Notice of RetractionBuilding global view with log files in a distributed/network system
暂无分享,去创建一个
[1] Yang Xiao. Accountability for wireless LANs, ad hoc networks, and wireless mesh networks , 2008, IEEE Communications Magazine.
[2] Robert A. Malaney. Securing Wi-Fi networks with position verification: extended version , 2007, Int. J. Secur. Networks.
[3] Mark A. Shayman,et al. On pairwise connectivity of wireless multihop networks , 2007, Int. J. Secur. Networks.
[4] Kamil Saraç,et al. Single packet IP traceback in AS-level partial deployment scenario , 2007, Int. J. Secur. Networks.
[5] John C.-I. Chuang,et al. Network monitors and contracting systems: competition and innovation , 2006, SIGCOMM.
[6] Yang Xiao,et al. Implementation and evaluation of accountability using flow-net in wireless networks , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.
[7] Jie Wu,et al. Clique-based group key assignment in Wireless Sensor Networks , 2008, Int. J. Secur. Networks.
[8] Scott Shenker,et al. An Accountability Interface for the Internet , 2007 .
[9] Kamil Saraç,et al. Single packet IP traceback in AS-level partial deployment scenario , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..
[10] Nirwan Ansari,et al. Adaptive trust-based anonymous network , 2007, Int. J. Secur. Networks.
[11] Jeffrey S. Chase,et al. The role of accountability in dependable distributed systems , 2005 .
[12] Pei Cao,et al. Hash-AV: fast virus signature scanning by cache-resident filters , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..
[13] Yang Xiao. Flow-net methodology for accountability in wireless networks , 2009, IEEE Network.
[14] Lillykutty Jacob,et al. Secure hybrid routing with micro/macro-mobility handoff mechanisms for urban wireless mesh networks , 2008, Int. J. Secur. Networks.
[15] Yi-Bing Lin,et al. NTP-DownloadT: a conformance test tool for secured mobile download services , 2008, Int. J. Secur. Networks.
[16] Qijun Gu,et al. Defence against packet injection in ad hoc networks , 2007, Int. J. Secur. Networks.
[17] Chuanyi Ji,et al. Optimal worm-scanning method using vulnerable-host distributions , 2007, Int. J. Secur. Networks.
[18] Riccardo Bettati,et al. Analysis of flow-correlation attacks in anonymity network , 2007, Int. J. Secur. Networks.
[19] Butler W. Lampson,et al. 31. Paper: Computer Security in the Real World Computer Security in the Real World , 2022 .
[20] Jeffrey S. Chase,et al. Trust but verify: accountability for network services , 2004, EW 11.
[21] Victor C. M. Leung,et al. Enhancing security using mobility-based anomaly detection in cellular mobile networks , 2006, IEEE Trans. Veh. Technol..
[22] Archana Ganapathi,et al. Why Do Internet Services Fail, and What Can Be Done About It? , 2002, USENIX Symposium on Internet Technologies and Systems.
[23] Shahram Latifi,et al. An iris and retina multimodal biometric system , 2008, Int. J. Secur. Networks.
[24] Paul Rabinovich,et al. Secure message delivery in publish/subscribe networks using overlay multicast , 2007, Int. J. Secur. Networks.
[25] Yang Xiao,et al. Detection of Fraudulent Usage in Wireless Networks , 2007, IEEE Transactions on Vehicular Technology.
[26] Paul Laskowski,et al. Network monitors and contracting systems: competition and innovation , 2006, SIGCOMM 2006.
[27] Jianping Pan,et al. Vulnerabilities in distance-indexed IP traceback schemes , 2007, Int. J. Secur. Networks.
[28] Ding-Zhu Du,et al. An one-way function based framework for pairwise key establishment in sensor networks , 2008, Int. J. Secur. Networks.
[29] Hsiao-Hwa Chen,et al. DKMS: distributed hierarchical access control for multimedia networks , 2007, Int. J. Secur. Networks.
[30] H. Jonathan Chao,et al. Design and analysis of a multipacket signature detection system , 2007, Int. J. Secur. Networks.
[31] Taieb Znati,et al. End-to-end pairwise key establishment using node disjoint secure paths in wireless sensor networks , 2007, Int. J. Secur. Networks.