1 |
H.Y. Lee and T.H. Cho, 'Fuzzy Adaptive Selection of Filtering Schemes for Energy Saving in Sensor Networks,' IEICE Transactions on Communications, vol. 90, no. 12, pp. 3346-3353, June 2007
|
2 |
S.J. Lee, H.Y. Lee, and T.H. Cho, 'A Threshold Determining Method for the Dynamic Filtering in Wireless Sensor Networks Based on Fuzzy Logic,' International Journal of Computer Science and Network Security, vol. 8, no. 4, pp. 155-159, Apr. 2008
|
3 |
S.H. Chi and T.H. Cho, 'Fuzzy Logic based Propagation Limiting Method for Message Routing in Wireless Sensor Networks,' Lecture Notes in Computer Science, vol. 3983, pp. 58-64, May 2006
|
4 |
B.P. Zeigler, H. Praehofer, and T.G. Kim, Theory of Modeling and Simulation, ACADEMIC PRESS, pp. 53-89, Jan. 2000
|
5 |
I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirici. 'A Survey
on Sensor Networks,' IEEE Communications Magazine, vol. 40, no. 8, pp. 102-114, Aug. 2002
DOI
ScienceOn
|
6 |
H. Yang and S. Lu, 'Commutative Cipher Based En-Route Filtering in Wireless Sensor Networks,' Proc. VTC, pp. 1223-1227, Sep. 2004
|
7 |
W. Zhang and G. Cao, 'Group Rekeying for Filtering False Data in Sensor Networks: A Predistribution and Local Collaboration-based Approach,' Proc INFOCOM, pp. 503-514, Mar. 2005
|
8 |
Z. Yu and Y. Guan, 'A Dynamic En-route Scheme for Filtering False Data lnjectionin Wireless Sensor Networks,' Proc. SenSys, pp. 294-295, Nov. 2005
|
9 |
H.Y. Lee and T.H. Cho, 'Fuzzy Adaptive Threshold Determining in the Key Inheritance Based Sensor Networks,' Lecture Notes in Artificial Intelligence, vol. 4570, pp. 64-73, July 2007
|
10 |
H.S. Seo, 'Network Security Agent DEVS Simulation Modeling,' Simulation Modelling Practice and Theory, vol. 14, no. 5, pp. 481-492, Aug. 2005
DOI
ScienceOn
|
11 |
F. Ye, H. Luo, and S. Lu, 'Statistical En-Route Filtering of lniected False Data in Sensor Networks,' IEEE Journal on Selected Areas in Communications, vol. 23, no. 4, pp. 839-850, Apr. 2005
DOI
ScienceOn
|
12 |
H.Y. Lee and T.H. Cho, 'Key Inheritance-Based False Data Filtering Scheme in Wireless Sensor Networks,' Lecture Notes in Computer Science, vol. 4317, pp. 116-127, Dec. 2006
|
13 |
J. Yang, R. Havaldar, V. Honavar, L. Miller, and J. Wong, 'Coordination of Distrbuted Knowledge Networks Using Contract Net Protocol,' Proc. lTC, pp. 71-74, Sep. 1998
|
14 |
S.R. Kim and T.H. Cho, 'Application of Fuzzy Logic for Adaptive Filtering in the Statistical Filtering based Sensor Networks,' Proc. NMC, p. 18, Aug. 2006
|
15 |
S. Zhu, S. Setia, S. Jajodia, and P. Ning, 'An Interleaved Hop-by-Hop Authentication Scheme for Filtering of lniected False Data in Sensor Networks,' Proc. S&P, pp. 259-271, May 2004
|