Author:
Roman Rodrigo,Alcaraz Cristina,Lopez Javier
Subject
Computer Networks and Communications,Safety, Risk, Reliability and Quality,Software
Reference43 articles.
1. Adar E, Wuchner A. Risk management for critical infrastructure protection challenges, best practices & tools. In: First intern. workshop on critical infrastructure protection; November 2005. p. 90–100.
2. Wireless sensor networks: a survey;Akyildiz;Computer Networks: The International Journal of Computer and Telecommunications Networking,2002
3. Alarifi A, Du W. Diversifying sensor nodes to improve resilience against node compromise. In: Proceedings of the fourth ACM workshop on security of ad hoc and sensor networks (SASN 2006), Alexandria, USA; October 2006.
4. Alcaraz C, Roman R. Applying key infrastructures for sensor networks in CIP/CIIP scenarios. In: Proceedings of the first international workshop on critical information infrastructures security (CRITIS 2006), Samos, Greece; August–September 2006.
5. Becher A, Benenson Z, Dornseif M. Tampering with motes: real-world physical attacks on wireless sensor networks. In: Proceedings of the third international conference on security in pervasive computing (SPC 2006), York, UK; April 2006.
Cited by
20 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献