메뉴 건너뛰기




Volumn , Issue , 2010, Pages 1818-1823

Notice of Retraction: Creating user-relationship-graph in use of flow-net and log files for computer and network accountability and forensics

Author keywords

Accountability; Flow net; Forensics; Social networks; User relationship graph

Indexed keywords

COMPUTER FORENSICS; MILITARY COMMUNICATIONS; SOCIAL NETWORKING (ONLINE);

EID: 79951598794     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MILCOM.2010.5679519     Document Type: TB
Times cited : (9)

References (59)
  • 1
    • 20444434710 scopus 로고    scopus 로고
    • How to search a social network
    • July
    • L. Adamic and E. Adar, "How to search a social network," Social Networks, 27(3):187-203, July 2005.
    • (2005) Social Networks , vol.27 , Issue.3 , pp. 187-203
    • Adamic, L.1    Adar, E.2
  • 3
    • 70350068836 scopus 로고    scopus 로고
    • Retrieving Knowledge from Auditing Log Files for Computer and Network Forensics and Accountability
    • (Wiley) Feb. 29
    • D. Takahashi and Y. Xiao, "Retrieving Knowledge from Auditing Log Files for Computer and Network Forensics and Accountability," (Wiley) Security and Communication Networks. Vol. 1. No. 2, pp. 147-160, Feb. 29, 2008.
    • (2008) Security and Communication Networks , vol.1 , Issue.2 , pp. 147-160
    • Takahashi, D.1    Xiao, Y.2
  • 4
    • 0042855693 scopus 로고    scopus 로고
    • An experimental study of search in global social networks
    • DOI 10.1126/science.1081058
    • P. S. Dodds, R. Muhamad and D. J. Watts, "An experimental study of search in global social networks," Science 301, 827-829, 2003. (Pubitemid 36962622)
    • (2003) Science , vol.301 , Issue.5634 , pp. 827-829
    • Dodds, P.S.1    Muhamad, R.2    Watts, D.J.3
  • 5
    • 0000622740 scopus 로고
    • Reverse small world experiment
    • P. Killworth and H. Bernard, "Reverse small world experiment," Social Networks 1, 159-192, 1978.
    • (1978) Social Networks , vol.1 , pp. 159-192
    • Killworth, P.1    Bernard, H.2
  • 6
    • 84938051815 scopus 로고
    • A pseudomodel of the small world problem
    • P. D. Killworth and H. R. Bernard, "A pseudomodel of the small world problem," Social Forces 58 (2), 477-505, 1979.
    • (1979) Social Forces , vol.58 , Issue.2 , pp. 477-505
    • Killworth, P.D.1    Bernard, H.R.2
  • 7
    • 84970354110 scopus 로고
    • Patterns of acquaintanceship in society and complex organization: A comparative study of the small world problem
    • C. C. Lunfberg, "Patterns of acquaintanceship in society and complex organization: a comparative study of the small world problem," Pacific Sociological Review 18, 206-222, 1975.
    • (1975) Pacific Sociological Review , vol.18 , pp. 206-222
    • Lunfberg, C.C.1
  • 8
    • 0002687371 scopus 로고
    • The small-world problem
    • S. Milgram, "The small-world problem" Psychology Today 1, 62-67, 1967.
    • (1967) Psychology Today , vol.1 , pp. 62-67
    • Milgram, S.1
  • 9
    • 0001504032 scopus 로고
    • An experimental study of the small world problem
    • J. Travers and S. Milgram, "An experimental study of the small world problem," Sociometry 32, 425-443, 1969.
    • (1969) Sociometry , vol.32 , pp. 425-443
    • Travers, J.1    Milgram, S.2
  • 10
    • 0037123661 scopus 로고    scopus 로고
    • Identity and search in social networks
    • D. J. Watts, P. S. Dodds and M. E. J. Newman, "Identity and search in social networks," Science 296, 1302-1305, 2002.
