-
1
-
-
85052559348
-
-
CRC Boca Raton 10.1201/9781420055009
-
Ahson, S.; Ilyas, M. (2008). RFID handbook: Applications, technology, security, and privacy. Boca Raton: CRC.
-
(2008)
RFID Handbook: Applications, Technology, Security, and Privacy
-
-
Ahson, S.1
Ilyas, M.2
-
3
-
-
33846201992
-
-
HP Laboratories Bristol 2003. Available at
-
Aickelin, U.; Bentley, P.; Cayzer, S.; Kim, J.; McLeod, J. (2003). Danger theory: The link between AIS and IDS. Report LPL-2003-138, HP Laboratories Bristol 2003. Available at www.hpl.hp.com/techreports/2003/HPL-2003-138.pdf.
-
(2003)
Danger Theory: The Link between AIS and IDS. Report LPL-2003-138
-
-
Aickelin, U.1
Bentley, P.2
Cayzer, S.3
Kim, J.4
McLeod, J.5
-
4
-
-
84979828637
-
Roadmap to solving security and privacy concerns in RFID systems
-
DOI 10.1016/j.clsr.2007.09.005, PII S026736490700091X
-
J Ayoade 2007 Privacy and RFID systems: Roadmap to solving security and privacy concerns in RFID systems Comput (Pubitemid 350026134)
-
(2007)
Computer Law and Security Report
, vol.23
, Issue.6
, pp. 555-561
-
-
Ayoade, J.1
-
11
-
-
79951556997
-
Double-signal based immune intrusion detection model inspired by danger theory
-
2530474 (in Chinese)
-
H Fu X Li 2008 Double-signal based immune intrusion detection model inspired by danger theory Computer Engineering and Applications 44 14 113 117 2530474 (in Chinese)
-
(2008)
Computer Engineering and Applications
, vol.44
, Issue.14
, pp. 113-117
-
-
Fu, H.1
Li, X.2
-
12
-
-
66349123017
-
Intrusion detection model for RFID system based on immune network
-
1181.68025 10.3724/SP.J.1087.2008.02481 (in Chinese)
-
J Guo H Yang F Deng 2008 Intrusion detection model for RFID system based on immune network Journal of Computer Applications 28 10 2481 2484 1181.68025 10.3724/SP.J.1087.2008.02481 (in Chinese)
-
(2008)
Journal of Computer Applications
, vol.28
, Issue.10
, pp. 2481-2484
-
-
Guo, J.1
Yang, H.2
Deng, F.3
-
13
-
-
32444433467
-
-
Department of Computer Science, University of New Mexico. Available at
-
Hofmeyr, S. (2000). An interpretative introduction to the immune system. Department of Computer Science, University of New Mexico. Available at http://www.cs.unm.edu/~steveah/imm-overview-new.pdf.
-
(2000)
An Interpretative Introduction to the Immune System
-
-
Hofmeyr, S.1
-
14
-
-
0034546374
-
Architecture for an artificial immune system
-
10.1162/106365600568257
-
S Hofmeyr S Forrest 2000 Architecture for an artificial immune system Evolutionary Computation 8 4 443 473 10.1162/106365600568257
-
(2000)
Evolutionary Computation
, vol.8
, Issue.4
, pp. 443-473
-
-
Hofmeyr, S.1
Forrest, S.2
-
15
-
-
79951553068
-
Worm containment model based on negative selection
-
(in Chinese)
-
Z Hong L Wu Y Wang 2008 Worm containment model based on negative selection Computer Engineering 34 7 126 128 (in Chinese)
-
(2008)
Computer Engineering
, vol.34
, Issue.7
, pp. 126-128
-
-
Hong, Z.1
Wu, L.2
Wang, Y.3
-
16
-
-
33144457479
-
RFID security and privacy: A research survey
-
DOI 10.1109/JSAC.2005.861395
-
A Juels 2006 RFID security and privacy: A research survey IEEE Journal on Selected Areas in Communications 24 2 381 395 10.1109/JSAC.2005.861395 2197471 (Pubitemid 43269757)
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 381-394
-
-
Juels, A.1
-
17
-
-
5144229744
-
A novel clustering method with network structure based on clonal algorithm
-
(in Chinese)
-
J Li X Gao L Jiao 2004 A novel clustering method with network structure based on clonal algorithm ACTA Electronica Sinica 32 7 1195 1199 (in Chinese)
-
(2004)
ACTA Electronica Sinica
, vol.32
, Issue.7
, pp. 1195-1199
-
-
Li, J.1
Gao, X.2
Jiao, L.3
-
18
-
-
0027609384
-
Survey of intrusion detection techniques
-
DOI 10.1016/0167-4048(93)90029-5
-
T Lunt 1993 A survey of intrusion detection techniques Computers Security 12 1 405 418 10.1016/0167-4048(93)90029-5 (Pubitemid 23707839)
-
(1993)
Computers and Security
, vol.12
, Issue.4
, pp. 405-418
-
-
Lunt Teresa, F.1
-
19
-
-
0028201732
-
Tolerance, danger and the extended family
-
P Matzinger 1994 Tolerance, danger and the extended family Annual Review of Immunology 12 991 1045
-
(1994)
Annual Review of Immunology
, vol.12
, pp. 991-1045
-
-
Matzinger, P.1
-
22
-
-
0003602325
-
-
MIT Laboratory for Computer Science and RSA Data Security, Inc. Available at
-
Rivest, R. (1992). The MD5 message-digest algorithm. MIT Laboratory for Computer Science and RSA Data Security, Inc. Available at http://www.ietf.org/ rfc/rfc1321.txt.
-
(1992)
The MD5 Message-digest Algorithm
-
-
Rivest, R.1
-
23
-
-
42549157259
-
A framework for assessing RFID system security and privacy risks
-
DOI 10.1109/MPRV.2008.22, 4487091
-
P Rotter 2008 A framework for assessing RFID system security and privacy risks IEEE Pervasive Computing 7 2 70 77 10.1109/MPRV.2008.22 (Pubitemid 351575124)
-
(2008)
IEEE Pervasive Computing
, vol.7
, Issue.2
, pp. 70-77
-
-
Rotter, P.1
-
28
-
-
79951549933
-
Research and design of adaptive intrusion prevention system for co-stimulated by danger signals
-
(in Chinese)
-
H Xu C Xu X Cheng Z Peng 2009 Research and design of adaptive intrusion prevention system for co-stimulated by danger signals Computer Engineering 35 2 172 174 (in Chinese)
-
(2009)
Computer Engineering
, vol.35
, Issue.2
, pp. 172-174
-
-
Xu, H.1
Xu, C.2
Cheng, X.3
Peng, Z.4
-
29
-
-
78249266826
-
Negative-selection algorithm of mutation search in self space to train detector
-
(in Chinese)
-
Q Zhang Y Qian B Xu T Gao K Xie 2007 Negative-selection algorithm of mutation search in self space to train detector Journal of Computer Applications 27 3 627 629 (in Chinese)
-
(2007)
Journal of Computer Applications
, vol.27
, Issue.3
, pp. 627-629
-
-
Zhang, Q.1
Qian, Y.2
Xu, B.3
Gao, T.4
Xie, K.5
|