Distributed Detection of Information Flows
暂无分享,去创建一个
[1] Lang Tong,et al. A distributed scheme for detection of information flows , 2008, 2008 42nd Annual Conference on Information Sciences and Systems.
[2] Sally Floyd,et al. Wide area traffic: the failure of Poisson modeling , 1995, TNET.
[3] Rudolf Ahlswede,et al. Hypothesis testing with communication constraints , 1986, IEEE Trans. Inf. Theory.
[4] Bruce Schneier,et al. Practical cryptography , 2003 .
[5] Peng Ning,et al. Active timing-based correlation of perturbed traffic flows with chaff packets , 2005, 25th IEEE International Conference on Distributed Computing Systems Workshops.
[6] S. Varadhan,et al. Large deviations , 2019, Graduate Studies in Mathematics.
[7] Sally Floyd,et al. Wide-area traffic: the failure of Poisson modeling , 1994 .
[8] R. F.,et al. Mathematical Statistics , 1944, Nature.
[9] Dawn Xiaodong Song,et al. Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds , 2004, RAID.
[10] Vern Paxson,et al. Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay , 2002, RAID.
[11] Izhak Rubin,et al. Information rates and data-compression schemes for Poisson processes , 1974, IEEE Trans. Inf. Theory.
[12] T. He,et al. A Signal Processing Perspective to Stepping-stone Detection , 2006, 2006 40th Annual Conference on Information Sciences and Systems.
[13] Andre Lucas,et al. A Comparison of Parametric, Semi-nonparametric, Adaptive, and Nonparametric Cointegration Tests , 1998 .
[14] Shun-ichi Amari,et al. Statistical Inference Under Multiterminal Data Compression , 1998, IEEE Trans. Inf. Theory.
[15] Lang Tong,et al. Detecting Encrypted Stepping-Stone Connections , 2007, IEEE Transactions on Signal Processing.
[16] Yin Zhang,et al. Detecting Stepping Stones , 2000, USENIX Security Symposium.
[17] Lang Tong,et al. Detecting Information Flows: Improving Chaff Tolerance by Joint Detection , 2007, 2007 41st Annual Conference on Information Sciences and Systems.
[18] Lang Tong,et al. Detection of Information Flows , 2008, IEEE Transactions on Information Theory.
[19] Stuart Staniford-Chen,et al. Holding intruders accountable on the Internet , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.