Traffic Analysis Attacks on Sensor Networks
暂无分享,去创建一个
Richard R. Brooks | Ryan Craven | Lu Yu | Harakrishnan Bhanu | Ryan Craven | R. Brooks | Lu Yu | H. Bhanu
[1] Jason M. Schwier,et al. Side-Channel Analysis for Detecting Protocol Tunneling , 2011, Adv. Internet Things.
[2] Jason M. Schwier,et al. Methods to Window Data to Differentiate Between Markov Models , 2011, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[3] Jason M. Schwier,et al. A Hybrid Statistical Technique for Modeling Recurrent Tracks in a Compact Set , 2011, IEEE Transactions on Automatic Control.
[4] Jason M. Schwier,et al. Behavior Detection Using Confidence Intervals of Hidden Markov Models , 2009, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[5] Cristina Alcaraz,et al. Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks , 2009, FOSAD.
[6] Bernd Fritzke,et al. Fast learning with incremental RBF networks , 1994, Neural Processing Letters.
[7] Claudia Picardi,et al. Keystroke analysis of free text , 2005, TSEC.
[8] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[9] Dakshi Agrawal,et al. The EM Side-Channel(s) , 2002, CHES.
[10] Dawn Xiaodong Song,et al. Timing Analysis of Keystrokes and Timing Attacks on SSH , 2001, USENIX Security Symposium.
[11] Lawrence R. Rabiner,et al. A tutorial on hidden Markov models and selected applications in speech recognition , 1989, Proc. IEEE.
[12] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.