Virtual flow-net for accountability and forensics of computer and network systems
暂无分享,去创建一个
[1] Jon M. Kleinberg,et al. Small-World Phenomena and the Dynamics of Information , 2001, NIPS.
[2] Hamdy S. Soliman,et al. Enhancing AODV routing protocol over mobile ad hoc sensor networks , 2011, Int. J. Sens. Networks.
[3] Rabab Kreidieh Ward,et al. Increasing energy efficiency in sensor networks: blue noise sampling and non-convex matrix completion , 2011, Int. J. Sens. Networks.
[4] Yang Xiao,et al. Accountable MapReduce in cloud computing , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[5] Franco Zambonelli,et al. Landslide monitoring with sensor networks: experiences and lessons learnt from a real-world deployment , 2011, Int. J. Sens. Networks.
[6] Brandon Dixon,et al. Using an edge-dual graph and k-connectivity to identify strong connections in social networks , 2008, ACM-SE 46.
[7] Adel Ali Al-Jumaily,et al. Per node deployment based detection of controlled link establishment attack in distributed sensor networks , 2011, Int. J. Sens. Networks.
[8] Georgios Kalogridis,et al. Privacy protection system and metrics for hiding electrical events , 2011, Int. J. Secur. Networks.
[9] Tassos Dimitriou,et al. Scatter - secure code authentication for efficient reprogramming in wireless sensor networks , 2011, Int. J. Sens. Networks.
[10] Guoliang Xue,et al. Authenticating strangers in Online Social Networks , 2011, Int. J. Secur. Networks.
[11] Yang Xiao. Flow-net methodology for accountability in wireless networks , 2009, IEEE Network.
[12] Yang Xiao,et al. Building Accountable Smart Grids in Neighborhood Area Networks , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[13] Maurizio Longo,et al. Energy-efficient collaborative tracking in wireless sensor networks , 2011, Int. J. Sens. Networks.
[14] Dhiraj K. Pradhan,et al. Fault-tolerant de-Bruijn graph based multipurpose architecture and routing protocol for wireless sensor networks , 2011, Int. J. Sens. Networks.
[15] Moustafa Youssef,et al. A source authentication scheme using network coding , 2011, Int. J. Secur. Networks.
[16] Lada A. Adamic,et al. How to search a social network , 2005, Soc. Networks.
[17] Bo Fu,et al. GlobalView: building global view with log files in a distributed/networked system for accountability , 2014, Secur. Commun. Networks.
[18] Jie Wu,et al. Friendship-based location privacy in Mobile Social Networks , 2011, Int. J. Secur. Networks.
[19] Y. Taché,et al. Editorial , 2011, Peptides.
[20] Ananthanarayanan Chockalingam,et al. Enhancing lifetime of wireless sensor networks using multiple data sinks , 2011, Int. J. Sens. Networks.
[21] H. Russell Bernard,et al. A Pseudomodel of the Small World Problem , 1979 .
[22] Daisuke Takahashi,et al. Accountability using flow-net: design, implementation, and performance evaluation , 2012, Secur. Commun. Networks.
[23] M E J Newman,et al. Identity and Search in Social Networks , 2002, Science.
[24] E. Todeva. Networks , 2007 .
[25] Gerhard P. Hancke,et al. Actor coordination using info-gap decision theory in wireless sensor and actor networks , 2011, Int. J. Sens. Networks.
[26] Xenofon D. Koutsoukos,et al. RF angle of arrival-based node localisation , 2011, Int. J. Sens. Networks.
[27] Peng Liu,et al. Secure and privacy-preserving information aggregation for smart grids , 2011, Int. J. Secur. Networks.
[28] Abdelrahman Desoky,et al. Edustega: an Education-Centric Steganography methodology , 2011, Int. J. Secur. Networks.
[29] Feng Qi,et al. A green wireless sensor network for environmental monitoring and risk identification , 2011, Int. J. Sens. Networks.
[30] Jean-Lien C. Wu,et al. A cluster-based algorithm for redundant nodes discovery in dense sensor networks , 2011, Int. J. Sens. Networks.
[31] Victor C. M. Leung,et al. Improved IP Multimedia Subsystem Authentication mechanism for 3G-WLAN networks , 2011, INFOCOM WKSHPS 2011.
[32] Shahram Latifi,et al. Partial iris and recognition as a viable biometric scheme , 2011, Int. J. Secur. Networks.
[33] Jing Liu,et al. Temporal Accountability and Anonymity in Medical Sensor Networks , 2011, Mob. Networks Appl..
[34] Fan Zhang,et al. Comparative performance and energy consumption analysis of different AES implementations on a wireless sensor network node , 2011, Int. J. Sens. Networks.
[35] Yang Xiao. Accountability for wireless LANs, ad hoc networks, and wireless mesh networks , 2008, IEEE Communications Magazine.
[36] Ilaria Giordani,et al. Querying sensor data for environmental monitoring , 2011, Int. J. Sens. Networks.
[37] Benjamin W. P. Ramsey,et al. Subjective audio quality over a secure IEEE 802.11n network , 2011, Int. J. Secur. Networks.
[38] Bo Fu,et al. An Implementation Scheme of Flow-Net and Its Applications on Detecting Attacks in Wireless Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[39] Jianqing Zhang,et al. Application-Aware Secure Multicast for Power Grid Communications , 2010 .
[40] K. P. Subbalakshmi,et al. KL-sense secure image steganography , 2011, Int. J. Secur. Networks.
