf. (EMTC)
, pp. 1-5
-
-
Leo, M.1
Battisti, F.2
Carli, M.3
Neri, A.4
-
69
-
-
84863148738
-
Towards effective en-route filtering against injected false data in wireless sensor networks
-
Houston, TX, USA, Dec
-
J. Lin, X. Yang, W. Yu, and X. Fu, "Towards effective en-route filtering against injected false data in wireless sensor networks," in Proc. IEEE Glob. Telecommun. Conf. (GLOBECOM), Houston, TX, USA, Dec. 2011, pp. 1-5.
-
(2011)
Proc. IEEE Glob. Telecommun. Conf. (GLOBECOM)
, pp. 1-5
-
-
Lin, J.1
Yang, X.2
Yu, W.3
Fu, X.4
-
70
-
-
84883614973
-
On distributed energy routing protocols in the smart grid
-
R. Lee, Ed. Heidelberg, Germany: Springer
-
J. Lin et al., "On distributed energy routing protocols in the smart grid," in Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (Studies in Computational Intelligence), vol. 492, R. Lee, Ed. Heidelberg, Germany: Springer, 2013.
-
(2013)
Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (Studies in Computational Intelligence)
, vol.492
-
-
Lin, J.1
-
71
-
-
84961720902
-
Towards multistep electricity prices in smart grid electricity markets
-
Jan
-
J. Lin, W. Yu, and X. Yang, "Towards multistep electricity prices in smart grid electricity markets," IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 1, pp. 286-302, Jan. 2016.
-
(2016)
IEEE Trans. Parallel Distrib. Syst.
, vol.27
, Issue.1
, pp. 286-302
-
-
Lin, J.1
Yu, W.2
Yang, X.3
-
72
-
-
84861506150
-
On false data injection attacks against distributed energy routing in smart grid
-
Beijing, China, Apr
-
J. Lin, W. Yu, X. Yang, G. Xu, and W. Zhao, "On false data injection attacks against distributed energy routing in smart grid," in Proc. IEEE/ACM 3rd Int. Conf. Cyber-Phys. Syst. (ICCPS), Beijing, China, Apr. 2012, pp. 183-192.
-
(2012)
Proc. IEEE/ACM 3rd Int. Conf. Cyber-Phys. Syst. (ICCPS)
, pp. 183-192
-
-
Lin, J.1
Yu, W.2
Yang, X.3
Xu, G.4
Zhao, W.5
-
73
-
-
84944318781
-
A novel dynamic en-route decision real-time route guidance scheme in intelligent transportation systems
-
Columbus, OH, USA, Jun
-
J. Lin et al., "A novel dynamic en-route decision real-time route guidance scheme in intelligent transportation systems," in Proc. IEEE 35th Int. Conf. Distrib. Comput. Syst. (ICDCS), Columbus, OH, USA, Jun. 2015, pp. 61-72.
-
(2015)
Proc. IEEE 35th Int. Conf. Distrib. Comput. Syst. (ICDCS)
, pp. 61-72
-
-
Lin, J.1
-
74
-
-
84860719241
-
Cyber security challenges in smart grids
-
Manchester, U.K., Dec
-
M. B. Line, I. A. Tøndel, and M. G. Jaatun, "Cyber security challenges in smart grids," in Proc. 2nd IEEE PES Int. Conf. Exhibit. Innov. Smart Grid Technol. (ISGT Europe), Manchester, U.K., Dec. 2011, pp. 1-8.
-
(2011)
Proc. 2nd IEEE PES Int. Conf. Exhibit. Innov. Smart Grid Technol. (ISGT Europe)
, pp. 1-8
-
-
Line, M.B.1
Tøndel, I.A.2
Jaatun, M.G.3
-
75
-
-
74049162773
-
A new cell counter based attack against tor
-
Chicago, IL, USA
-
Z. Ling et al., "A new cell counter based attack against tor," in Proc. 16th ACM Conf. Comput. Commun. Security (CCS), Chicago, IL, USA, 2009, pp. 578-589.
-
(2009)
Proc. 16th ACM Conf. Comput. Commun. Security (CCS)
, pp. 578-589
-
-
Ling, Z.1
-
76
-
-
84865344045
-
A new cell-counting-based attack against tor
-
Aug
-
Z. Ling et al., "A new cell-counting-based attack against tor," IEEE/ACM Trans. Netw., vol. 20, no. 4, pp. 1245-1261, Aug. 2012.
-
(2012)
IEEE/ACM Trans. Netw.
, vol.20
, Issue.4
, pp. 1245-1261
-
-
Ling, Z.1
-
77
-
-
85010710434
-
Cooperative spectrum sharing of multiple primary users and multiple secondary users
-
H. Liu, S. Hua, X. Zhuo, D. Chen, and X. Cheng, "Cooperative spectrum sharing of multiple primary users and multiple secondary users," Digit. Commun. Netw., vol. 2, no. 4, pp. 191-195, 2016.
-
(2016)
Digit. Commun. Netw.
, vol.2
, Issue.4
, pp. 191-195
-
-
Liu, H.1
Hua, S.2
Zhuo, X.3
Chen, D.4
Cheng, X.5
-
78
-
-
84863280850
-
Key technologies and applications of Internet of Things
-
Zhangjiajie, China, Jan
-
Y. Liu and G. Zhou, "Key technologies and applications of Internet of Things," in Proc. 5th Int. Conf. Intell. Comput. Technol. Autom. (ICICTA), Zhangjiajie, China, Jan. 2012, pp. 197-200.
-
(2012)
Proc. 5th Int. Conf. Intell. Comput. Technol. Autom. (ICICTA)
, pp. 197-200
-
-
Liu, Y.1
Zhou, G.2
-
80
-
-
84881430569
-
Survey of Internet of Things technologies for clinical environments
-
Barcelona, Spain, Mar
-
P. López, D. Fernández, A. J. Jara, and A. F. Skarmeta, "Survey of Internet of Things technologies for clinical environments," in Proc. 27th Int. Conf. Adv. Inf. Netw. Appl. Workshops (WAINA), Barcelona, Spain, Mar. 2013, pp. 1349-1354.
