-
1
-
-
45249083605
-
Anonymous networking amidst eavesdroppers
-
Jun.
-
P. Venkitasubramaniam, T. He, and L. Tong, "Anonymous networking amidst eavesdroppers," IEEE Trans. Inform. Theory, vol. 54, no. 6, pp. 2770-2784, Jun. 2008.
-
(2008)
IEEE Trans. Inform. Theory
, vol.54
, Issue.6
, pp. 2770-2784
-
-
Venkitasubramaniam, P.1
He, T.2
Tong, L.3
-
2
-
-
49549085794
-
Detection of information flows
-
Nov.
-
T. He and L. Tong, "Detection of information flows," IEEE Trans. Inform. Theory, vol. 54, no. 11, pp. 4925-4945, Nov. 2008.
-
(2008)
IEEE Trans. Inform. Theory
, vol.54
, Issue.11
, pp. 4925-4945
-
-
He, T.1
Tong, L.2
-
3
-
-
0019532104
-
Untraceable electronic mail, return addresses and digital pseudonyms
-
Feb.
-
D. Chaum, "Untraceable electronic mail, return addresses and digital pseudonyms," Communications of the ACM, vol. 24, no. 2, pp. 84-88, Feb. 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
5
-
-
84958977733
-
Multiscale stepping-stone detection: Detecting pairs of jittered interactive streams by exploiting maximum tolerable delay
-
D. Donoho, A. Flesia, U. Shankar, V. Paxson, J. Coit, and S. Staniford, "Multiscale stepping-stone detection: Detecting pairs of jittered interactive streams by exploiting maximum tolerable delay," in Proc. 5th Int. Symp. Recent Adv. Intrusion Detection, Lecture Notes Comput. Sci. 2516, 2002, pp. 17-35.
-
(2002)
Proc. 5th Int. Symp. Recent Adv. Intrusion Detection, Lecture Notes Comput. Sci
, vol.2516
, pp. 17-35
-
-
Donoho, D.1
Flesia, A.2
Shankar, U.3
Paxson, V.4
Coit, J.5
Staniford, S.6
-
6
-
-
34548321774
-
Detecting wormhole attacks in wireless networks using connectivity information
-
Anchorage, Alaska, May, 6-12
-
R. Maheshwari, J. Gao, and S. R. Das, "Detecting wormhole attacks in wireless networks using connectivity information," in Proc. of the 26th IEEE International Conference on Computer Communications, Anchorage, Alaska, May, 6-12 2007, pp. 107-115.
-
(2007)
Proc. of the 26th IEEE International Conference on Computer Communications
, pp. 107-115
-
-
Maheshwari, R.1
Gao, J.2
Das, S.R.3
-
7
-
-
33745802064
-
Detection of interactive stepping stones: Algorithms and confidence bounds
-
Sophia Antipolis, French Riviera, France, Sep.
-
A. Blum, D. Song, and S. Venkataraman, "Detection of interactive stepping stones: Algorithms and confidence bounds," in Proc. of the Conference of Recent Advances in Intrusion Detection, Sophia Antipolis, French Riviera, France, Sep. 2004, pp. 39-49.
-
(2004)
Proc. of the Conference of Recent Advances in Intrusion Detection
, pp. 39-49
-
-
Blum, A.1
Song, D.2
Venkataraman, S.3
-
9
-
-
0003778293
-
-
2nd ed. New York: John Wiley & Sons, Inc.
-
S. Ross, Stochastic Processes, 2nd ed. New York: John Wiley & Sons, Inc., 1996.
-
(1996)
Stochastic Processes
-
-
Ross, S.1
-
10
-
-
85057356998
-
-
2nd ed. Boca Raton, Florida, USA: Chapman & Hall/CRC Press, Feb.
-
A. D. Polyanin and A. V. Manzhirov, Handbook of integral equations, 2nd ed. Boca Raton, Florida, USA: Chapman & Hall/CRC Press, Feb. 2008.
-
(2008)
Handbook of Integral Equations
-
-
Polyanin, A.D.1
Manzhirov, A.V.2
-
13
-
-
0010014049
-
A sufficient condition for Lorenz ordering
-
B. Wilfling, "A sufficient condition for Lorenz ordering," The Indian Journal of Statistics, vol. 58, pp. 62-69, 1996.
-
(1996)
The Indian Journal of Statistics
, vol.58
, pp. 62-69
-
-
Wilfling, B.1
-
14
-
-
0029323403
-
Wide-area traffic: The failure of Poisson modeling
-
Jun.
-
V. Paxson and S. Floyd, "Wide-area traffic: The failure of Poisson modeling," IEEE/ACM Trans. Networking, vol. 3, pp. 226-244, Jun. 1995.
-
(1995)
IEEE/ACM Trans. Networking
, vol.3
, pp. 226-244
-
-
Paxson, V.1
Floyd, S.2
-
15
-
-
84873934451
-
The embedding capacity of information flows under renewal traffic
-
arXiv:1103.2431v2, submitted to
-
S. Marano, V. Matta, T. He and L. Tong, "The Embedding Capacity of Information Flows Under Renewal Traffic," arXiv:1103.2431v2, submitted to IEEE Trans. Inform. Theory.
-
IEEE Trans. Inform. Theory
-
-
Marano, S.1
Matta, V.2
He, T.3
Tong, L.4
|