Sensor networks are expected to play an important role in hybrid protection infrastructures when combined with robots and human decision makers. In order to be effective, detection of intruders needs to be attended to, and a timely response needs to be made. Intruders, on the other hand, if they can't avoid detection may make use of strategies to overload attention or dilute the response. Such strategies are related to Denial of Service attacks in electronic security. This paper develops the conceptual framework for modeling the game between intruders and defenders. 1
Abstract—Recent years have seen increased interest in the design and deployment of smart grid device...
Sensor networks are being increasingly deployed in many application domains ranging from environment...
Composés d'appareils fortement limités en ressources (puissance de calcul, mémoire et énergie dispon...
Abstract—Insufficiency of memory and battery power of sensors makes the security of sensor networks ...
Abstract — Wireless sensor and actor networks are a group of sensors and actors linked by wireless m...
Part 9: Cyber-physical Systems and Critical Infrastructures SecurityInternational audienceIn this wo...
© IFIP International Federation for Information Processing 2015. In this work we present an Intrusio...
We present a study of using game theory for protecting wireless sensor networks (WSNs) from selfish ...
© 2016 by the authors; licensee MDPI, Basel, Switzerland. We present a study of using game theory fo...
Deploying wireless sensor networks has been recognized as one of the effective and cost-efficient wa...
Abstract- The problem of detecting malicious nodes in wireless sensor networks is considered. Since ...
Surveillance has always been an important task for human beings either for protecting a precious ass...
Every day we share our personal information through digital systems which are constantly exposed to ...
Sensor systems are becoming pervasive in many domains, and are recently being generalized by the Int...
The advancement in technology has transformed Cyber Physical Systems and their interface with IoT in...
Abstract—Recent years have seen increased interest in the design and deployment of smart grid device...
Sensor networks are being increasingly deployed in many application domains ranging from environment...
Composés d'appareils fortement limités en ressources (puissance de calcul, mémoire et énergie dispon...
Abstract—Insufficiency of memory and battery power of sensors makes the security of sensor networks ...
Abstract — Wireless sensor and actor networks are a group of sensors and actors linked by wireless m...
Part 9: Cyber-physical Systems and Critical Infrastructures SecurityInternational audienceIn this wo...
© IFIP International Federation for Information Processing 2015. In this work we present an Intrusio...
We present a study of using game theory for protecting wireless sensor networks (WSNs) from selfish ...
© 2016 by the authors; licensee MDPI, Basel, Switzerland. We present a study of using game theory fo...
Deploying wireless sensor networks has been recognized as one of the effective and cost-efficient wa...
Abstract- The problem of detecting malicious nodes in wireless sensor networks is considered. Since ...
Surveillance has always been an important task for human beings either for protecting a precious ass...
Every day we share our personal information through digital systems which are constantly exposed to ...
Sensor systems are becoming pervasive in many domains, and are recently being generalized by the Int...
The advancement in technology has transformed Cyber Physical Systems and their interface with IoT in...
Abstract—Recent years have seen increased interest in the design and deployment of smart grid device...
Sensor networks are being increasingly deployed in many application domains ranging from environment...
Composés d'appareils fortement limités en ressources (puissance de calcul, mémoire et énergie dispon...