-
(2013)
Proc. 27th Int. Conf. Adv. Inf. Netw. Appl. Workshops (WAINA)
, pp. 1349-1354
-
-
López, P.1
Fernández, D.2
Jara, A.J.3
Skarmeta, A.F.4
-
81
-
-
36348996497
-
Tinyrest-A protocol for integrating sensor networks into the Internet
-
Jun
-
T. Luckenbach, P. Gober, S. Arbanowski, A. Kotsopoulos, and K. Kim, "Tinyrest-a protocol for integrating sensor networks into the Internet," in Proc. Real-World Wireless Sensor Netw. (REALWSN), Jun. 2005, pp. 101-105.
-
(2005)
Proc. Real-World Wireless Sensor Netw. (REALWSN)
, pp. 101-105
-
-
Luckenbach, T.1
Gober, P.2
Arbanowski, S.3
Kotsopoulos, A.4
Kim, K.5
-
82
-
-
84992052715
-
A novel robust routing protocol RAEED to avoid DoS attacks in WSN
-
Chennai, India, Feb
-
S. U. Maheswari, N. S. Usha, E. A. M. Anita, and K. R. Devi, "A novel robust routing protocol RAEED to avoid DoS attacks in WSN," in Proc. Int. Conf. Inf. Commun. Embedded Syst. (ICICES), Chennai, India, Feb. 2016, pp. 1-5.
-
(2016)
Proc. Int. Conf. Inf. Commun. Embedded Syst. (ICICES)
, pp. 1-5
-
-
Maheswari, S.U.1
Usha, N.S.2
Anita, E.A.M.3
Devi, K.R.4
-
83
-
-
84964556793
-
Internet of things (IoT) security: Current status, challenges and prospective measures
-
London, U.K., Dec
-
R. Mahmoud, T. Yousuf, F. Aloul, and I. Zualkernan, "Internet of Things (IoT) security: Current status, challenges and prospective measures," in Proc. 10th Int. Conf. Internet Technol. Secured Trans. (ICITST), London, U.K., Dec. 2015, pp. 336-341.
-
(2015)
Proc. 10th Int. Conf. Internet Technol. Secured Trans. (ICITST)
, pp. 336-341
-
-
Mahmoud, R.1
Yousuf, T.2
Aloul, F.3
Zualkernan, I.4
-
84
-
-
85030636744
-
Smart city: The state of the art, datasets, and evaluation platforms
-
S. Mallapuram, N. Ngwum, F. Yuan, C. Lu, and W. Yu, "Smart city: The state of the art, datasets, and evaluation platforms," in Proc. 16th IEEE/ACIS Int. Conf. Comput. Inf. Sci. (ICIS), 2017.
-
(2017)
Proc. 16th IEEE/ACIS Int. Conf. Comput. Inf. Sci. (ICIS)
-
-
Mallapuram, S.1
Ngwum, N.2
Yuan, F.3
Lu, C.4
Yu, W.5
-
85
-
-
0036096757
-
Review of the use of biosensors as analytical tools in the food and drink industries
-
L. D. Mello and L. T. Kubota, "Review of the use of biosensors as analytical tools in the food and drink industries," Food Chem., vol. 77, no. 2, pp. 237-256, 2002.
-
(2002)
Food Chem.
, vol.77
, Issue.2
, pp. 237-256
-
-
Mello, L.D.1
Kubota, L.T.2
-
86
-
-
84861997111
-
Internet of Things
-
Sep
-
D. Miorandi, S. Sicari, F. De Pellegrini, and I. Chlamtac, "Internet of Things," Ad Hoc Netw., vol. 10, no. 7, pp. 1497-1516, Sep. 2012.
-
(2012)
Ad Hoc Netw.
, vol.10
, Issue.7
, pp. 1497-1516
-
-
Miorandi, D.1
Sicari, S.2
De Pellegrini, F.3
Chlamtac, I.4
-
87
-
-
84959453045
-
A review on internet of things (iot), internet of everything (ioe) and internet of nano things (iont)
-
Wrexham, U.K., Sep
-
M. H. Miraz, M. Ali, P. S. Excell, and R. Picking, "A review on Internet of Things (IoT), Internet of everything (IoE) and Internet of Nano Things (IoNT)," in Proc. Internet Technol. Appl. (ITA), Wrexham, U.K., Sep. 2015, pp. 219-224.
-
(2015)
Proc. Internet Technol. Appl. (ITA)
, pp. 219-224
-
-
Miraz, M.H.1
Ali, M.2
Excell, P.S.3
Picking, R.4
-
88
-
-
78650174439
-
Classifying RFID attacks and defenses
-
Nov
-
A. Mitrokotsa, M. R. Rieback, and A. S. Tanenbaum, "Classifying RFID attacks and defenses," Inf. Syst. Front., vol. 12, no. 5, pp. 491-505, Nov. 2010.
-
(2010)
Inf. Syst. Front.
, vol.12
, Issue.5
, pp. 491-505
-
-
Mitrokotsa, A.1
Rieback, M.R.2
Tanenbaum, A.S.3
-
89
-
-
77949601382
-
Secure control against replay attacks
-
Monticello, IL, USA, Sep./Oct
-
Y. Mo and B. Sinopoli, "Secure control against replay attacks," in Proc. 47th Annu. Allerton Conf. Commun. Control Comput., Monticello, IL, USA, Sep./Oct. 2009, pp. 911-918.
-
(2009)
Proc. 47th Annu. Allerton Conf. Commun. Control Comput.
, pp. 911-918
-
-
Mo, Y.1
Sinopoli, B.2
-
90
-
-
34548357050
-
A new simple adaptive noise cancellation scheme based on ALE and NLMS filter
-
Fredericton, NB, Canada, May
-
J. R. Mohammed, "A new simple adaptive noise cancellation scheme based on ALE and NLMS filter," in Proc. 5th Annu. Conf. Commun. Netw. Services Res. (CNSR), Fredericton, NB, Canada, May 2007, pp. 245-254.
-
(2007)
Proc. 5th Annu. Conf. Commun. Netw. Services Res. (CNSR)
, pp. 245-254
-
-
Mohammed, J.R.1
-
91
-
-
84903823792
-
IP spoofing detection using modified hop count
-
Victoria, BC, Canada, May
-
A. Mukaddam, I. Elhajj, A. Kayssi, and A. Chehab, "IP spoofing detection using modified hop count," in Proc. IEEE 28th Int. Conf. Adv. Inf. Netw. Appl., Victoria, BC, Canada, May 2014, pp. 512-516.
