-
1
-
-
85012039893
-
QoS-aware cross-layer configuration for industrial wireless sensor networks
-
Oct.
-
F. Dobslaw, T. Zhang, andM. Gidlund, "QoS-aware cross-layer configuration for industrial wireless sensor networks," IEEE Trans. Ind. Informat., vol. 12, no. 5, pp. 1679-1691, Oct. 2016.
-
(2016)
IEEE Trans. Ind. Informat.
, vol.12
, Issue.5
, pp. 1679-1691
-
-
Dobslaw, F.1
Zhang, T.2
Gidlund, M.3
-
2
-
-
85028941338
-
Survey and systematic mapping of industrial wireless sensor networks
-
D. Queiroz et al., "Survey and systematic mapping of industrial wireless sensor networks," J. Netw. Comput. Appl., vol. 97, pp. 96-125, 2017.
-
(2017)
J. Netw. Comput. Appl.
, vol.97
, pp. 96-125
-
-
Queiroz, D.1
-
3
-
-
85009775076
-
Efficient certificateless access control for industrial internet of things
-
F. Li, J. Hong, and A. Omala, "Efficient certificateless access control for industrial internet of things," Future Gener. Comput. Syst., vol. 76, pp. 285-292, 2017.
-
(2017)
Future Gener. Comput. Syst.
, vol.76
, pp. 285-292
-
-
Li, F.1
Hong, J.2
Omala, A.3
-
4
-
-
85011912102
-
XLCI protocol for high QoS in industrial wireless network
-
H. Salam and B. Khan, "XLCI protocol for high QoS in industrial wireless network," Wireless Pers. Commun., vol. 95, pp. 3057-3075, 2017.
-
(2017)
Wireless Pers. Commun.
, vol.95
, pp. 3057-3075
-
-
Salam, H.1
Khan, B.2
-
5
-
-
84996553567
-
Performance impact of commercial industrial firewalls on networked control systems
-
M. Cheminod, L. Durante, A. Valenzano, and C. Zunino, "Performance impact of commercial industrial firewalls on networked control systems," in Proc. IEEE Int. Conf. Emerging Technol. Factory Autom., 2016, pp. 1-8.
-
(2016)
Proc. IEEE Int. Conf. Emerging Technol. Factory Autom.
, pp. 1-8
-
-
Cheminod, M.1
Durante, L.2
Valenzano, A.3
Zunino, C.4
-
6
-
-
84921327876
-
Behavior rule specification-based intrusion detection for safety critical medical cyber physical systems
-
Jan./Feb.
-
R. Mitchell and I. R. Chen, "Behavior rule specification-based intrusion detection for safety critical medical cyber physical systems," IEEE Trans. Dependable Secure Comput., vol. 12, no. 1, pp. 16-30, Jan./Feb. 2015.
-
(2015)
IEEE Trans. Dependable Secure Comput.
, vol.12
, Issue.1
, pp. 16-30
-
-
Mitchell, R.1
Chen, I.R.2
-
7
-
-
84978943536
-
ActiveTrust: Secure and trustable routing in wireless sensor networks
-
Sep.
-
Y. Liu, M. Dong, K. Ota, and A. Liu, "ActiveTrust: Secure and trustable routing in wireless sensor networks," IEEE Trans. Inf. Forensics Secur., vol. 11, no. 9, pp. 2013-2027, Sep. 2016.
-
(2016)
IEEE Trans. Inf. Forensics Secur.
, vol.11
, Issue.9
, pp. 2013-2027
-
-
Liu, Y.1
Dong, M.2
Ota, K.3
Liu, A.4
-
8
-
-
84959080993
-
Body sensor network for mobile health monitoring, a diagnosis and anticipating system
-
Dec.
-
J.Wannenburg and R. Malekian, "Body sensor network for mobile health monitoring, a diagnosis and anticipating system," IEEE Sens. J., vol. 15, no. 12, pp. 6839-6852, Dec. 2015.
-
(2015)
IEEE Sens. J.
, vol.15
, Issue.12
, pp. 6839-6852
-
-
Wannenburg, J.1
Malekian, R.2
-
9
-
-
84919466772
-
A novel enroute filtering scheme against false data injection attacks in cyber-physical networked systems
-
Jan.
-
X. Yang, J. Lin,W. Yu, P.-M. Moulema, X. Fu, andW. Zhao, "A novel enroute filtering scheme against false data injection attacks in cyber-physical networked systems," IEEE Trans. Comput., vol. 64, no. 1, pp. 4-18, Jan. 2015.
-
(2015)
IEEE Trans. Comput.
