메뉴 건너뛰기




Volumn 23, Issue 5, 2009, Pages 30-37

Flow-net methodology for accountability in wireless networks

Author keywords

Buildings; Computers; Image resolution; Layout; Routing; Software; Three dimensional displays

Indexed keywords

LAYOUT; LOG FILE; MEDIA ACCESS CONTROL; NETWORK INFRASTRUCTURE; NOVEL METHODOLOGY; PHISHING ATTACKS; ROUTING; ROUTING LAYERS; SOFTWARE; THREE DIMENSIONAL DISPLAYS; TRAFFIC DATA COLLECTION;

EID: 70350060199     PISSN: 08908044     EISSN: None     Source Type: Journal    
DOI: 10.1109/MNET.2009.5274919     Document Type: Article
Times cited : (55)

References (15)
  • 1
    • 33746368048 scopus 로고    scopus 로고
    • Enhancing Security using Mobility-Based Anomaly Detection in Cellular Mobile Networks
    • July
    • B. Sun et al., "Enhancing Security using Mobility-Based Anomaly Detection in Cellular Mobile Networks," IEEE Trans. Vehic. Tech., vol. 55, no. 4, July 2006, pp.1385-96.
    • (2006) IEEE Trans. Vehic. Tech , vol.55 , Issue.4 , pp. 1385-1396
    • Sun, B.1
  • 2
    • 33745689203 scopus 로고    scopus 로고
    • Accountability in Electronic Commerce Protocols
    • May
    • R. Kailar, "Accountability in Electronic Commerce Protocols," IEEE Trans. Software Engineering, vol. 22, no. 5, May 1996, pp. 313-28.
    • (1996) IEEE Trans. Software Engineering , vol.22 , Issue.5 , pp. 313-328
    • Kailar, R.1
  • 3
    • 23044534113 scopus 로고    scopus 로고
    • Practical Reasoning about Accountability in Electronic Commerce Protocols
    • Dec. 6-7
    • S. Kungpisdan and Y. Permpoontanalarp, "Practical Reasoning about Accountability in Electronic Commerce Protocols," Proc. 4th ICISC '01, vol. 2288, Dec. 6-7, 2001, pp. 268-84.
    • (2001) Proc. 4th ICISC '01 , vol.2288 , pp. 268-284
    • Kungpisdan, S.1    Permpoontanalarp, Y.2
  • 5
    • 79551623723 scopus 로고    scopus 로고
    • Fine-Grain Access Control for Securing Shared Resources in Computational Grids
    • A.R. Butt et al., "Fine-Grain Access Control for Securing Shared Resources in Computational Grids," Proc. IPDPS.
    • Proc. IPDPS
    • Butt, A.R.1
  • 7
    • 0039334688 scopus 로고    scopus 로고
    • The Security Architecture Formerly Known as Stack Inspection: A Security Mechanism for Language-Based Systems
    • Oct
    • D. S. Wallach, A. W. Appel, and E. W. Felten, "The Security Architecture Formerly Known as Stack Inspection: A Security Mechanism for Language-Based Systems," ACM Trans. Software Eng. and Methodology, vol. 9, no. 4, Oct. 2000, pp. 341-78.
    • (2000) ACM Trans. Software Eng. and Methodology , vol.9 , Issue.4 , pp. 341-378
    • Wallach, D.S.1    Appel, A.W.2    Felten, E.W.3
  • 8
    • 35248853729 scopus 로고    scopus 로고
    • Implementing Copyright Limitations in Rights Expression Languages
    • Washington, DC, Nov. 18
    • D. K. Mulligan and A. Burstein, "Implementing Copyright Limitations in Rights Expression Languages," 2002 ACM Wksp. Digital Rights Mgmt. Washington, DC, Nov. 18, 2002.
    • (2002) 2002 ACM Wksp. Digital Rights Mgmt
    • Mulligan, D.K.1    Burstein, A.2
  • 9
    • 1942433797 scopus 로고    scopus 로고
    • Digital Rights Management {and, or, vs.} the Law
    • Apr
    • P. Samuelson, "Digital Rights Management {and, or, vs.} the Law," Commun. ACM, vol. 46, no. 4, Apr. 2003, pp. 41-45.
    • (2003) Commun. ACM , vol.46 , Issue.4 , pp. 41-45
    • Samuelson, P.1
  • 10
    • 0027668428 scopus 로고
    • Statistical Foundations of Audit Trail Analysis for the Detection of Computer Misuse
    • Sept
    • P. Helman and G. Liepins, "Statistical Foundations of Audit Trail Analysis for the Detection of Computer Misuse," IEEE Trans. Software Eng., vol. 19, no. 9, Sept., 1993, pp. 886-901.
    • (1993) IEEE Trans. Software Eng , vol.19 , Issue.9 , pp. 886-901
    • Helman, P.1    Liepins, G.2
  • 11
    • 0003346599 scopus 로고    scopus 로고
    • Verification Strategies for Establishing Reliability and Validity in Qualitative Research
    • J. M. Morse et al., "Verification Strategies for Establishing Reliability and Validity in Qualitative Research," Int'l. J. Qualitative Methods, vol. 1, no. 2, 2002.
    • (2002) Int'l. J. Qualitative Methods , vol.1 , Issue.2
    • Morse, J.M.1
  • 12
    • 42649088128 scopus 로고    scopus 로고
    • Accountability for Wireless LANs, Ad Hoc Networks, and Wireless Mesh Networks
    • Apr
    • Y. Xiao, "Accountability for Wireless LANs, Ad Hoc Networks, and Wireless Mesh Networks," IEEE Commun. Mag., vol. 46, no. 4, Apr. 2008, pp. 116-26.
    • (2008) IEEE Commun. Mag , vol.46 , Issue.4 , pp. 116-126
    • Xiao, Y.1
  • 13
    • 70350055283 scopus 로고    scopus 로고
    • Accountability Using Flow-Net: Design, Implementation, and Performance Evaluation
    • to be submitted for publication
    • Y. Xiao, D. Takahashi, and K. Meng, "Accountability Using Flow-Net: Design, Implementation, and Performance Evaluation," to be submitted for publication.
    • Xiao, Y.1    Takahashi, D.2    Meng, K.3
  • 14
    • 70350068836 scopus 로고    scopus 로고
    • Retrieving Knowledge from Auditing Log-Files for Computer and Network Forensics and Accountability
    • Feb
    • D. Takahashi and Y. Xiao, "Retrieving Knowledge from Auditing Log-Files for Computer and Network Forensics and Accountability," Security and Commun. Net., vol. 1, no. 2, Feb. 2008, pp. 147-60.
    • (2008) Security and Commun. Net , vol.1 , Issue.2 , pp. 147-160
    • Takahashi, D.1    Xiao, Y.2
  • 15
    • 70350074710 scopus 로고    scopus 로고
    • Building a Wireless Capturing Tool for WiFi
    • and Commun. Net, to appear
    • K. Meng, Y. Xiao, and S. V. Vrbsky, "Building a Wireless Capturing Tool for WiFi," to appear, Security and Commun. Net.
    • Security
    • Meng, K.1    Xiao, Y.2    Vrbsky, S.V.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.