-
1
-
-
84897689745
-
-
Namos, http://robotics.usc.edu/namos, 2011.
-
(2011)
Namos
-
-
-
4
-
-
38049087058
-
-
technical report, Dartmouth College
-
V. Berk, A. Giani, and G. Cybenko, "Detection of Covert Channel Encoding in Network Packet Delays," technical report, Dartmouth College, 2005.
-
(2005)
Detection of Covert Channel Encoding in Network Packet Delays
-
-
Berk, V.1
Giani, A.2
Cybenko, G.3
-
6
-
-
77954474711
-
Self-identifying sensor data
-
S. Chong, C. Skalka, and J.A. Vaughan, "Self-Identifying Sensor Data," Proc. Information Processing in Sensor Networks (IPSN), pp. 82-93, 2010.
-
(2010)
Proc. Information Processing in Sensor Networks (IPSN)
, pp. 82-93
-
-
Chong, S.1
Skalka, C.2
Vaughan, J.A.3
-
8
-
-
54449096880
-
An approach to evaluate data trustworthiness based on data provenance
-
C. Dai, D. Lin, E. Bertino, and M. Kantarcioglu, "An Approach to Evaluate Data Trustworthiness Based on Data Provenance," Proc. Fifth VLDB Workshop Secure Data Management (SDM), pp. 82-98, 2008.
-
(2008)
Proc. Fifth VLDB Workshop Secure Data Management (SDM)
, pp. 82-98
-
-
Dai, C.1
Lin, D.2
Bertino, E.3
Kantarcioglu, M.4
-
11
-
-
84948706138
-
Chimera: A virtual data system for representing, querying, and automating data derivation
-
I. Foster, J. Vockler, M. Wilde, and Y. Zhao, "Chimera: A Virtual Data System for Representing, Querying, and Automating Data Derivation," Proc. Conf. Scientific and Statistical Database Management, pp. 37-46, 2002.
-
(2002)
Proc. Conf. Scientific and Statistical Database Management
, pp. 37-46
-
-
Foster, I.1
Vockler, J.2
Wilde, M.3
Zhao, Y.4
-
12
-
-
85062006160
-
The case of the fake picasso: Preventing history forgery with secure provenance
-
R. Hasan, R. Sion, and M. Winslett, "The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance," Proc. Conf. File and Storage Technologies (FAST), pp. 1-14, 2009.
-
(2009)
Proc. Conf. File and Storage Technologies (FAST)
, pp. 1-14
-
-
Hasan, R.1
Sion, R.2
Winslett, M.3
-
13
-
-
0033877788
-
Energy-efficient communication protocol for wireless microsensor networks
-
W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, "Energy- Efficient Communication Protocol for Wireless Microsensor Networks," Proc. Ann. Hawaii Int'l Conf. System Sciences, pp. 3005-3014, 2000.
-
(2000)
Proc. Ann. Hawaii Int'l Conf. System Sciences
, pp. 3005-3014
-
-
Heinzelman, W.1
Chandrakasan, A.2
Balakrishnan, H.3
-
14
-
-
70349207215
-
Multi-flow attack resistant watermarks for network flows
-
A. Houmansadr, N. Kiyavash, and N. Borisov, "Multi-Flow Attack Resistant Watermarks for Network Flows," Proc. IEEE Int'l Conf. Acoustics, Speech and Signal Processing, pp. 1497-1500, 2009.
-
(2009)
Proc. IEEE Int'l Conf. Acoustics, Speech and Signal Processing
, pp. 1497-1500
-
-
Houmansadr, A.1
Kiyavash, N.2
Borisov, N.3
-
16
-
-
26444574670
-
Tinysec: A link layer security architecture for wireless sensor networks
-
C. Karlof, N. Sastry, and D. Wagner, "Tinysec: A Link Layer Security Architecture for Wireless Sensor Networks," Proc. Int'l Conf. Embedded Networked Sensor Systems, pp. 162-175, 2000
-
(2000)
Proc. Int'l Conf. Embedded Networked Sensor Systems
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
17
-
-
80052167664
-
Multi-flow attacks against network flow watermarking schemes
-
N. Kiyavash, A. Houmansadr, and N. Borisov, "Multi-Flow Attacks against Network Flow Watermarking Schemes," Proc. USENIX Conf. Security Symp., pp. 307-320, 2008.
-
(2008)
Proc. USENIX Conf. Security Symp.
, pp. 307-320
-
-
Kiyavash, N.1
Houmansadr, A.2
Borisov, N.3
-
18
-
-
78149345705
-
Provenance-based trustworthiness assessment in sensor networks
-
H. Lim, Y. Moon, and E. Bertino, "Provenance-Based Trustworthiness Assessment in Sensor Networks," Proc. Workshop Data Management for Sensor Networks, pp. 2-7, 2010.