, vol.64
, Issue.1
, pp. 4-18
-
-
Yang, X.1
Lin, J.2
Yu, W.3
Moulema, P.-M.4
Fu, X.5
Zhao, W.6
-
10
-
-
84962598397
-
Energyefficient monitor deployment in collaborative distributed setting
-
Feb.
-
S. Ray, M. Debbabi,M.Allouche,N. Lechevin, and M.Belanger, "Energyefficient monitor deployment in collaborative distributed setting," IEEE Trans. Ind. Informat., vol. 12, no. 1, pp. 112-123, Feb. 2016.
-
(2016)
IEEE Trans. Ind. Informat.
, vol.12
, Issue.1
, pp. 112-123
-
-
Ray, S.1
Debbabi, M.2
Allouche, M.3
Lechevin, N.4
Belanger, M.5
-
11
-
-
84964290765
-
Vehicular networking for mobile crowd sensing
-
B. M. Masini, "Vehicular networking for mobile crowd sensing," Ad Hoc Netw., vol. 36, no. P2, pp. 407-408, 2016.
-
(2016)
Ad Hoc Netw.
, vol.36
, Issue.P2
, pp. 407-408
-
-
Masini, B.M.1
-
12
-
-
84925062174
-
Trust management for defending on-off attacks
-
Apr.
-
Y. Chae, L. C. DiPippo, and Y. L. Sun, "Trust management for defending on-off attacks," IEEE Trans.Parallel Distrib. Syst., vol. 26, no. 4, pp. 1178-1191, Apr. 2015.
-
(2015)
IEEE Trans.Parallel Distrib. Syst.
, vol.26
, Issue.4
, pp. 1178-1191
-
-
Chae, Y.1
DiPippo, L.C.2
Sun, Y.L.3
-
13
-
-
84900863804
-
Adaptive multichannel transmission power control for industrial wireless instrumentation
-
May.
-
W. Ikram, S. Petersen, P. Orten, and N. F. Thornhill, "Adaptive multichannel transmission power control for industrial wireless instrumentation," IEEE Trans. Ind. Informat., vol. 10, no. 2, pp. 978-990, May 2014.
-
(2014)
IEEE Trans. Ind. Informat.
, vol.10
, Issue.2
, pp. 978-990
-
-
Ikram, W.1
Petersen, S.2
Orten, P.3
Thornhill, N.F.4
-
14
-
-
82555196697
-
BECAN: A bandwidthefficient cooperative authentication scheme for filtering injected false data in wireless sensor networks
-
Jan.
-
R. Lu, X. Lin, H. Zhu, X. Liang, and X. Shen, "BECAN: A bandwidthefficient cooperative authentication scheme for filtering injected false data in wireless sensor networks," IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 1, pp. 32-43, Jan. 2012.
-
(2012)
IEEE Trans. Parallel Distrib. Syst.
, vol.23
, Issue.1
, pp. 32-43
-
-
Lu, R.1
Lin, X.2
Zhu, H.3
Liang, X.4
Shen, X.5
-
15
-
-
85042117068
-
Trace malicious source to guarantee cyber security for mass monitor critical infrastructure
-
10.1016/j.jcss.2016.09.008
-
X. Liu et al., "Trace malicious source to guarantee cyber security for mass monitor critical infrastructure," J. Comput. Syst. Sci., 10.1016/j.jcss.2016.09.008.
-
J. Comput. Syst. Sci
-
-
Liu, X.1
-
16
-
-
34548852836
-
CHEMAS: Identify suspect nodes in selective forwarding attacks
-
X. Bin, B. Yu, and C. Gao, "CHEMAS: Identify suspect nodes in selective forwarding attacks," J. Parallel Distrib. Comput., vol. 67, no. 11, pp. 1218-1230, 2007.
-
(2007)
J. Parallel Distrib. Comput.
, vol.67
, Issue.11
, pp. 1218-1230
-
-
Bin, X.1
Yu, B.2
Gao, C.3
-
17
-
-
85028345951
-
Knowledge-aware proactive nodes selection approach for energy management in internet of things
-
X. Liu, S. Zhao, A. Liu, N. Xiong, and A. V. Vasilakos, "Knowledge-aware proactive nodes selection approach for energy management in internet of things," Future Gener. Comput. Syst., doi: https://doi.org/10.1016/j.future.2017.07.022.
-
Future Gener. Comput. Syst.