-
(2014)
Proc. IEEE 28th Int. Conf. Adv. Inf. Netw. Appl
, pp. 512-516
-
-
Mukaddam, A.1
Elhajj, I.2
Kayssi, A.3
Chehab, A.4
-
92
-
-
34247497739
-
Present scenarios and future challenges in pervasive middleware
-
New Delhi, India, Jan
-
A. Mukherjee, D. Saha, and C. Biswas, "Present scenarios and future challenges in pervasive middleware," in Proc. 1st Int. Conf. Commun. Syst. Software Middleware, New Delhi, India, Jan. 2006, pp. 1-5.
-
(2006)
Proc. 1st Int. Conf. Commun. Syst. Software Middleware
, pp. 1-5
-
-
Mukherjee, A.1
Saha, D.2
Biswas, C.3
-
93
-
-
84925411568
-
A robust software barcode reader using the Hough transform
-
Bethesda, MD, USA, Oct
-
R. Muniz, L. Junco, and A. Otero, "A robust software barcode reader using the Hough transform," in Proc. Int. Conf. Inf. Intell. Syst., Bethesda, MD, USA, Oct. 1999, pp. 313-319.
-
(1999)
Proc. Int. Conf. Inf. Intell. Syst.
, pp. 313-319
-
-
Muniz, R.1
Junco, L.2
Otero, A.3
-
95
-
-
3042785862
-
The Sybil attack in sensor networks: Analysis & defenses
-
Berkeley, CA, USA, Apr
-
J. Newsome, E. Shi, D. Song, and A. Perrig, "The Sybil attack in sensor networks: Analysis & defenses," in Proc. 3rd IEEE Int. Symp. Inf. Process. Sensor Netw., Berkeley, CA, USA, Apr. 2004, pp. 259-268.
-
(2004)
Proc. 3rd IEEE Int. Symp. Inf. Process. Sensor Netw.
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
96
-
-
84941044100
-
Cloud computing: Security issues and research challenges
-
Dec
-
R. P. Padhy, M. R. Patra, and S. C. Satapathy, "Cloud computing: Security issues and research challenges," Int. J. Comput. Sci. Inf. Technol. Security, vol. 1, no. 2, pp. 136-146, Dec. 2011.
-
(2011)
Int. J. Comput. Sci. Inf. Technol. Security
, vol.1
, Issue.2
, pp. 136-146
-
-
Padhy, R.P.1
Patra, M.R.2
Satapathy, S.C.3
-
97
-
-
84883206819
-
On optimal scheduling in duty-cycled industrial IoT applications using IEEE802.15.4e TSCH
-
Oct
-
M. R. Palattella et al., "On optimal scheduling in duty-cycled industrial IoT applications using IEEE802.15.4e TSCH," IEEE Sensors J., vol. 13, no. 10, pp. 3655-3666, Oct. 2013.
-
(2013)
IEEE Sensors J.
, vol.13
, Issue.10
, pp. 3655-3666
-
-
Palattella, M.R.1
-
98
-
-
84881312915
-
Standardized protocol stack for the Internet of (important) Things
-
3rd Quart
-
M. R. Palattella et al., "Standardized protocol stack for the Internet of (important) Things," IEEE Commun. Surveys Tuts., vol. 15, no. 3, pp. 1389-1406, 3rd Quart., 2013.
-
(2013)
IEEE Commun. Surveys Tuts.
, vol.15
, Issue.3
, pp. 1389-1406
-
-
Palattella, M.R.1
-
99
-
-
85056418963
-
Internet of Things: Survey and case studies
-
Visakhapatnam, India, Jan
-
H. B. Pandya and T. A. Champaneria, "Internet of Things: Survey and case studies," in Proc. Int. Conf. Elect. Electron. Signals Commun. Optim. (EESCO), Visakhapatnam, India, Jan. 2015, pp. 1-6.
-
(2015)
Proc. Int. Conf. Elect. Electron. Signals Commun. Optim. (EESCO)
, pp. 1-6
-
-
Pandya, H.B.1
Champaneria, T.A.2
-
100
-
-
70350244874
-
CAP: A contextaware privacy protection system for location-based services
-
Montreal, QC, Canada
-
A. Pingley, W. Yu, N. Zhang, X. Fu, and W. Zhao, "CAP: A contextaware privacy protection system for location-based services," in Proc. IEEE Int. Conf. Distrib. Comput. Syst. (ICDCS), Montreal, QC, Canada, 2009, pp. 49-57.
-
(2009)
Proc. IEEE Int. Conf. Distrib. Comput. Syst. (ICDCS)
, pp. 49-57
-
-
Pingley, A.1
Yu, W.2
Zhang, N.3
Fu, X.4
Zhao, W.5
-
101
-
-
84863331774
-
A context-aware scheme for privacy-preserving location-based services
-
A. Pingley, W. Yu, N. Zhang, X. Fu, and W. Zhao, "A context-aware scheme for privacy-preserving location-based services," Comput. Netw., vol. 56, no. 11, pp. 2551-2568, 2012.
-
(2012)
Comput. Netw.
, vol.56
, Issue.11
, pp. 2551-2568
-
-
Pingley, A.1
Yu, W.2
Zhang, N.3
Fu, X.4
Zhao, W.5
-
102
-
-
77749336823
-
A survey and taxonomy of infrastructure as a service andWeb hosting cloud providers
-
Banff, AB, Canada, Oct
-
R. Prodan and S. Ostermann, "A survey and taxonomy of infrastructure as a service andWeb hosting cloud providers," in Proc. 10th IEEE/ACM Int. Conf. Grid Comput., Banff, AB, Canada, Oct. 2009, pp. 17-25.
-
(2009)
Proc. 10th IEEE/ACM Int. Conf. Grid Comput.
, pp. 17-25
-
-
Prodan, R.1
Ostermann, S.2
-
103
-
-
84962258940
-
Low latency geo-distributed data analytic
-
London, U.K., Aug
-
Q. Pu et al., "Low latency geo-distributed data analytic," in Proc. ACM SIGCOMM, London, U.K., Aug. 2015, pp. 421-434.
-
(2015)
Proc. ACM SIGCOMM
, pp. 421-434
-
-
Pu, Q.1
-
104
-
-
79956336254
-
Anonygator: Privacy and integrity preserving data aggregation
-
Bengaluru, India
-
K. P. N. Puttaswamy, R. Bhagwan, and V. N. Padmanabhan, "Anonygator: Privacy and integrity preserving data aggregation," in Proc. ACM/IFIP/USENIX 11th Int. Conf. Middleware, Bengaluru, India, 2010, pp. 85-106.