    • (2002) Science , vol.296 , pp. 1302-1305
    • Watts, D.J.1    Dodds, P.S.2    Newman, M.E.J.3
  • 11
    • 0003677229 scopus 로고    scopus 로고
    • rd Ed., Graduate Texts in Mathematics, Springer
    • rd Ed., Graduate Texts in Mathematics, Springer, 2006.
    • (2006) Graph Theory
    • Diestel, R.1
  • 13
    • 0343441557 scopus 로고    scopus 로고
    • Navigation in a small world
    • J. Kleinberg, "Navigation in a small world," Nature 406, 2000.
    • (2000) Nature , vol.406
    • Kleinberg, J.1
  • 17
    • 51249106649 scopus 로고    scopus 로고
    • Complexity Analysis of Retrieving Knowledge from Auditing Log Files for Computer and Network Forensics and Accountability
    • D. Takahashi and Y. Xiao, "Complexity Analysis of Retrieving Knowledge from Auditing Log Files for Computer and Network Forensics and Accountability," Proc. of IEEE ICC 2008, pp.1474-1478.
    • Proc. of IEEE ICC 2008 , pp. 1474-1478
    • Takahashi, D.1    Xiao, Y.2
  • 18
    • 70350060199 scopus 로고    scopus 로고
    • Flow-Net Methodology for Accountability in Wireless Networks
    • Sept./Oct.
    • Y. Xiao, "Flow-Net Methodology for Accountability in Wireless Networks," IEEE Network, Vol. 23, No. 5, Sept./Oct. 2009, pp. 30-37.
    • (2009) IEEE Network , vol.23 , Issue.5 , pp. 30-37
    • Xiao, Y.1
  • 19
    • 79951647755 scopus 로고    scopus 로고
    • Implementation and Evaluation of Accountability using Flow-net in Wireless Networks
    • Y. Xiao, K. Meng, and D. Takahashi, "Implementation and Evaluation of Accountability using Flow-net in Wireless Networks," Proc. of IEEE MILCOM 2010
    • Proc. of IEEE MILCOM 2010
    • Xiao, Y.1    Meng, K.2    Takahashi, D.3
  • 20
    • 85081509943 scopus 로고    scopus 로고
    • Web site
    • Web site: http://www.jgraph.com
  • 21
    • 85081500001 scopus 로고    scopus 로고
    • http://www.mysql.com/
  • 22
    • 85081526151 scopus 로고    scopus 로고
    • http://www.java.com
  • 23
    • 85081499070 scopus 로고    scopus 로고
    • http://www.mysql.com/products/connector/j/
  • 24
    • 70449842997 scopus 로고    scopus 로고
    • Using an edge-dual graph and k-connectivity to identify strong connections in social networks
    • L. Ding and B. Dixon, "Using an edge-dual graph and k-connectivity to identify strong connections in social networks," Proc. of the ACM 46th Annual Southeast Regional Conference, pp. 475-480, 2008.
    • (2008) Proc. of the ACM 46th Annual Southeast Regional Conference , pp. 475-480
    • Ding, L.1    Dixon, B.2
  • 25
    • 79551646596 scopus 로고    scopus 로고
    • An Implementation Scheme of Flow-Net and Its Applications on Detecting Attacks in Wireless Networks
    • B. Fu and Y. Xiao, "An Implementation Scheme of Flow-Net and Its Applications on Detecting Attacks in Wireless Networks," Proc. of IEEE GLOBECOM 2010
    • Proc. of IEEE GLOBECOM 2010
    • Fu, B.1    Xiao, Y.2
  • 30
    • 61849133288 scopus 로고    scopus 로고
    • Seeing-Is-Believing: Using camera phones for human-verifiable authentication
    • J. M. McCune, A. Perrig, and M. K. Reiter, "Seeing-Is-Believing: using camera phones for human-verifiable authentication," International Journal of Security and Networks, Vol. 4, Nos. 1/2, pp. 43-56, 2009.