-
-
Liu, X.1
Zhao, S.2
Liu, A.3
Xiong, N.4
Vasilakos, A.V.5
-
18
-
-
84987757960
-
Self-configuring realtime communication network based on OpenFlow
-
P. Heise, M. Lasch, F. Geyer, and R. Obermaisser, "Self-configuring realtime communication network based on OpenFlow," in Proc. IEEE Int. Symp. Local Metropolitan Area Netw., 2016, pp. 1-6.
-
(2016)
Proc. IEEE Int. Symp. Local Metropolitan Area Netw.
, pp. 1-6
-
-
Heise, P.1
Lasch, M.2
Geyer, F.3
Obermaisser, R.4
-
19
-
-
84941918744
-
Data gathering optimization by dynamic sensing and routing in rechargeable sensor networks
-
Jun.
-
Y. Zhang, S. He, and J. Chen, "Data gathering optimization by dynamic sensing and routing in rechargeable sensor networks," IEEE/ACM Trans. Netw., vol. 24, no. 3, pp. 1632-1646, Jun. 2016.
-
(2016)
IEEE/ACM Trans. Netw.
, vol.24
, Issue.3
, pp. 1632-1646
-
-
Zhang, Y.1
He, S.2
Chen, J.3
-
20
-
-
85059047985
-
Context-aware collect data with energy efficient in cyber-physical cloud systems
-
Y. Liu, A. Liu, S. Guo, Z. Li, Y. J. Choi, and H. Sekiya, "Context-aware collect data with energy efficient in cyber-physical cloud systems," Future Gener. Comput. Syst., doi: 10.1016/j.future.2017.05.029.
-
Future Gener. Comput. Syst.
-
-
Liu, Y.1
Liu, A.2
Guo, S.3
Li, Z.4
Choi, Y.J.5
Sekiya, H.6
-
21
-
-
84902949347
-
Mobile target detection in wireless sensor networks with adjustable sensing frequency
-
Sep.
-
Y. Hu, M. Dong, K. Ota, A. Liu, and M. Guo, "Mobile target detection in wireless sensor networks with adjustable sensing frequency," IEEE Syst. J., vol. 10, no. 3, pp. 1160-1171, Sep. 2016.
-
(2016)
IEEE Syst. J.
, vol.10
, Issue.3
, pp. 1160-1171
-
-
Hu, Y.1
Dong, M.2
Ota, K.3
Liu, A.4
Guo, M.5
-
22
-
-
84953790290
-
STaR: Design and quantitative measurement of source-location privacy for wireless sensor networks
-
L. Lightfoot, Y. Li, and J. Ren, "STaR: Design and quantitative measurement of source-location privacy for wireless sensor networks," Secur. Commun. Netw., vol. 9, no. 3, pp. 220-228, 2016.
-
(2016)
Secur. Commun. Netw.
, vol.9
, Issue.3
, pp. 220-228
-
-
Lightfoot, L.1
Li, Y.2
Ren, J.3
-
23
-
-
84937468948
-
An energy efficientmethod for secure and reliable data transmission in wireless body area networks using RelAODV
-
K. S. Raja andU.Kiruthika, "An energy efficientmethod for secure and reliable data transmission in wireless body area networks using RelAODV," Wireless Pers. Commun., vol. 83, no. 4, pp. 2975-2997, 2015.
-
(2015)
Wireless Pers. Commun.
, vol.83
, Issue.4
, pp. 2975-2997
-
-
Raja, K.S.1
Kiruthika, U.2
-
24
-
-
84929353058
-
Bypassing infected areas in wireless sensor networks using BPR
-
Jun.
-
N. Yaakob, I. Khalil, H. Kumarage, M. Atiquzzaman, and Z. Tari, "Bypassing infected areas in wireless sensor networks using BPR," IEEE Trans. Comput., vol. 64, no. 6, pp. 1594-1606, Jun. 2015.
-
(2015)
IEEE Trans. Comput.
, vol.64
, Issue.6
, pp. 1594-1606
-
-
Yaakob, N.1
Khalil, I.2
Kumarage, H.3
Atiquzzaman, M.4
Tari, Z.5
-
25
-
-
84866503616
-
Secure and energyefficient disjointmulti-path routing for WSNs
-
Sep.
-
A. Liu, Z. Zheng, C. Zhang, Z. Chen, and X. Shen, "Secure and energyefficient disjointmulti-path routing for WSNs," IEEE Trans. Veh. Technol., vol. 61, no. 7, pp. 3255-3265, Sep. 2012.
-
(2012)
IEEE Trans. Veh. Technol.
