Secure socket layer certificate verification: a learning automata approach
暂无分享,去创建一个
[1] Liang Zhou,et al. Multimedia traffic security architecture for the internet of things , 2011, IEEE Network.
[2] P. Venkata Krishna,et al. An adaptive learning approach for fault-tolerant routing in Internet of Things , 2012, 2012 IEEE Wireless Communications and Networking Conference (WCNC).
[3] Eric Rescorla,et al. SSL and TLS: Designing and Building Secure Systems , 2000 .
[4] Llanos Tobarra,et al. Formal Verification of the Secure Sockets Layer Protocol , 2008, ICEIS.
[5] S. Lakshmivarahan,et al. Learning Algorithms Theory and Applications , 1981 .
[6] B. John Oommen,et al. Random Early Detection for Congestion Avoidance in Wired Networks: A Discretized Pursuit Learning-Automata-Like Solution , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[7] P. Venkata Krishna,et al. Virtual Backoff Algorithm: An Enhancement to 802.11 Medium-Access Control to Improve the Performance of Wireless Networks , 2010, IEEE Transactions on Vehicular Technology.
[8] Ahmad-Reza Sadeghi,et al. Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).
[9] Eyal Kushilevitz,et al. Learning Automata , 2008, Encyclopedia of Algorithms.
[10] Julien Freudiger,et al. The Inconvenient Truth about Web Certificates , 2011, WEIS.
[11] Emiliano De Cristofaro,et al. Harvesting SSL Certificate Data to Identify Web-Fraud , 2009, Int. J. Netw. Secur..
[12] W. Chou. Inside SSL: the secure sockets layer protocol , 2002 .
[13] P. Venkata Krishna,et al. A stochastic learning automata-based solution for intrusion detection in vehicular ad hoc networks , 2011, Secur. Commun. Networks.
[14] P. Venkata Krishna,et al. A Learning Automata Based Solution for Preventing Distributed Denial of Service in Internet of Things , 2011, 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing.
[15] P. Venkata Krishna,et al. A simple learning automata-based solution for intrusion detection in wireless sensor networks , 2011, Wirel. Commun. Mob. Comput..
[16] P. Venkata Krishna,et al. A learning automata-based fault-tolerant routing algorithm for mobile ad hoc networks , 2011, The Journal of Supercomputing.
[17] Chen-Nee Chuah,et al. Dynamic measurement-aware routing in practice , 2011, IEEE Network.
[18] David W. Chadwick,et al. Role-Based Access Control With X.509 Attribute Certificates , 2003, IEEE Internet Comput..
[19] P. Venkata Krishna,et al. Mitigating denial of service attacks in hierarchical wireless sensor networks , 2011, Netw. Secur..
[20] P. Venkata Krishna,et al. LAID: a learning automata-based scheme for intrusion detection in wireless sensor networks , 2009, Secur. Commun. Networks.
[21] B. John Oommen,et al. Cybernetics and Learning Automata , 2009, Handbook of Automation.
[22] P. Venkata Krishna,et al. An adaptive learning routing protocol for the prevention of distributed denial of service attacks in wireless mesh networks , 2010, Comput. Math. Appl..
[23] Jong Hyuk Park,et al. Personlized English reading sequencing based on learning portfolio analysis , 2014, Inf. Sci..
[24] Mittal S. Bhiogade. Secure Socket Layer , 2001 .
[25] P. Venkata Krishna,et al. An efficient approach for distributed dynamic channel allocation with queues for real-time and non-real-time traffic in cellular networks , 2009, J. Syst. Softw..
[26] P. Venkata Krishna,et al. Adaptive link-state routing and intrusion detection in wireless mesh networks , 2010, IET Inf. Secur..