    • (2009) International Journal of Security and Networks , vol.4 , Issue.1-2 , pp. 43-56
    • McCune, J.M.1    Perrig, A.2    Reiter, M.K.3
  • 33
    • 61849117271 scopus 로고    scopus 로고
    • Standards for security associations in personal networks: A comparative analysis
    • J. Suomalainen, J. Valkonen, and N. Asokan, "Standards for security associations in personal networks: a comparative analysis," International Journal of Security and Networks, Vol. 4, Nos. 1/2, pp. 87-100, 2009.
    • (2009) International Journal of Security and Networks , vol.4 , Issue.1-2 , pp. 87-100
    • Suomalainen, J.1    Valkonen, J.2    Asokan, N.3
  • 34
    • 61849158147 scopus 로고    scopus 로고
    • Designing user studies for security applications: A case study with wireless network configuration
    • C. Kuo, A. Perrig, and J. Walker, "Designing user studies for security applications: a case study with wireless network configuration," International Journal of Security and Networks, Vol. 409, Nos. 1/2, pp. 101-109, 2009.
    • (2009) International Journal of Security and Networks , vol.409 , Issue.1-2 , pp. 101-109
    • Kuo, C.1    Perrig, A.2    Walker, J.3
  • 35
    • 61849085156 scopus 로고    scopus 로고
    • An evaluation of connection characteristics for separating network attacks
    • R. Berthier and M. Cukier, "An evaluation of connection characteristics for separating network attacks," International Journal of Security and Networks, Vol. 4, Nos. 1/2, pp. 110-124, 2009.
    • (2009) International Journal of Security and Networks , vol.4 , Issue.1-2 , pp. 110-124
    • Berthier, R.1    Cukier, M.2
  • 36
    • 61849158146 scopus 로고    scopus 로고
    • An efficient group key management scheme for mobile ad hoc networks
    • B. Wu, J. Wu, and Y. Dong, "An efficient group key management scheme for mobile ad hoc networks," International Journal of Security and Networks, Vol. 4, Nos. 1/2, pp. 125-134, 2009.
    • (2009) International Journal of Security and Networks , vol.4 , Issue.1-2 , pp. 125-134
    • Wu, B.1    Wu, J.2    Dong, Y.3
  • 37
    • 68149168162 scopus 로고    scopus 로고
    • Deriving a closed-form expression for worm-scanning strategies
    • Z. Chen, C. Chen, and Y. Li, "Deriving a closed-form expression for worm-scanning strategies," International Journal of Security and Networks, Vol. 4, No.3, pp. 135-144, 2009.
    • (2009) International Journal of Security and Networks , vol.4 , Issue.3 , pp. 135-144
    • Chen, Z.1    Chen, C.2    Li, Y.3
  • 38
    • 68149158275 scopus 로고    scopus 로고
    • An efficient One-Time Password authentication scheme using a smart card
    • S. Lee and K. M. Sivalingam, "An efficient One-Time Password authentication scheme using a smart card," International Journal of Security and Networks, Vol. 4, No.3, pp. 145-152, 2009
    • (2009) International Journal of Security and Networks , vol.4 , Issue.3 , pp. 145-152
    • Lee, S.1    Sivalingam, K.M.2
  • 42
    • 68149180871 scopus 로고    scopus 로고
    • Intrusion Detection System for Denial-of-Service flooding attacks in SIP communication networks
    • S. Ehlert, Y. Rebahi, and T. Magedanz, "Intrusion Detection System for Denial-of-Service flooding attacks in SIP communication networks," International Journal of Security and Networks, Vol. 4, No.3, pp. 189-200, 2009.
    • (2009) International Journal of Security and Networks , vol.4 , Issue.3 , pp. 189-200
    • Ehlert, S.1    Rebahi, Y.2    Magedanz, T.3
  • 43
    • 70349969846 scopus 로고    scopus 로고
    • A Proactive Secret Sharing Scheme in matrix projection method
    • L. Bai and X. Zou, "A Proactive Secret Sharing Scheme in matrix projection method," International Journal of Security and Networks, Vol. 4, No.4, pp. 201-209, 2009.