, vol.61
, Issue.7
, pp. 3255-3265
-
-
Liu, A.1
Zheng, Z.2
Zhang, C.3
Chen, Z.4
Shen, X.5
-
26
-
-
84943763970
-
TERP: A trust and energy aware routing protocol for wireless sensor network
-
Dec.
-
A. Ahmed, K. Abu Bakar, M. I. Channa, K. Haseeb, and A. W. Khan, "TERP: A trust and energy aware routing protocol for wireless sensor network," IEEE Sens. J., vol. 15, no. 12, pp. 6962-6972, Dec. 2015.
-
(2015)
IEEE Sens. J.
, vol.15
, Issue.12
, pp. 6962-6972
-
-
Ahmed, A.1
Abu Bakar, K.2
Channa, M.I.3
Haseeb, K.4
Khan, A.W.5
-
27
-
-
84863128351
-
METrust: A mutual evaluation-based trust model for P2P networks
-
C. Cheng, X. Xu, and B. Gao, "METrust: A mutual evaluation-based trust model for P2P networks," Int. J. Autom. Comput., vol. 9, no. 1, pp. 63-71, 2012.
-
(2012)
Int. J. Autom. Comput.
, vol.9
, Issue.1
, pp. 63-71
-
-
Cheng, C.1
Xu, X.2
Gao, B.3
-
28
-
-
77952255404
-
Mitigating selective forwarding attacks with a channel-aware approach in WMNs
-
May.
-
D. M. Shila, Y. Cheng, and T. Anjali, "Mitigating selective forwarding attacks with a channel-aware approach in WMNs," IEEE Trans. Wireless Commun., vol. 9, no. 5 pp. 1661-1675, May 2010.
-
(2010)
IEEE Trans. Wireless Commun.
, vol.9
, Issue.5
, pp. 1661-1675
-
-
Shila, D.M.1
Cheng, Y.2
Anjali, T.3
-
29
-
-
84921327888
-
Quality of energy provisioning for wireless power transfer
-
Feb.
-
H. Dai, G. Chen, C.Wang, S.Wang, X.Wu, and F.Wu, "Quality of energy provisioning for wireless power transfer," IEEE Trans. Parallel Distrib. Syst., vol. 26, no. 2, pp. 527-537, Feb. 2015.
-
(2015)
IEEE Trans. Parallel Distrib. Syst.
, vol.26
, Issue.2
, pp. 527-537
-
-
Dai, H.1
Chen, G.2
Wang, C.3
Wang, S.4
Wu, X.5
Wu, F.6
-
30
-
-
84931056000
-
On-off attacksmitigation against trust systems in wireless sensor networks
-
New York, NY, USA: Springer
-
N. Labraoui,M.Gueroui, and L. Sekhri, "On-off attacksmitigation against trust systems in wireless sensor networks," in Computer Science and Its Applications. New York, NY, USA: Springer, 2015, pp. 406-415.
-
(2015)
Computer Science and Its Applications
, pp. 406-415
-
-
Labraoui, N.1
Gueroui, M.2
Sekhri, L.3
-
31
-
-
84925062174
-
Trust management for defending on-off attacks
-
Apr.
-
Y. Chae, L. Dipippo, and Y. Sun, "Trust management for defending on-off attacks," IEEE Trans. Parallel Distrib. Syst., vol. 26, no. 4, pp. 1178-1191, Apr. 2015.
-
(2015)
IEEE Trans. Parallel Distrib. Syst.
, vol.26
, Issue.4
, pp. 1178-1191
-
-
Chae, Y.1
Dipippo, L.2
Sun, Y.3
-
32
-
-
84988950484
-
Defense against on-off packet droppers in a trust management framework for a mobile ad hoc network
-
S. Samreen and G. Narsimha, "Defense against on-off packet droppers in a trust management framework for a mobile ad hoc network," in Proc. IEEE Int. Conf. Internet Things Appl., 2016, pp. 448-453.
-
(2016)
Proc. IEEE Int. Conf. Internet Things Appl.
, pp. 448-453
-
-
Samreen, S.1
Narsimha, G.2
-
33
-
-
84947445464
-
Optimal base station mobility patterns for wireless sensor network lifetime maximization
-
Nov.
-
O. Cayirpunar, E. Kadioglu-Urtis, and B. Tavli, "Optimal base station mobility patterns for wireless sensor network lifetime maximization," IEEE Sens. J., vol. 15, no. 11, pp. 6592-6603, Nov. 2015.
-
(2015)
IEEE Sens. J.
, vol.15
, Issue.11
, pp. 6592-6603
-
-
Cayirpunar, O.1
Kadioglu-Urtis, E.2
Tavli, B.3
|