Distributed Detection of Information Flows in Chaff
暂无分享,去创建一个
[1] Bruce Schneier,et al. Practical cryptography , 2003 .
[2] Shun-ichi Amari,et al. Statistical Inference Under Multiterminal Data Compression , 1998, IEEE Trans. Inf. Theory.
[3] Sergio Verdu,et al. The exponential distribution in information theory , 1996 .
[4] Vern Paxson,et al. Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay , 2002, RAID.
[5] Izhak Rubin,et al. Information rates and data-compression schemes for Poisson processes , 1974, IEEE Trans. Inf. Theory.
[6] Dawn Xiaodong Song,et al. Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds , 2004, RAID.
[7] Lang Tong,et al. Detecting Information Flows: Improving Chaff Tolerance by Joint Detection , 2007, 2007 41st Annual Conference on Information Sciences and Systems.
[8] Peng Ning,et al. Active timing-based correlation of perturbed traffic flows with chaff packets , 2005, 25th IEEE International Conference on Distributed Computing Systems Workshops.
[9] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[10] Douglas S. Reeves,et al. Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays , 2003, CCS '03.
[11] Lang Tong,et al. Distributed Detection of Information Flows , 2008, IEEE Transactions on Information Forensics and Security.
[12] Yin Zhang,et al. Detecting Stepping Stones , 2000, USENIX Security Symposium.