A distributed scheme for detection of information flows
暂无分享,去创建一个
[1] Douglas S. Reeves,et al. Sleepy Watermark Tracing: An Active Network-Based Intrusion Response Framework , 2001, SEC.
[2] Dawn Xiaodong Song,et al. Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds , 2004, RAID.
[3] T. He,et al. A Signal Processing Perspective to Stepping-stone Detection , 2006, 2006 40th Annual Conference on Information Sciences and Systems.
[4] Stuart Staniford-Chen,et al. Holding intruders accountable on the Internet , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.
[5] Vern Paxson,et al. Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay , 2002, RAID.
[6] Izhak Rubin,et al. Information rates and data-compression schemes for Poisson processes , 1974, IEEE Trans. Inf. Theory.
[7] Yin Zhang,et al. Detecting Stepping Stones , 2000, USENIX Security Symposium.
[8] Lang Tong,et al. Distributed Detection of Information Flows in Chaff , 2007, 2007 IEEE International Symposium on Information Theory.
[9] Lang Tong,et al. Distributed Detection of Information Flows , 2008, IEEE Transactions on Information Forensics and Security.
[10] Lang Tong,et al. Detection of Information Flows , 2008, IEEE Transactions on Information Theory.
[11] Lang Tong,et al. Detecting Information Flows: Improving Chaff Tolerance by Joint Detection , 2007, 2007 41st Annual Conference on Information Sciences and Systems.
[12] Bruce Schneier,et al. Practical cryptography , 2003 .