Using Battery Constraints within Mobile Hosts to Improve Network Security
暂无分享,去创建一个
[1] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[2] Kang G. Shin,et al. Detecting SYN flooding attacks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[3] Grant A. Jacoby,et al. Battery-based intrusion detection , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..
[4] Michael S. Hsiao,et al. Denial-of-service attacks on battery-powered mobile computers , 2004, Second IEEE Annual Conference on Pervasive Computing and Communications, 2004. Proceedings of the.
[5] K. C. Syracuse,et al. A statistical approach to domain performance modeling for oxyhalide primary lithium batteries , 1997, The Twelfth Annual Battery Conference on Applications and Advances.
[6] Giovanni Vigna,et al. An experience developing an IDS stimulator for the black-box testing of network intrusion detection systems , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[7] T. Champion,et al. A benchmark evaluation of network intrusion detection systems , 2001, 2001 IEEE Aerospace Conference Proceedings (Cat. No.01TH8542).
[8] Massoud Pedram,et al. Design considerations for battery-powered electronics , 1999, Proceedings 1999 Design Automation Conference (Cat. No. 99CH36361).
[9] Cannady,et al. A Comparative Analysis of Current Intrusion Detection Technologies , 1996 .
[10] Michael S. Hsiao,et al. Towards an intrusion detection system for battery exhaustion attacks on mobile computing devices , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.
[11] G.A. Jacoby,et al. Battery-based intrusion detection a first line of defense , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..
[12] Philip Koopman,et al. Embedded System Security , 2004, Computer.