An Implementation Scheme of Flow-Net and Its Applications on Detecting Attacks in Wireless Networks
暂无分享,去创建一个
[1] Geoffrey Smith,et al. Secure information flow in a multi-threaded imperative language , 1998, POPL '98.
[2] Deirdre K. Mulligan,et al. Implementing Copyright Limitations in Rights Expression Languages , 2002, Digital Rights Management Workshop.
[3] Arnold L. Rosenberg. Accountable Web-computing , 2002, Proceedings 16th International Parallel and Distributed Processing Symposium.
[4] Yang Xiao,et al. Implementation and evaluation of accountability using flow-net in wireless networks , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.
[5] Daisuke Takahashi,et al. IEEE 802.11 user fingerprinting and its applications for intrusion detection , 2010, Comput. Math. Appl..
[6] Andrew W. Appel,et al. SAFKASI: a security mechanism for language-based systems , 2000, TSEM.
[7] Yang Xiao. Flow-net methodology for accountability in wireless networks , 2009, IEEE Network.
[8] J. Morse,et al. Verification Strategies for Establishing Reliability and Validity in Qualitative Research , 2002 .
[9] Rajashekar Kailar,et al. Accountability in Electronic Commerce Protocols , 1996, IEEE Trans. Software Eng..
[10] Paul Helman,et al. Statistical Foundations of Audit Trail Analysis for the Detection of Computer Misuse , 1993, IEEE Trans. Software Eng..
[11] Renato J. O. Figueiredo,et al. Fine-grain access control for securing shared resources in computational grids , 2002, Proceedings 16th International Parallel and Distributed Processing Symposium.
[12] Pamela Samuelson,et al. DRM {and, or, vs.} the law , 2003, CACM.
[13] Pamela Samuelson. Digital Rights Management {and, or, vs.} the Law , 2003 .
[14] Supakorn Kungpisdan,et al. Practical Reasoning about Accountability in Electronic Commerce Protocols , 2001, ICISC.