-
(2010)
Proc. ACM/IFIP/USENIX 11th Int. Conf. Middleware
, pp. 85-106
-
-
Puttaswamy, K.P.N.1
Bhagwan, R.2
Padmanabhan, V.N.3
-
105
-
-
84929154400
-
Privacy and quality preserving multimedia data aggregation for participatory sensing systems
-
Jun
-
F. Qiu, F. Wu, and G. Chen, "Privacy and quality preserving multimedia data aggregation for participatory sensing systems," IEEE Trans. Mobile Comput., vol. 14, no. 6, pp. 1287-1300, Jun. 2015.
-
(2015)
IEEE Trans. Mobile Comput.
, vol.14
, Issue.6
, pp. 1287-1300
-
-
Qiu, F.1
Wu, F.2
Chen, G.3
-
106
-
-
84891401751
-
On scaling perturbation based privacy-preserving schemes in smart metering systems
-
Nassau, The Bahamas, Jul
-
X. Ren, X. Yang, J. Lin, Q. Yang, and W. Yu, "On scaling perturbation based privacy-preserving schemes in smart metering systems," in Proc. 22nd Int. Conf. Comput. Commun. Netw. (ICCCN), Nassau, The Bahamas, Jul. 2013, pp. 1-7.
-
(2013)
Proc. 22nd Int. Conf. Comput. Commun. Netw. (ICCCN)
, pp. 1-7
-
-
Ren, X.1
Yang, X.2
Lin, J.3
Yang, Q.4
Yu, W.5
-
108
-
-
84942808761
-
Review of the present technologies concurrently contributing to the implementation of the Internet of things (IoT) paradigm: RFID, green electronics, WPT and energy harvesting
-
San Diego, CA, USA, Jan
-
L. Roselli et al., "Review of the present technologies concurrently contributing to the implementation of the Internet of things (IoT) paradigm: RFID, green electronics, WPT and energy harvesting," in Proc. IEEE Topical Conf. Wireless Sensors Sensor Netw. (WiSNet), San Diego, CA, USA, Jan. 2015, pp. 1-3.
-
(2015)
Proc. IEEE Topical Conf. Wireless Sensors Sensor Netw. (WiSNet)
, pp. 1-3
-
-
Roselli, L.1
-
109
-
-
77949858897
-
TransportML: A middleware for location-based services collaboration
-
Cairo, Egypt, Dec
-
A. Roxin, C. Dumez, N. Cottin, J. Gaber, and M. Wack, "TransportML: A middleware for location-based services collaboration," in Proc. 3rd Int. Conf. New Technol. Mobility Security, Cairo, Egypt, Dec. 2009, pp. 1-6.
-
(2009)
Proc. 3rd Int. Conf. New Technol. Mobility Security
, pp. 1-6
-
-
Roxin, A.1
Dumez, C.2
Cottin, N.3
Gaber, J.4
Wack, M.5
-
110
-
-
84923301668
-
Firewall engine based on graphics processing unit
-
May
-
A. K. Sahoo, A. Das, and M. Tiwary, "Firewall engine based on graphics processing unit," in Proc. Int. Conf. Adv. Commun. Control Comput. Technol. (ICACCCT), May 2014, pp. 758-763.
-
(2014)
Proc. Int. Conf. Adv. Commun. Control Comput. Technol. (ICACCCT)
, pp. 758-763
-
-
Sahoo, A.K.1
Das, A.2
Tiwary, M.3
-
111
-
-
16644402412
-
Extensible messaging and presence protocol (XMPP): Core
-
Fremont, CA, USA, RFC 6121, Mar
-
P. Saint-Andre, "Extensible messaging and presence protocol (XMPP): Core," Internet Eng. Task Force, Fremont, CA, USA, RFC 6121, Mar. 2011.
-
(2011)
Internet Eng. Task Force
-
-
Saint-Andre, P.1
-
114
-
-
3042738543
-
SWATT: Software-based attestation for embedded devices
-
Berkeley, CA, USA, May
-
A. Seshadri, A. Perrig, L. van Doorn, and P. Khosla, "SWATT: Software-based attestation for embedded devices," in Proc. IEEE Symp. Security Privacy, Berkeley, CA, USA, May 2004, pp. 272-282.
-
(2004)
Proc. IEEE Symp. Security Privacy
, pp. 272-282
-
-
Seshadri, A.1
Perrig, A.2
Van Doorn, L.3
Khosla, P.4
-
115
-
-
85032277654
-
Security in internet of things: Opportunities and challenges
-
Oct
-
K. Sha, W. Wei, A. Yang, and W. Shi, "Security in Internet of Things: Opportunities and challenges," in Proc. Int. Conf. Identification Inf. Knowl. Internet Things, Oct. 2016, pp. 49-50.
-
(2016)
Proc. Int. Conf. Identification Inf. Knowl. Internet Things
, pp. 49-50
-
-
Sha, K.1
Wei, W.2
Yang, A.3
Shi, W.4
-
116
-
-
84987842183
-
Edge computing: Vision and challenges
-
Oct
-
W. Shi, J. Cao, Q. Zhang, Y. Li, and L. Xu, "Edge computing: Vision and challenges," IEEE Internet Things J., vol. 3, no. 5, pp. 637-646, Oct. 2016.
-
(2016)
IEEE Internet Things J.
, vol.3
, Issue.5
, pp. 637-646
-
-
Shi, W.1
Cao, J.2
Zhang, Q.3
Li, Y.4
Xu, L.5
-
117
-
-
84911364620
-
Detecting sinkhole attack in wireless sensor network
-
Feb
-
V. Soni, P. Modi, and V. Chaudhri, "Detecting sinkhole attack in wireless sensor network," Int. J. Appl. Innov. Eng. Manag., vol. 2, no. 2, pp. 29-32, Feb. 2013.
-
(2013)
Int. J. Appl. Innov. Eng. Manag.
, vol.2
, Issue.2
, pp. 29-32
-
-
Soni, V.1
Modi, P.2
Chaudhri, V.3
-
118
-
-
70449486885
-
Soa-based integration of the Internet of Things in enterprise services
-
Los Angeles, CA, USA, Jul
-
P. Spiess et al., "Soa-based integration of the Internet of Things in enterprise services," in Proc. IEEE Int. Conf. Web Services (ICWS), Los Angeles, CA, USA, Jul. 2009, pp. 968-975.
