Mobile-Based DoS Attack Security Agent in Sensor Networking
暂无分享,去创建一个
[1] Theodore Y. Ts'o,et al. Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.
[2] Bennet S. Yee. A Sanctuary for Mobile Agents , 2001, Secure Internet Programming.
[3] Torsten Grust,et al. Multi-tenant databases for software as a service: schema-mapping techniques , 2008, SIGMOD Conference.
[4] H. Lipson. Tracking and Tracing Cyber-Attacks: Technical Challenges and Global Policy Issues , 2002 .
[5] Информатика. Advanced Intrusion Detection Environment , 2010 .
[6] Won Kim,et al. Cloud Computing: Today and Tomorrow , 2009, J. Object Technol..
[7] Eugene H. Spafford,et al. The design and implementation of tripwire: a file system integrity checker , 1994, CCS '94.
[8] Idit Keidar,et al. Trusting the cloud , 2009, SIGA.
[9] Deborah Estrin,et al. The impact of data aggregation in wireless sensor networks , 2002, Proceedings 22nd International Conference on Distributed Computing Systems Workshops.
[10] William M. Farmer,et al. Security for Mobile Agents: Issues and Requirements , 1996 .
[11] Holger Peine,et al. The Architecture of the Ara Platform for Mobile Agents , 1999, Mobile Agents.
[12] Katarina Stanoevska-Slabeva,et al. Grid and Cloud Computing, A Business Perspective on Technology and Applications , 2009, Grid and Cloud Computing.
[13] Rajkumar Buyya,et al. Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .
[14] Frank Siebenlist. Challenges and opportunities for virtualized security in the clouds , 2009, SACMAT '09.