-
(2010)
Proc. Workshop Data Management for Sensor Networks
, pp. 2-7
-
-
Lim, H.1
Moon, Y.2
Bertino, E.3
-
19
-
-
78049368157
-
On the secrecy of spread-spectrum flow watermarks
-
X. Luo, J. Zhang, R. Perdisci, and W. Lee, "On the Secrecy of Spread-Spectrum Flow Watermarks," Proc. European Conf. Research in Computer Security (ESORICS), pp. 232-248, 2010.
-
(2010)
Proc. European Conf. Research in Computer Security (ESORICS)
, pp. 232-248
-
-
Luo, X.1
Zhang, J.2
Perdisci, R.3
Lee, W.4
-
20
-
-
85076227002
-
Provenance-aware storage systems
-
K.-K. Muniswamy-Reddy, D. Holland, U. Braun, and M. Seltzer, "Provenance-Aware Storage Systems," Proc. USENIX Ann. Technical Conf., p. 4, 2006.
-
(2006)
Proc. USENIX Ann. Technical Conf.
, pp. 4
-
-
Muniswamy-Reddy, K.-K.1
Holland, D.2
Braun, U.3
Seltzer, M.4
-
22
-
-
33751040560
-
On the secrecy of timing-based active watermarking trace-back techniques
-
P. Peng, P. Ning, and D.S. Reeves, "On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques," Proc. IEEE Symp. Security and Privacy (SP), pp. 334-349, 2006.
-
(2006)
Proc. IEEE Symp. Security and Privacy (SP)
, pp. 334-349
-
-
Peng, P.1
Ning, P.2
Reeves, D.S.3
-
23
-
-
0036738266
-
Spins: Security protocols for sensor networks
-
Sept.
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. Tygar, "Spins: Security Protocols for Sensor Networks," Wireless Networks, vol. 8, pp. 521-534, Sept. 2002.
-
(2002)
Wireless Networks
, vol.8
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.5
-
25
-
-
31444456909
-
A survey of data provenance in e-science
-
DOI 10.1145/1084805.1084812
-
Y.L. Simmhan, B. Plale, and D. Gannon, "A Survey of Data Provenance in E-Science," SIGMOD Record, vol. 34, pp. 31-36, 2005. (Pubitemid 43152529)
-
(2005)
SIGMOD Record
, vol.34
, Issue.3
, pp. 31-36
-
-
Simmhan, Y.L.1
Plale, B.2
Gannon, D.3
-
26
-
-
77958511723
-
Preserving integrity and confidentiality of a directed acyclic graph model of provenance
-
A. Syalim, T. Nishide, and K. Sakurai, "Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance," Proc. Working Conf. Data and Applications Security and Privacy, pp. 311-318, 2010.
-
(2010)
Proc. Working Conf. Data and Applications Security and Privacy
, pp. 311-318
-
-
Syalim, A.1
Nishide, T.2
Sakurai, K.3
-
27
-
-
33750047467
-
Towards low overhead provenance tracking in near real-time stream filtering
-
Provenance and Annotation of Data - International Provenance and Annotation Workshop, IPAW 2006, Revised Selected Papers
-
N. Vijayakumar and B. Plale, "Towards Low Overhead Provenance Tracking in Near Real-Time Stream Filtering," Provenance and Annotation of Data, vol. 4145, pp. 46-54, 2006. (Pubitemid 44577306)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4145
, pp. 46-54
-
-
Vijayakumar, N.N.1
Plale, B.2
-
28
-
-
34548762543
-
Network flow watermarking attack on low-latency anonymous communication systems
-
DOI 10.1109/SP.2007.30, 4223219, Proceedings - S and P 2007: 2007 IEEE Symposium on Security and Privacy, SP'07
-
X. Wang, S. Chen, and S. Jajodia, "Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems," Proc. IEEE Symp. Security and Privacy (SP), pp. 116-130, 2007. (Pubitemid 47432521)
-
(2007)
Proceedings - IEEE Symposium on Security and Privacy
, pp. 116-130
-
-
Wang, X.1
Chen, S.2
Jajodia, S.3
-
30
-
-
2442556704
-
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
-
Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
-
X. Wang and D.S. Reeves, "Robust Correlation of Encrypted Attack Traffic Through Stepping Stones by Manipulation of Interpacket Delays," Proc. ACM Conf. Computer and Comm. Security (CCS), pp. 20-29, 2003. (Pubitemid 40673785)
-
(2003)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 20-29
-
-
Wang, X.1
Reeves, D.S.2
|