-
(2009)
Proc. IEEE Int. Conf. Web Services (ICWS)
, pp. 968-975
-
-
Spiess, P.1
-
119
-
-
84906842496
-
Research directions for the Internet of Things
-
Feb
-
J. A. Stankovic, "Research directions for the Internet of Things," IEEE Internet Things J., vol. 1, no. 1, pp. 3-9, Feb. 2014.
-
(2014)
IEEE Internet Things J.
, vol.1
, Issue.1
, pp. 3-9
-
-
Stankovic, J.A.1
-
120
-
-
84912130127
-
The fog computing paradigm: Scenarios and security issues
-
Warsaw, Poland, Sep
-
I. Stojmenovic and S. Wen, "The fog computing paradigm: Scenarios and security issues," in Proc. Federated Conf. Comput. Sci. Inf. Syst. (FedCSIS), Warsaw, Poland, Sep. 2014, pp. 1-8.
-
(2014)
Proc. Federated Conf. Comput. Sci. Inf. Syst. (FedCSIS)
, pp. 1-8
-
-
Stojmenovic, I.1
Wen, S.2
-
121
-
-
84885965762
-
Survey on security threats and protection mechanisms in embedded automotive networks
-
Budapest, Hungary, Jun
-
I. Studnia et al., "Survey on security threats and protection mechanisms in embedded automotive networks," in Proc. 43rd Annu. IEEE/IFIP Conf. Depend. Syst. Netw. Workshop (DSN W), Budapest, Hungary, Jun. 2013, pp. 1-12.
-
(2013)
Proc. 43rd Annu. IEEE/IFIP Conf. Depend. Syst. Netw. Workshop (DSN W)
, pp. 1-12
-
-
Studnia, I.1
-
122
-
-
84861019658
-
Security in the Internet of Things: A review
-
Hangzhou, China, Mar
-
H. Suo, J. Wan, C. Zou, and J. Liu, "Security in the Internet of Things: A review," in Proc. Int. Conf. Comput. Sci. Electron. Eng. (ICCSEE), vol. 3. Hangzhou, China, Mar. 2012, pp. 648-651.
-
(2012)
Proc. Int. Conf. Comput. Sci. Electron. Eng. (ICCSEE)
, vol.3
, pp. 648-651
-
-
Suo, H.1
Wan, J.2
Zou, C.3
Liu, J.4
-
123
-
-
84904415417
-
A survey of technologies in Internet of Things
-
CA, USA, May
-
J. Tan and S. G. M. Koo, "A survey of technologies in Internet of Things," in Proc. IEEE Int. Conf. Distrib. Comput. Sensor Syst., Marina Del Rey, CA, USA, May 2014, pp. 269-274.
-
(2014)
Proc. IEEE Int. Conf. Distrib. Comput. Sensor Syst., Marina Del Rey
, pp. 269-274
-
-
Tan, J.1
Koo, S.G.M.2
-
124
-
-
78149306616
-
Future internet: The internet of things
-
Chengdu, China, Aug
-
L. Tan and N. Wang, "Future Internet: The Internet of Things," in Proc. 3rd Int. Conf. Adv. Comput. Theory Eng. (ICACTE), vol. 5. Chengdu, China, Aug. 2010, pp. V5-376-V5-380.
-
(2010)
Proc. 3rd Int. Conf. Adv. Comput. Theory Eng. (ICACTE)
, vol.5
, pp. V5376-V5380
-
-
Tan, L.1
Wang, N.2
-
125
-
-
84894683129
-
Data mining for internet of things: A survey
-
1st Quart
-
C.-W. Tsai, C.-F. Lai, M.-C. Chiang, and L. T. Yang, "Data mining for Internet of Things: A survey," IEEE Commun. Surveys Tuts., vol. 16, no. 1, pp. 77-97, 1st Quart., 2014.
-
(2014)
IEEE Commun. Surveys Tuts.
, vol.16
, Issue.1
, pp. 77-97
-
-
Tsai, C.-W.1
Lai, C.-F.2
Chiang, M.-C.3
Yang, L.T.4
-
126
-
-
84995347311
-
Joint optimization of spectrum and energy efficiency in cognitive radio networks
-
S. Wang and C. Wang, "Joint optimization of spectrum and energy efficiency in cognitive radio networks," Digit. Commun. Netw., vol. 1, no. 3, pp. 161-170, 2015.
-
(2015)
Digit. Commun. Netw.
, vol.1
, Issue.3
, pp. 161-170
-
-
Wang, S.1
Wang, C.2
-
127
-
-
51349109687
-
Detecting worms via mining dynamic program execution
-
Netw., Nice, France
-
X. Wang, W. Yu, A. Champion, X. Fu, and D. Xuan, "Detecting worms via mining dynamic program execution," in Proc. 3rd Int. Conf. Security Privacy Commun. Netw., Nice, France, 2007, pp. 412-421.
-
(2007)
Proc. 3rd Int. Conf. Security Privacy Commun
, pp. 412-421
-
-
Wang, X.1
Yu, W.2
Champion, A.3
Fu, X.4
Xuan, D.5
-
128
-
-
84871266331
-
RPL: Ipv6 routing protocol for low-power and lossy networks
-
Fremont, CA, USA, RFC 6550, Mar
-
T. Winter et al., "RPL: Ipv6 routing protocol for low-power and lossy networks," Internet Eng. Task Force, Fremont, CA, USA, RFC 6550, Mar. 2012.
-
(2012)
Internet Eng. Task Force
-
-
Winter, T.1
-
129
-
-
85018836720
-
Scalable privacy-preserving big data aggregation mechanism
-
D. Wu, B. Yang, and R. Wang, "Scalable privacy-preserving big data aggregation mechanism," Digit. Commun. Netw., vol. 2, no. 3, pp. 122-129, 2016.
-
(2016)
Digit. Commun. Netw.
, vol.2
, Issue.3
, pp. 122-129
-
-
Wu, D.1
Yang, B.2
Wang, R.3
-
130
-
-
79960924365
-
Review: From wireless sensor networks towards cyber physical systems
-
Aug
-
F.-J. Wu, Y.-F. Kao, and Y.-C. Tseng, "Review: From wireless sensor networks towards cyber physical systems," Pervasive Mobile Comput., vol. 7, no. 4, pp. 397-413, Aug. 2011.