    • (2009) International Journal of Security and Networks , vol.4 , Issue.4 , pp. 201-209
    • Bai, L.1    Zou, X.2
  • 45
    • 70349968221 scopus 로고    scopus 로고
    • Handling inheritance violation for secure interoperation of heterogeneous systems
    • H. Huang, H. Kirchner, S. Liu, and W. Wu, "Handling inheritance violation for secure interoperation of heterogeneous systems," International Journal of Security and Networks, Vol. 4, No.4, pp.223-233, 2009.
    • (2009) International Journal of Security and Networks , vol.4 , Issue.4 , pp. 223-233
    • Huang, H.1    Kirchner, H.2    Liu, S.3    Wu, W.4
  • 46
    • 70349949111 scopus 로고    scopus 로고
    • Visibility: A novel concept for characterising provable network digital evidences
    • Slim Rekhis, Noureddine A. Boudriga, "Visibility: a novel concept for characterising provable network digital evidences," International Journal of Security and Networks, Vol. 4, No.4, pp.234-245, 2009.
    • (2009) International Journal of Security and Networks , vol.4 , Issue.4 , pp. 234-245
    • Rekhis, S.1    Boudriga, N.A.2
  • 47
    • 70349950718 scopus 로고    scopus 로고
    • Black-hole-resistant ENADAIR-based routing protocol for Mobile Ad hoc Networks
    • D. Djenouri, M. Bouamama, and O. Mahmoudi, "Black-hole-resistant ENADAIR-based routing protocol for Mobile Ad hoc Networks," International Journal of Security and Networks, Vol. 4, No.4, pp. 246-262, 2009.
    • (2009) International Journal of Security and Networks , vol.4 , Issue.4 , pp. 246-262
    • Djenouri, D.1    Bouamama, M.2    Mahmoudi, O.3
  • 48
    • 70349968010 scopus 로고    scopus 로고
    • Attacks and countermeasures in multihop Cognitive Radio Networks
    • F. Hu, D. Dong, and Y. Xiao, "Attacks and countermeasures in multihop Cognitive Radio Networks," International Journal of Security and Networks, Vol. 4, No.4, pp. 263-271, 2009.
    • (2009) International Journal of Security and Networks , vol.4 , Issue.4 , pp. 263-271
    • Hu, F.1    Dong, D.2    Xiao, Y.3
  • 50
    • 77949837905 scopus 로고    scopus 로고
    • A backpressure technique for filtering spoofed traffic at upstream routers
    • DOI: 10.1504/IJSN.2010.030718
    • S. Malliga and A. Tamilarasi, "A backpressure technique for filtering spoofed traffic at upstream routers," International Journal of Security and Networks, Vol. 5, No.1 pp. 3-14, 2010, DOI: 10.1504/IJSN.2010. 030718
    • (2010) International Journal of Security and Networks , vol.5 , Issue.1 , pp. 3-14
    • Malliga, S.1    Tamilarasi, A.2
  • 51
    • 77949801623 scopus 로고    scopus 로고
    • Authentication and secret search mechanisms for RFID-aware wireless sensor networks
    • DOI: 10.1504/IJSN.2010.030719
    • S. Huang and S. Shieh, "Authentication and secret search mechanisms for RFID-aware wireless sensor networks," International Journal of Security and Networks, Vol. 5, No.1 pp. 15-25 , 2010, DOI: 10.1504/IJSN.2010.030719
    • (2010) International Journal of Security and Networks , vol.5 , Issue.1 , pp. 15-25
    • Huang, S.1    Shieh, S.2
  • 52
    • 77949844099 scopus 로고    scopus 로고
    • An efficient secure data dissemination scheme for grid structure Wireless Sensor Networks
    • DOI: 10.1504/IJSN.2010.030720
    • Y. Hsiao and R. Hwang, "An efficient secure data dissemination scheme for grid structure Wireless Sensor Networks," International Journal of Security and Networks, Vol. 5, No.1 pp. 26-34 , 2010, DOI: 10.1504/IJSN.2010.030720
    • (2010) International Journal of Security and Networks , vol.5 , Issue.1 , pp. 26-34
    • Hsiao, Y.1    Hwang, R.2
  • 53
