Chapter 01
2192-113X-1-11.pdf
Adrian Lauf, Jonathan Wiley, William H. Robinson, Gabor Karsai (Vanderbilt ISIS) Tanya Roosta (Berkeley) 1.
1 Security of Sensor Networks Tanya Roosta TRUST Seminar UC Berkeley, November 9, 2006.
Applying policy-based intrusion detection to scada networks
Security of Sensor Networks
16.1 16 Security Foundations of Computer Science Cengage Learning.
3.1 Chapter 1 Introduction. 3.2 1-1 THREE SECURITY GOALS Figure 1.1 Taxonomy of security goals.