-
(2011)
Pervasive Mobile Comput.
, vol.7
, Issue.4
, pp. 397-413
-
-
Wu, F.-J.1
Kao, Y.-F.2
Tseng, Y.-C.3
-
131
-
-
85030651432
-
Design and realization of WInternet: From Net of Things to Internet of Things
-
Feb
-
J. Wu and W. Zhao, "Design and realization of WInternet: From Net of Things to Internet of Things," ACM Trans. Cyber Phys. Syst., vol. 1, no. 1, Feb. 2017, Art. no. 2.
-
(2017)
ACM Trans. Cyber Phys. Syst.
, vol.1
, Issue.1
-
-
Wu, J.1
Zhao, W.2
-
132
-
-
78149352226
-
Research on the architecture of Internet of Things
-
Chengdu, China, Aug
-
M. Wu, T.-J. Lu, F.-Y. Ling, J. Sun, and H.-Y. Du, "Research on the architecture of Internet of Things," in Proc. 3rd Int. Conf. Adv. Comput. Theory Eng. (ICACTE), vol. 5. Chengdu, China, Aug. 2010, pp. V5-484-V5-487.
-
(2010)
Proc. 3rd Int. Conf. Adv. Comput. Theory Eng. (ICACTE)
, vol.5
, pp. V5484-V5487
-
-
Wu, M.1
Lu, T.-J.2
Ling, F.-Y.3
Sun, J.4
Du, H.-Y.5
-
133
-
-
34548038583
-
A survey of key management schemes in wireless sensor networks
-
Y. Xiao et al., "A survey of key management schemes in wireless sensor networks," J. Comput. Commun., vol. 30, nos. 11-12, pp. 2314-2341, 2007.
-
(2007)
J. Comput. Commun.
, vol.30
, Issue.11-12
, pp. 2314-2341
-
-
Xiao, Y.1
-
134
-
-
84923317932
-
Information security in big data: Privacy and data mining
-
Oct
-
L. Xu, C. Jiang, J. Wang, J. Yuan, and Y. Ren, "Information security in big data: Privacy and data mining," IEEE Access, vol. 2, pp. 1149-1176, Oct. 2014.
-
(2014)
IEEE Access
, vol.2
, pp. 1149-1176
-
-
Xu, L.1
Jiang, C.2
Wang, J.3
Yuan, J.4
Ren, Y.5
-
135
-
-
81255151151
-
Enterprise systems: State of the art and future trends
-
Nov
-
L. D. Xu, "Enterprise systems: State-of-the-art and future trends," IEEE Trans. Ind. Informat., vol. 7, no. 4, pp. 630-640, Nov. 2011.
-
(2011)
IEEE Trans. Ind. Informat.
, vol.7
, Issue.4
, pp. 630-640
-
-
Xu, L.D.1
-
136
-
-
84906834039
-
Internet of Things in industries: A survey
-
Nov
-
L. D. Xu, W. He, and S. Li, "Internet of Things in industries: A survey," IEEE Trans. Ind. Informat., vol. 10, no. 4, pp. 2233-2243, Nov. 2014.
-
(2014)
IEEE Trans. Ind. Informat.
, vol.10
, Issue.4
, pp. 2233-2243
-
-
Xu, L.D.1
He, W.2
Li, S.3
-
137
-
-
18144420462
-
Scan based side channel attack on dedicated hardware implementations of data encryption standard
-
Charlotte, NC, USA, Oct
-
B. Yang, K. Wu, and R. Karri, "Scan based side channel attack on dedicated hardware implementations of data encryption standard," in Proc. Int. Test Conf. (ITC), Charlotte, NC, USA, Oct. 2004, pp. 339-344.
-
(2004)
Proc. Int. Test Conf. (ITC)
, pp. 339-344
-
-
Yang, B.1
Wu, K.2
Karri, R.3
-
138
-
-
34248359563
-
RFID sensor network network architectures to integrate RFID, sensor and WSN
-
Mar
-
H. Yang and S.-H. Yang, "RFID sensor network network architectures to integrate RFID, sensor and WSN," Meas. Control, vol. 40, no. 2, pp. 56-59, Mar. 2007.
-
(2007)
Meas. Control
, vol.40
, Issue.2
, pp. 56-59
-
-
Yang, H.1
Yang, S.-H.2
-
139
-
-
84964896253
-
On false data injection attacks against Kalman filtering in power system dynamic state estimation
-
Jun
-
Q. Yang, L. Chang, and W. Yu, "On false data injection attacks against Kalman filtering in power system dynamic state estimation," Security Commun. Netw., vol. 9, no. 9, pp. 833-849, Jun. 2016.
-
(2016)
Security Commun. Netw.
, vol.9
, Issue.9
, pp. 833-849
-
-
Yang, Q.1
Chang, L.2
Yu, W.3
-
140
-
-
85018906264
-
On data integrity attacks against optimal power flow in power grid systems
-
Las Vegas, NV, USA
-
Q. Yang et al., "On data integrity attacks against optimal power flow in power grid systems," in Proc. Annu. IEEE Consumer Commun. Netw. Conf. (CCNC), Las Vegas, NV, USA, 2017.
-
(2017)
Proc. Annu. IEEE Consumer Commun. Netw. Conf. (CCNC)
-
-
Yang, Q.1
-
141
-
-
84894537318
-
On false data-injection attacks against power system state estimation: Modeling and countermeasures
-
Mar
-
Q. Yang et al., "On false data-injection attacks against power system state estimation: Modeling and countermeasures," IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 3, pp. 717-729, Mar. 2014.
-
(2014)
IEEE Trans. Parallel Distrib. Syst.
, vol.25
, Issue.3
, pp. 717-729
-
-
Yang, Q.1
-
142
-
-
84981543761
-
Towards a low-cost remote memory attestation for the smart grid
-
Aug
-
X. Yang et al., "Towards a low-cost remote memory attestation for the smart grid," Sensors, vol. 15, no. 8, pp. 20799-20824, Aug. 2015.
-
(2015)
Sensors
, vol.15
, Issue.8
, pp. 20799-20824
-
-
Yang, X.1
-
143
-
-
84919466772
-
A novel en-route filtering scheme against false data injection attacks in cyber-physical networked systems
-
Jan
-
X. Yang et al., "A novel en-route filtering scheme against false data injection attacks in cyber-physical networked systems," IEEE Trans. Comput., vol. 64, no. 1, pp. 4-18, Jan. 2015.
