[图书][B] Handbook on securing cyber-physical critical infrastructure

SK Das, K Kant, N Zhang - 2012 - books.google.com
The worldwide reach of the Internet allows malicious cyber criminals to coordinate and
launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world …

Defense of cyber infrastructures against cyber‐physical attacks using game‐theoretic models

NSV Rao, SW Poole, CYT Ma, F He, J Zhuang… - Risk …, 2016 - Wiley Online Library
The operation of cyber infrastructures relies on both cyber and physical components, which
are subject to incidental and intentional degradations of different kinds. Within the context of …

A novel node placement for long belt coverage in wireless networks

B Wang, H Xu, W Liu, H Liang - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
Coverage is an important issue in many wireless networks. In this paper, we address the
problem of node placement for ensuring complete coverage in a long belt scenario and …

The optimal node placement for long belt coverage in wireless networks

B Wang, H Xu, W Liu, LT Yang - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
The optimal node placement for a very large plane without boundary effect has been proven
to be the regular triangular-lattice pattern in 1939. However, the regular triangular-lattice …

Game-theoretic strategies for cyber-physical infrastructures under component disruptions

NSV Rao, CYT Ma, F He - IEEE Transactions on Reliability, 2022 - ieeexplore.ieee.org
Networked infrastructures of recursively defined systems composed of discrete cyber and
physical components are considered. The components of basic systems at the finest levels …

More is more: the benefits of denser sensor deployment

MP Johnson, D Sariöz, A Bar-Noy, T Brown… - ACM Transactions on …, 2012 - dl.acm.org
Positioning disk-shaped sensors to optimize certain coverage parameters is a fundamental
problem in ad hoc sensor networks. The hexagon lattice arrangement is known to be …

An analytical framework for cyber-physical networks

NSV Rao, Y Narahari, CEV Madhavan… - … on Securing Cyber …, 2012 - books.google.com
Detection, identification, and tracking of spatial phenomena (DITSP) using geographically
distributed sensors have become important tasks in several environmental and infrastructure …

A sensor placement algorithm for redundant covering based on riesz energy minimization

CW Wu, D Verma - 2008 IEEE International Symposium on …, 2008 - ieeexplore.ieee.org
We present an algorithm for sensor placement with redundancy where each point in a 2-
dimensional space is covered by at least k sensors under the constraint that all the sensors …

Node Placement for Long Bounded Belt Complete 2‐Coverage in Wireless Sensor Networks

T Wang, Y Sun, Z Xu, W Zhai… - Mathematical Problems in …, 2015 - Wiley Online Library
Based on Isosceles Triangle (Iso‐Tri) placement and the extended Equalization Strip theory,
we propose an Isosceles Trapezoid complete 2‐coverage (Iso‐TraC2) placement method …

Research on coverage monitoring technology of subsea production system based on wireless sensor network

S Zhang, M Li, C Zhao, Y Tian… - Australian Journal of …, 2023 - Taylor & Francis
To avoid installation dispersion and improve the data transmission efficiency of the
submarine oil and gas production system, the concept of function module with a vertical …