Open Access
Issue |
MATEC Web Conf.
Volume 210, 2018
22nd International Conference on Circuits, Systems, Communications and Computers (CSCC 2018)
|
|
---|---|---|
Article Number | 04022 | |
Number of page(s) | 8 | |
Section | Computers | |
DOI | https://doi.org/10.1051/matecconf/201821004022 | |
Published online | 05 October 2018 |
- C. Heinrich, RFID and Beyond: Growing Your Business Through Real World Awareness, Wiley Publishing (2005) [Google Scholar]
- G. D'Angelo, S. Ferretti, V. Ghini, Modeling the Internet of Things: a simulation perspective, Proceedings of the IEEE HPCS 2017, DOI: 10.1109/HPCS.2017.13 (2017) [Google Scholar]
- M. Kiedrowicz, T. Nowicki, R. Waszkowski, Z. Wesolowski, and K. Worwa, Business processes in the RFID-equipped restricted access administrative office, DOI: doi.org/10.1051/matecconf/20167604003, MATEC Web Conf., 76 (2016) [Google Scholar]
- T. Nowicki, K. Chlebicki, D. Pierzchała, K. Worwa and R. Waszkowski, Simulator for testing hardware and software of the office system with RFID tags, DOI: doi.org/10.1051/matecconf/201712502009 (2017) [Google Scholar]
- Dyk M., Najgebauer A., Pierzchała D., Agent-based M&S of smart sensors for knowledge acquisition inside the Internet of Things and sensor networks, Int. Inf. and Database Syst., LNCS, 9012, Subseries: LNAI, XXXVI, 212-223 (2015) [Google Scholar]
- Dyk M., Najgebauer A., Pierzchała D., SenseSim: An Agent-Based and Discrete Event Simulator for Wireless Sensor Networks and the Internet of Things, 2015 IEEE 2nd WF-IoT Proceedings, ISBN 9781509003655 (2015) [Google Scholar]
- M. Dyk, A. Najgebauer, D. Pierzchała, Augmented perception using Internet of Things, Information Systems Architecture and Technology. Sel. Asp. of Comm. and Comp. Syst., ISBN 978-83-7493-856-3, 109-118, Wrocław (2014) [Google Scholar]
- D. Tagra, M. Rahman and S. Sampalli, Technique for Preventing DoS Attacks on RFID Systems, Telecommunications and Computer Networks (SoftCOM), IEEE Xplore, INSPEC Accession Number 11637601 (2010) [Google Scholar]
- S.A. Weis, S.E. Sarma, R.L. Rivest, D.W. Engels: Security and privacy aspects of low-cost radio frequency identification systems, Security in Pervasive Computing, LNCS, Springer-Verlag, 2802, 201-212 (2004) [Google Scholar]
- D. Pierzchała, Application of Ontology and Rough Set Theory to Information Sharing in Multi-resolution Combat M&S, Studies in Computational Intelligence, 551, 193-203, Springer (2014) [Google Scholar]
- B. Musznicki, P. Zwierzykowski, Survey of Wireless Sensor Networks Simulation Tools for Demanding Applications. International Journal of Grid and Distributed Computing, 5, 3 (2012). [Google Scholar]
- F. Osterlind, A. Dunkels, J. Eriksson, N. Finne, and T. Voigt, Cross-level sensor network simulation with COOJA, Proceedings of SenseApp 2006, Tampa, USA (2006) [Google Scholar]
- A. Sobeih, W.-P. Chen, J. C. Hou, L.-C. Kung, N. Li, H. Lim, H.-Y. Tyan, and H. Zhang, J-Sim: A Simulation and Emulation Environment for Wireless Sensor Networks, J-Sim documentation [Google Scholar]
- Mehdi, K., Lounis, M., Bounceur, A., Kechadi., T., Cupcarbon: A multiagent and discrete event wireless sensor network design and simulation tool, 7th SIMUTools14), Lisbon (2014) [Google Scholar]
- Ramanauskaitė S., Čenys A., Composite DoS attack model, ISSN 2029-2341, 20-26 (2012) [Google Scholar]
- http://ec.europa.eu/information_society/tl/help/glossary/index_en.htm#c (last enter 03.2018) [Google Scholar]
- J. R. Vacca, Security for the Internet of Thing, Computer and information security, 3-rd ed. (2017) [Google Scholar]
- M. Kiedrowicz, Multi-faceted methodology of the risk analysis and management referring to the IT system supporting the processing of documents at different levels of sensitivity, MATEC Web of Conferences, vol. 125, DOI: 10.1051/matecconf/201712502010, Greece (2017) [Google Scholar]
- M. Kiedrowicz, J. Stanik, Selected aspects of risk management in respect of security of the document, lifecycle management system with multiple levels of sensitivity, B. Kubiak, J. Maślankowski (eds.) Information Management in Practice, pp. 231-248, ISBN 978-83-64669-05-7, Poland (2015) [Google Scholar]
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.