-
(2015)
IEEE Trans. Comput.
, vol.64
, Issue.1
, pp. 4-18
-
-
Yang, X.1
-
144
-
-
84987899075
-
On binary decomposition based privacy-preserving aggregation schemes in real-time monitoring systems
-
Oct
-
X. Yang, X. Ren, J. Lin, and W. Yu, "On binary decomposition based privacy-preserving aggregation schemes in real-time monitoring systems," IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 10, pp. 2967-2983, Oct. 2016.
-
(2016)
IEEE Trans. Parallel Distrib. Syst.
, vol.27
, Issue.10
, pp. 2967-2983
-
-
Yang, X.1
Ren, X.2
Lin, J.3
Yu, W.4
-
145
-
-
85013441181
-
Data integrity attacks against the distributed real-time pricing in the smart grid
-
Las Vegas, NV, USA
-
X. Yang et al., "Data integrity attacks against the distributed real-time pricing in the smart grid," in Proc. IEEE Int. Perform. Comput. Commun. Conf. (IPCCC), Las Vegas, NV, USA, 2016, pp. 1-8.
-
(2016)
Proc. IEEE Int. Perform. Comput. Commun. Conf. (IPCCC)
, pp. 1-8
-
-
Yang, X.1
-
146
-
-
85015246554
-
Toward a gaussianmixture model-based detection scheme against data integrity attacks in the smart grid
-
Feb
-
X. Yang, P. Zhao, X. Zhang, J. Lin, and W. Yu, "Toward a Gaussianmixture model-based detection scheme against data integrity attacks in the smart grid," IEEE Internet Things J., vol. 4, no. 1, pp. 147-161, Feb. 2017.
-
(2017)
IEEE Internet Things J.
, vol.4
, Issue.1
, pp. 147-161
-
-
Yang, X.1
Zhao, P.2
Zhang, X.3
Lin, J.4
Yu, W.5
-
147
-
-
84951050684
-
A survey of fog computing: Concepts, applications and issues
-
Hangzhou, China, Jun
-
S. Yi, C. Li, and Q. Li, "A survey of fog computing: Concepts, applications and issues," in Proc. Workshop Mobile Big Data, Hangzhou, China, Jun. 2015, pp. 37-42.
-
(2015)
Proc. Workshop Mobile Big Data
, pp. 37-42
-
-
Yi, S.1
Li, C.2
Li, Q.3
-
148
-
-
34548755641
-
Dsss-based flow marking technique for invisible traceback
-
Oakland, CA, USA
-
W. Yu, X. Fu, S. Graham, D. Xuan, and W. Zhao, "DSSS-based flow marking technique for invisible traceback," in Proc. IEEE Symp. Security Privacy (S P), Oakland, CA, USA, 2007, pp. 18-32.
-
(2007)
Proc. IEEE Symp. Security Privacy (S P)
, pp. 18-32
-
-
Yu, W.1
Fu, X.2
Graham, S.3
Xuan, D.4
Zhao, W.5
-
149
-
-
84919339871
-
An integrated detection system against false data injection attacks in the smart grid
-
W. Yu, D. Griffith, L. Ge, S. Bhattarai, and N. Golmie, "An integrated detection system against false data injection attacks in the smart grid," Security Commun. Netw., vol. 8, no. 2, pp. 91-109, 2015.
-
(2015)
Security Commun. Netw.
, vol.8
, Issue.2
, pp. 91-109
-
-
Yu, W.1
Griffith, D.2
Ge, L.3
Bhattarai, S.4
Golmie, N.5
-
150
-
-
20344390758
-
Query aggregation for providing efficient data services in sensor networks
-
Fort Lauderdale, FL, USA
-
W. Yu, T. N. Le, D. Xuan, and W. Zhao, "Query aggregation for providing efficient data services in sensor networks," in Proc. IEEE Mobile Ad-Hoc Sensor Syst. (MASS), Fort Lauderdale, FL, USA, 2004, pp. 31-40.
-
(2004)
Proc. IEEE Mobile Ad-Hoc Sensor Syst. (MASS)
, pp. 31-40
-
-
Yu, W.1
Le, T.N.2
Xuan, D.3
Zhao, W.4
-
151
-
-
85028754746
-
Efficient energy sensitive routing protocols in mobile ad-hoc networks
-
Las Vegas, NV, USA
-
W. Yu and J. Lee, "Efficient energy sensitive routing protocols in mobile ad-hoc networks," in Proc. Int. Conf. Wireless Netw., Las Vegas, NV, USA, 2002.
-
(2002)
Proc. Int. Conf. Wireless Netw
-
-
Yu, W.1
Lee, J.2
-
152
-
-
85037031256
-
Cyber crime scene investigations (C2SI) through cloud computing
-
Washington, DC, USA
-
W. Yu, G. Xu, Z. Chen, and P. Moulema, "Cyber crime scene investigations (C2SI) through cloud computing," in Proc. IEEE Conf. Commun. Netw. Security (CNS), Washington, DC, USA, 2013, pp. 26-31.
-
(2013)
Proc. IEEE Conf. Commun. Netw. Security (CNS)
, pp. 26-31
-
-
Yu, W.1
Xu, G.2
Chen, Z.3
Moulema, P.4
-
153
-
-
85037059190
-
An integrated middleware-based solution for supporting secured dynamic-coalition applications in heterogeneous environments
-
West Point, NY, USA
-
W. Yu, D. Xuan, B. Graham, S. Santhanam, R. Bettati, and W. Zhao, "An integrated middleware-based solution for supporting secured dynamic-coalition applications in heterogeneous environments," in Proc. IEEE Workshop Inf. Assurance Security, West Point, NY, USA, 2002, pp. 259-264.
-
(2002)
Proc. IEEE Workshop Inf. Assurance Security
, pp. 259-264
-
-
Yu, W.1
Xuan, D.2
Graham, B.3
Santhanam, S.4
Bettati, R.5
Zhao, W.6
-
154
-
-
77956179239
-
Self-disciplinary worms and countermeasures: Modeling and analysis
-
Oct
-
W. Yu, N. Zhang, X. Fu, and W. Zhao, "Self-disciplinary worms and countermeasures: Modeling and analysis," IEEE Trans. Parallel Distrib. Syst., vol. 21, no. 10, pp. 1501-1514, Oct. 2010.
