A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is application/pdf
.
Filters
Distributed Intrusion Detection System in a Multi-Layer Network Architecture of Smart Grids
2011
IEEE Transactions on Smart Grid
These intelligent modules employ Support Vector Machines and Artificial Immune System to detect and classify malicious data and possible cyber attacks. ...
Green II, and all the other Lab members for their support and feedback on various parts of this thesis. I am grateful for having been among you during my Master's study here in Toledo. ...
The communication network topology chosen for the SGDIDS architecture is the wireless mesh network (WMN). ...
doi:10.1109/tsg.2011.2159818
fatcat:ufxfqjib6ncjblkv22xixnztvu
A survey on resource discovery mechanisms, peer-to-peer and service discovery frameworks
2008
Computer Networks
Peer-to-peer overlays are discussed in detail and solutions for non-IP-based networks are also included in the review. ...
We also specifically comment on issues related to wireless networks, and give an overview of the various issues and complications that should be considered in future work in this domain. ...
Overlay topology construction and topology mismatching In theory most of the DHT-based systems can guarantee that any object in the network will be located in O(log N ) steps. ...
doi:10.1016/j.comnet.2008.03.006
fatcat:taublleoprhargi7doaj2sm7ay
Fake BTS Attacks of GSM System on Software Radio Platform
2012
Journal of Networks
Experimental results show that the proposed method performs well in terms of both security and error-immunity. ...
The basic knowledge of extension theory is introduced and the inspiration from it to problem in this paper is illustrated. ...
, neural networks, immune-based and so on. ...
doi:10.4304/jnw.7.2.275-281
fatcat:3ejjimllcvewjeifopbvhl3zmi
A Survey of Security Challenges, Attacks Taxonomy and Advanced Countermeasures in the Internet of Things
2020
IEEE Access
Game theory-based detection model presented in [152] , [153] to model and detect SF attacks for wireless mesh networks (WMNs) efficiently. ...
The following security goals on availability must be considered for constant data and system availability. Fault Tolerance: The system must be able to use the selfprotection approach along with self-healing ...
doi:10.1109/access.2020.3037359
fatcat:pw4fsmelmjgc5anm7hp537l63e
Implicit Sleep Mode Determination in Power Management of Event-Driven Deeply Embedded Systems
[chapter]
2009
Lecture Notes in Computer Science
The test environment is based on a 7 × 7 grid of 49 battery operated Tmote Sky sensor nodes. ...
Based on these models, a new network infrastructure will be developed, followed by a large set of algorithms solving global tasks like exploration of unknown areas or target tracking. ...
The overhead necessary for fault-tolerant deadlock handling and device access scheduling can be saved. For energy efficiency operating systems are built event-based and driven by hardware interrupts. ...
doi:10.1007/978-3-642-02118-3_2
fatcat:prjsfyqcojcnpcetw7vfnvqwpy
The University of Texas at Dallas-Richardson, USA Monique P. Fargues, Naval Postgraduate School
CTRQ 2011 The Fourth International Conference on Communication Theory, Reliability, and Andras Farago
unpublished
in communication theory. ...
events focusing on the achievements on communication theory with respect to reliability and quality of service. ...
ACKNOWLEDGMENT The authors thank to all the members of ETSI STF 360, and also thank to the members of ANR's project UBIS for their work on our platform. ...
fatcat:elfp25yypbb6jkaytdpm4aa6l4
Special Issue: Advances in Secure Data Streaming Systems
2015
unpublished
This work was funded in part by the U.S. Army under grant #W911NF-11-1-0124. ...
and are fault tolerant and highly available in nature. ...
its fault tolerant behavior [24] . ...
fatcat:vvmbxyvcyfccfi3wnl6q2kkfka
Security adaptation in highly dynamic wireless networks
2014
Sans aucun doute, un moniteur de référence, qui adapte sa sécurité hautement dynamique, doit être basé sur un système bio-inspiré. ...
En particulier, notre système est basé sur les caractéristiques bio-inspirées telles que l'autogestion et l'auto-optimisation. ...
It is my great good fortune to have met him, because he has had the aptitude to encourage me in starting as well as in finishing this thesis. ...
doi:10.13097/archive-ouverte/unige:37196
fatcat:5qslswmmzvfrvnedumq6vs3wlu
ICWMC 2016 Committee ICWMC Advisory Committee
unpublished
on the previous events on advanced wireless technologies, wireless networking, and wireless applications. ...
We are grateful to the members of the ICWMC 2016 organizing committee for their help in handling the logistics and for their work to make this professional meeting a success. ...
[6] proposes a classification of power control mechanisms in WSN, based on Control Theory and actually related to power control protocols only. ...
fatcat:t6alooghi5cnfep4hiepaeb75y
Game Theoretic Load Management Schemes for Smart Grids
2016
The proposed approach is based on game theory using a modified regret matching procedure. ...
In this thesis, we focus mainly on energy savings by critically investigating the problem of load management in the smart grid. ...
of nodes organized in a mesh topology. ...
doi:10.20381/ruor-5202
fatcat:tiubgfkwzfh6bagd7drfki6wj4
Self-repairing hierarchical tree-based link restoration scheme for mesh networks
2013
In this thesis we propose and study a self-repairing tree-based pre-planned link protection scheme for backbone mesh survivable networks. ...
We conduct extensive studies of the performance trends of the hierarchical protection trees on a database that we built from thousands of randomly generated mesh networks with varying topology parameters ...
The proof is based on the following theorem from basic graph theory about trees [GrYe99]: Theorem 3.1: Suppose in the undirected, connected graph G(V, E), subgraph T(V ,E ) a G forms a tree. ...
doi:10.20381/ruor-12964
fatcat:f4rgcv63hrd63bjy6xcxobkjyy
Self-Organizing Infrastructures for Ambient Services
[chapter]
Kommunikation in Verteilten Systemen (KiVS)
The focus of the research work presented in this thesis is on the global-scale interactions in an AmI system. ...
There are still many challenges ahead on the way towards the realization of AmI. ...
Autonomic managers shall control autonomic elements using some form of closed control loop, a concept that has been known from control theory for several decades, based on higher-level policies. ...
doi:10.1007/978-3-540-69962-0_27
dblp:conf/kivs/Herrmann07
fatcat:rtafhtrjkrgmpcfhcz2algsqw4