[41] Kenji Leibnitz,et al. A uniform airdrop deployment method for large-scale wireless sensor networks , 2011, Int. J. Sens. Networks.
[42] Neeraj Jaggi,et al. A three dimensional sender anonymity metric , 2011, Int. J. Secur. Networks.
[43] P. Killworth,et al. The reversal small-world experiment , 1978 .
[44] Jingyuan Zhang,et al. Hidden information in Microsoft Word , 2011, Int. J. Secur. Networks.
[45] Funian Li. Adaptive resource allocation in multiuser cooperative networks with proportional rate constraints , 2011, Int. J. Sens. Networks.
[46] Xiaohui Liang,et al. ESPAC: Enabling Security and Patient-centric Access Control for eHealth in cloud computing , 2011, Int. J. Secur. Networks.
[47] Jon M. Kleinberg,et al. Navigation in a small world , 2000, Nature.
[48] Walter Lang,et al. Testing network protocols and signal attenuation in packed food transports , 2011, Int. J. Sens. Networks.
[49] D. Watts,et al. An Experimental Study of Search in Global Social Networks , 2003, Science.
[50] Hrishikesh B. Acharya,et al. Is That You? Authentication in a Network without Identities , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[51] Michal Wódczak. Autonomic cooperative networking for wireless green sensor systems , 2011, Int. J. Sens. Networks.
[52] Mark S. Granovetter. The Strength of Weak Ties , 1973, American Journal of Sociology.
[53] Yang Xiao,et al. P-Accountable Networked Systems , 2010, 2010 INFOCOM IEEE Conference on Computer Communications Workshops.
[54] Yang Xiao,et al. Implementation and evaluation of accountability using flow-net in wireless networks , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.
[55] Guang Gong,et al. On the (in)security of two Joint Encryption and Error Correction schemes , 2011, Int. J. Secur. Networks.
[56] Siu-Ming Yiu,et al. Exclusion-intersection encryption , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[57] Yang Xiao,et al. Accountable Administration and Implementation in Operating Systems , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[58] Matthew N. O. Sadiku,et al. An intrusion detection technique based on continuous binary communication channels , 2011, Int. J. Secur. Networks.
[59] Azeddine Bilami,et al. HEEP (Hybrid Energy Efficiency Protocol) based on chain clustering , 2011, Int. J. Sens. Networks.
[60] Haibin Yu,et al. Error compensation algorithm in wireless sensor networks synchronisation , 2011, Int. J. Sens. Networks.
[61] Koushik Kar,et al. Multi-sensor activation for temporally correlated event monitoring with renewable energy sources , 2011, Int. J. Sens. Networks.
[62] Craig C. Lundberg. Patterns of Acquaintanceship in Society and Complex Organization , 1975 .
[63] Deepa Kundur,et al. Towards modelling the impact of cyber attacks on a smart grid , 2011, Int. J. Secur. Networks.
[64] Ramez Elmasri,et al. Fundamentals of Database Systems, 5th Edition , 2006 .
[65] Cormac J. Sreenan,et al. Cross-layer routing and time synchronisation in wireless sensor networks , 2011, Int. J. Sens. Networks.
[66] Shensheng Tang,et al. An epidemic model with adaptive virus spread control for Wireless Sensor Networks , 2011, Int. J. Secur. Networks.
[67] Jie Wu,et al. A Quantitative Study of Accountability in Wireless Multi-hop Networks , 2010, 2010 39th International Conference on Parallel Processing.
[68] Yang Xiao,et al. Building a wireless capturing tool for WiFi , 2009, Secur. Commun. Networks.
[69] Hua Wang,et al. Security and privacy in RFID systems: [special issue of International Journal of Security and Networks] , 2010 .
[70] Stanley Milgram,et al. An Experimental Study of the Small World Problem , 1969 .
[71] Warren G. Kruse,et al. Computer Forensics: Incident Response Essentials , 2001 .
[72] Yang Xiao,et al. Accountability in smart grids , 2011, 2011 IEEE Consumer Communications and Networking Conference (CCNC).
[73] Daisuke Takahashi,et al. Complexity Analysis of Retrieving Knowledge from Auditing Log Files for Computer and Network Forensics and Accountability , 2008, 2008 IEEE International Conference on Communications.
[74] Kannan Govindan,et al. Rendezvous based trust propagation to enhance distributed network security , 2011, INFOCOM WKSHPS 2011.
[75] Symeon Papavassiliou,et al. Energy-efficient framework for data gathering in wireless sensor networks via the combination of sleeping MAC and data aggregation strategies , 2011, Int. J. Sens. Networks.
[76] Daisuke Takahashi,et al. Retrieving knowledge from auditing log-files for computer and network forensics and accountability , 2008, Secur. Commun. Networks.
[77] A. S. Poornima,et al. PERSEN: power-efficient logical ring based key management for clustered sensor networks , 2011, Int. J. Sens. Networks.
[78] Samir Khuller,et al. Improved approximation algorithms for uniform connectivity problems , 1995, STOC '95.
[79] Daisuke Takahashi,et al. Wireless telemedicine and m-health: technologies, applications and research issues , 2011, Int. J. Sens. Networks.
[80] Daisuke Takahashi,et al. IEEE 802.11 user fingerprinting and its applications for intrusion detection , 2010, Comput. Math. Appl..
[81] Yang Xiao,et al. PeerReview Analysis and Re-evaluation for Accountability in Distributed Systems or Networks , 2010, ISA.
[82] Sharon L. Milgram,et al. The Small World Problem , 1967 .