-
(2010)
IEEE Trans. Parallel Distrib. Syst.
, vol.21
, Issue.10
, pp. 1501-1514
-
-
Yu, W.1
Zhang, N.2
Fu, X.3
Zhao, W.4
-
155
-
-
84908397157
-
Internet of Things for smart cities
-
Feb
-
A. Zanella, N. Bui, A. Castellani, L. Vangelista, and M. Zorzi, "Internet of Things for smart cities," IEEE Internet Things J., vol. 1, no. 1, pp. 22-32, Feb. 2014.
-
(2014)
IEEE Internet Things J.
, vol.1
, Issue.1
, pp. 22-32
-
-
Zanella, A.1
Bui, N.2
Castellani, A.3
Vangelista, L.4
Zorzi, M.5
-
156
-
-
84881117070
-
Sensing as a service and big data
-
Charlotte, NC, USA, Jul
-
A. Zaslavsky, C. Perera, and D. Georgakopoulos, "Sensing as a service and big data," in Proc. Int. Conf. Adv. Cloud Comput. (ACC), Charlotte, NC, USA, Jul. 2012.
-
(2012)
Proc. Int. Conf. Adv. Cloud Comput. (ACC)
-
-
Zaslavsky, A.1
Perera, C.2
Georgakopoulos, D.3
-
157
-
-
78149317624
-
Differential power cryptanalysis attacks against present implementation
-
Chengdu, China, Aug
-
J. Zhang, D. Gu, Z. Guo, and L. Zhang, "Differential power cryptanalysis attacks against present implementation," in Proc. 3rd Int. Conf. Adv. Comput. Theory Eng. (ICACTE), vol. 6. Chengdu, China, Aug. 2010, pp. V6-61-V6-65.
-
(2010)
Proc. 3rd Int. Conf. Adv. Comput. Theory Eng. (ICACTE)
, vol.6
, pp. V661-V665
-
-
Zhang, J.1
Gu, D.2
Guo, Z.3
Zhang, L.4
-
158
-
-
84908454906
-
Sybil attacks and their defenses in the Internet of Things
-
Oct
-
K. Zhang, X. Liang, R. Lu, and X. Shen, "Sybil attacks and their defenses in the Internet of Things," IEEE Internet Things J., vol. 1, no. 5, pp. 372-383, Oct. 2014.
-
(2014)
IEEE Internet Things J.
, vol.1
, Issue.5
, pp. 372-383
-
-
Zhang, K.1
Liang, X.2
Lu, R.3
Shen, X.4
-
159
-
-
84976496511
-
Fakemask: A novel privacy preserving approach for smartphones
-
Jun
-
L. Zhang, Z. Cai, and X. Wang, "Fakemask: A novel privacy preserving approach for smartphones," IEEE Trans. Netw. Service Manag., vol. 13, no. 2, pp. 335-348, Jun. 2016.
-
(2016)
IEEE Trans. Netw. Service Manag.
, vol.13
, Issue.2
, pp. 335-348
-
-
Zhang, L.1
Cai, Z.2
Wang, X.3
-
160
-
-
84964813261
-
Towards efficient and secured real-time pricing in the smart grid
-
San Diego, CA, USA, Dec
-
X. Zhang, X. Yang, J. Lin, G. Xu, and W. Yu, "Towards efficient and secured real-time pricing in the smart grid," in Proc. IEEE Glob. Commun. Conf. (GLOBECOM), San Diego, CA, USA, Dec. 2015, pp. 1-6.
-
(2015)
Proc. IEEE Glob. Commun. Conf. (GLOBECOM)
, pp. 1-6
-
-
Zhang, X.1
Yang, X.2
Lin, J.3
Xu, G.4
Yu, W.5
-
161
-
-
85006758502
-
On data integrity attacks against real-time pricing in energy-based cyber-physical systems
-
Jan
-
X. Zhang, X. Yang, J. Lin, G. Xu, and W. Yu, "On data integrity attacks against real-time pricing in energy-based cyber-physical systems," IEEE Trans. Parallel Distrib. Syst., vol. 28, no. 1, pp. 170-187, Jan. 2017.
-
(2017)
IEEE Trans. Parallel Distrib. Syst.
, vol.28
, Issue.1
, pp. 170-187
-
-
Zhang, X.1
Yang, X.2
Lin, J.3
Xu, G.4
Yu, W.5
-
163
-
-
84982290230
-
Anti-eavesdropping schemes for interference alignment (IA)-based wireless networks
-
Aug
-
N. Zhao, F. R. Yu, M. Li, and V. C. M. Leung, "Anti-eavesdropping schemes for interference alignment (IA)-based wireless networks," IEEE Trans. Wireless Commun., vol. 15, no. 8, pp. 5719-5732, Aug. 2016.
-
(2016)
IEEE Trans. Wireless Commun.
, vol.15
, Issue.8
, pp. 5719-5732
-
-
Zhao, N.1
Yu, F.R.2
Li, M.3
Leung, V.C.M.4
-
164
-
-
84863798861
-
Radio resource allocation in LTE-advanced cellular networks with m2m communications
-
Jul
-
K. Zheng, F. Hu, W. Wang, W. Xiang, and M. Dohler, "Radio resource allocation in LTE-advanced cellular networks with m2m communications," IEEE Commun. Mag., vol. 50, no. 7, pp. 184-192, Jul. 2012.
-
(2012)
IEEE Commun. Mag.
, vol.50
, Issue.7
, pp. 184-192
-
-
Zheng, K.1
Hu, F.2
Wang, W.3
Xiang, W.4
Dohler, M.5
-
165
-
-
85026410795
-
Location-privacy-aware review publication mechanism for local business service systems
-
Atlanta, GA, USA
-
X. Zheng, Z. Cai, J. Li, and H. Gao, "Location-privacy-aware review publication mechanism for local business service systems," in Proc. 36th Annu. IEEE Int. Conf. Comput. Commun. (INFOCOM), Atlanta, GA, USA, 2017, pp. 1-9.
-
(2017)
Proc. 36th Annu. IEEE Int. Conf. Comput. Commun. (INFOCOM)
, pp. 1-9
-
-
Zheng, X.1
Cai, Z.2
Li, J.3
Gao, H.4
|