-
3
-
-
53349091247
-
-
Internet Security News, http://www.landfield.com/isn/mail-archive/ 2001/Feb/0037.html.
-
Internet Security News
-
-
-
8
-
-
53349170967
-
-
CAIDA
-
CAIDA, Telescope Analysis, http://www.caida.org/analysis/security/ telescope.
-
Telescope Analysis
-
-
-
11
-
-
85081770459
-
The internet motion sensor: A distributed biackhole monitoring system
-
February
-
M. Bailey, E. Cooke, F. Jahanian, J. Nazario, and D. Watson, "The internet motion sensor: A distributed biackhole monitoring system," in Proceedings ofthe 12th Annual Network and Distributed System Security Symposium (NDSS), February 2005.
-
(2005)
Proceedings ofthe 12th Annual Network and Distributed System Security Symposium (NDSS)
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
Nazario, J.4
Watson, D.5
-
14
-
-
51349164941
-
iloc: An invisible localization attack to internet threat monitoring systems
-
April
-
X. Wang, W. Yu, X. Fu, D. Xuan, and W. Zhao, "iloc: An invisible localization attack to internet threat monitoring systems," in Proceedings of the 27th IEEE International Conference on Computer Communications (INFOCOM) (Mini-conference), April 2008.
-
(2008)
Proceedings of the 27th IEEE International Conference on Computer Communications (INFOCOM) (Mini-conference)
-
-
Wang, X.1
Yu, W.2
Fu, X.3
Xuan, D.4
Zhao, W.5
-
16
-
-
27544467640
-
Toward a framework for internet forensic analysis
-
November
-
V. Sekar, Y. Xie, D. Maltz, M. Reiter, and H. Zhang, "Toward a framework for internet forensic analysis," in Proceeding ofthe 3th Workshop on Hot Topics in Networks (HotNets), November 2004.
-
(2004)
Proceeding ofthe 3th Workshop on Hot Topics in Networks (HotNets)
-
-
Sekar, V.1
Xie, Y.2
Maltz, D.3
Reiter, M.4
Zhang, H.5
-
18
-
-
0020128340
-
Theory of spead-spectrum communication: Tutorial
-
R. K. Pickholtz, D. L. Schilling, and L. B. Milstein, "Theory of spead-spectrum communication: Tutorial," IEEE Transaction on Communication, vol. 30, no. 5, pp. 855-884, 1982.
-
(1982)
IEEE Transaction on Communication
, vol.30
, Issue.5
, pp. 855-884
-
-
Pickholtz, R.K.1
Schilling, D.L.2
Milstein, L.B.3
-
22
-
-
53349127064
-
On localization attacks to internet threat monitors: An informationtheoretic framework,
-
Technical Report, Department of Computer Science, Texas A&M University, January
-
Xinwen Fu Riccardo Bettati Wei Yu, Nan Zhang and Wei Zhao, "On localization attacks to internet threat monitors: An informationtheoretic framework," in Technical Report, Department of Computer Science, Texas A&M University, January 2008.
-
(2008)
-
-
Fu, X.1
Bettati, R.2
Yu, W.3
Zhang, N.4
Zhao, W.5
-
24
-
-
0032680807
-
Information hiding: Survey
-
July
-
F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, "Information hiding: Survey," Proc. IEEE (Special Issue on Identification and Protection of Multimedia Information, vol. 87, no. 0, pp. 1062-1078, July 1999.
-
(1999)
Proc. IEEE (Special Issue on Identification and Protection of Multimedia Information
, vol.87
, Issue.0
, pp. 1062-1078
-
-
Petitcolas, F.A.P.1
Anderson, R.J.2
Kuhn, M.G.3
-
25
-
-
0035767625
-
Communication and information theory in watermarking: A survey
-
November
-
A. Sequeira and D. Kundur, "Communication and information theory in watermarking: A survey," SPIE Multimedia Systems and Applications IV, vol. 4518, no. 3, pp. 216-227, November 2001.
-
(2001)
SPIE Multimedia Systems and Applications IV
, vol.4518
, Issue.3
, pp. 216-227
-
-
Sequeira, A.1
Kundur, D.2
|