    • 77949835881 scopus 로고    scopus 로고
    • Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks
    • DOI: 10.1504/IJSN.2010.030721
    • L. Xu, S. Chen, X. Huang, and Y. Mu, "Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks," International Journal of Security and Networks, Vol. 5, No.1 pp. 35-44, 2010, DOI: 10.1504/IJSN.2010.030721
    • (2010) International Journal of Security and Networks , vol.5 , Issue.1 , pp. 35-44
    • Xu, L.1    Chen, S.2    Huang, X.3    Mu, Y.4
  • 54
    • 77949817850 scopus 로고    scopus 로고
    • Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks
    • DOI: 10.1504/IJSN.2010.030722
    • K. Tsai, C. Hsu, and T. Wu, "Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks," International Journal of Security and Networks, Vol. 5, No.1 pp. 45-52, 2010, DOI: 10.1504/IJSN.2010.030722
    • (2010) International Journal of Security and Networks , vol.5 , Issue.1 , pp. 45-52
    • Tsai, K.1    Hsu, C.2    Wu, T.3
  • 55
    • 77949864345 scopus 로고    scopus 로고
    • Lightweight authentication protocol for mobile RFID networks
    • DOI: 10.1504/IJSN.2010.030723
    • M. Yang, "Lightweight authentication protocol for mobile RFID networks," International Journal of Security and Networks, Vol. 5, No.1 pp. 53-62, 2010, DOI: 10.1504/IJSN.2010.030723
    • (2010) International Journal of Security and Networks , vol.5 , Issue.1 , pp. 53-62
    • Yang, M.1
  • 56
    • 77949830969 scopus 로고    scopus 로고
    • A cross-layer authentication design for secure video transportation in wireless sensor network
    • DOI: 10.1504/IJSN.2010.030724
    • J. Wang and G.L. Smith, "A cross-layer authentication design for secure video transportation in wireless sensor network," International Journal of Security and Networks, Vol. 5, No.1 pp. 63-76, 2010, DOI: 10.1504/IJSN.2010.030724
    • (2010) International Journal of Security and Networks , vol.5 , Issue.1 , pp. 63-76
    • Wang, J.1    Smith, G.L.2
  • 57
    • 77949732329 scopus 로고    scopus 로고
    • Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security
    • DOI: 10.1504/IJSN.2010.032216
    • H. Guo, Y. Mu, X.Y. Zhang, and Z.J. Li, "Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security," International Journal of Security and Networks, Vol. 5, No.2/3 pp. 173-187, 2010, DOI: 10.1504/IJSN.2010.032216
    • (2010) International Journal of Security and Networks , vol.5 , Issue.2-3 , pp. 173-187
    • Guo, H.1    Mu, Y.2    Zhang, X.Y.3    Li, Z.J.4
  • 58
    • 77949752019 scopus 로고    scopus 로고
    • Security assessments of IEEE 802.15.4 standard based on X.805 framework
    • DOI: 10.1504/IJSN.2010.032217
    • A. O. Richard, A. Ahmad, and K. Kiseon, " Security assessments of IEEE 802.15.4 standard based on X.805 framework," International Journal of Security and Networks, Vol. 5, No.2/3 pp. 188-197, 2010, DOI: 10.1504/IJSN.2010.032217
    • (2010) International Journal of Security and Networks , vol.5 , Issue.2-3 , pp. 188-197
    • Richard, A.O.1    Ahmad, A.2    Kiseon, K.3
  • 59
    • 77949729303 scopus 로고    scopus 로고
    • Experimental analysis of application-level intrusion detection algorithms
    • DOI: 10.1504/IJSN.2010.032218
    • Y. Dong, S. Hsu, S. Rajput, and B. Wu, "Experimental analysis of application-level intrusion detection algorithms," International Journal of Security and Networks, Vol. 5, No.2/3 pp. 198-205, 2010, DOI: 10.1504/IJSN.2010.032218
    • (2010) International Journal of Security and Networks , vol.5 , Issue.2-3 , pp. 198-205
    • Dong, Y.1    Hsu, S.2    Rajput, S.3    Wu, B.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.