Citation: | LI Peng, WANG Zhen, XU He, et al., “Intrusion Detection Methods Based on Incomplete RFID Traces,” Chinese Journal of Electronics, vol. 26, no. 4, pp. 675-680, 2017, doi: 10.1049/cje.2017.03.011 |
A. Juels, “RFID security and privacy: A research survey”, Selected Areas in Communications (IEEE 2006), Vol.24, No.2, pp.381-394, 2006.
|
M. Esposito and G.D. Vecchia, “An ontology-based intrusion detection for RFID systems”, Technological Developments in Networking, Education and Automation, Springer, Netherlands, pp.467-472, 2010.
|
W. Jakkhupan, S. Arch-Int and Y. Li, “Business process analysis and simulation for the RFID and EPC global Network enabled supply chain: A proof-of-concept approach”, Journal of Network & Computer Applications, Vol.34, No.3, pp.949-957, 2011.
|
D. Rumley, S. Chaturvedi and V. Sakhuja V, “RFID data management: Challenges and opportunities”, IEEE International Conference on RFID (IEEE ICR 2007), Vol.14, No.1, pp.175-182, 2007.
|
S.R. Jeffery, M. Garofalakis and M.J. Franklin, “Adaptive cleaning for RFID data streams”, International Conference on Very Large Data Bases, Seoul, Korea, pp.163-174, 2007.
|
A. Boryssenko and E. Boryssenko, “Antenna array design for HF RFID smart cabinet”, Microwaves, Communications, Antennas and Electronics Systems (IEEE COMCAS 2011), pp.1-3, 2011.
|
J. Patton, “RFID as electronic article surveillance: Feasibility assessment”, Dissertations & Theses-Gradworks, pp.101-103, 2008.
|
J. Brusey, C. Floerkemeier, M. Harrison, et al., “Reasoning about uncertainty in location identification with RFID”, Workshop on Reasoning with Uncertainty in Robotics at IJCAI-2003, pp.53-55, 2004.
|
S.R. Jeffery, G. Alonso, M.J. Franklin, et al., “Declarative support for sensor data cleaning”, Lecture Notes in Computer Science (LNCS 2006), Vol.3968, pp.83-100, 2006.
|
X.M. Yang, X. Zhang, J.H. Wang, et al., “RFID intrusion detection with finite automation”, Journal of University of Electronic Science & Technology of China (UESTC 2014), Vol.5, No.8, pp.32-34, 2014.
|
L.I. Xiongfeng and G. Guan, “A hybrid fuzzy/genetic algorithm for intrusion detection in RFID systems”, RFID Systems Cloning Detection Hybrid Genetic Fuzzy Systems Fuzzy Logic Fuzzy Systems Soft Computing Genetic Algorithms, Vol.26, No.9, pp.1037-1040, 2012.
|
M. Humayun, M.Z. Degefa, B.J.O. Sousa, et al., “Markov model based assessment for redundancy mitigation in high voltage grids using demand response”, International Review of Electrical Engineering (IREE 2013), Vol.8, No.8, pp.1349-1362, 2013.
|
J. Shi, Y. Li, W. He, et al., “SecTTS: A secure track & trace system for RFID-enabled supply chains”, Computers in Industry (CI 2012), Vol.63, No.6, pp.574-585, 2012.
|
Wang Xao-yan, Dong Lu, Xu Chao, et al., “Location privacyh protecting based on anonymous technology in wireless sensor networks”, The Seventh International Symposium on Parallel Architectures, Algorithms and Programming (PAAP 2015), Nanjing, China, pp.229-235, 2015.
|
G. Thamilarasu and R. Sridhar, “Intrusion detection in RFID systems”, International Journal on Computer Science & Engineering (IJCSE 2008), Vol.20, No.1, pp.676-683, 2008.
|
S.A. Zonouz, H. Khurana, W.H. Sanders, et al., “RRE: A gametheoretic intrusion response and recovery engine”, IEEE Transactions on Parallel & Distributed Systems (IEEE TPDS 2014), Vol.25, No.2, pp.395-406, 2014.
|