-
2
-
-
70350068836
-
-
Wiley) Security and Communication Networks. No. 2, Feb. 29
-
Takahashi D, Xiao Y. Retrieving knowledge from auditing log files for computer and network forensics and accountability, Vol. 1, (Wiley) Security and Communication Networks. No. 2, Feb. 29, 2008; 147-160.
-
(2008)
Retrieving knowledge from auditing log files for computer and network forensics and accountability
, vol.1
, pp. 147-160
-
-
Takahashi, D.1
Xiao, Y.2
-
3
-
-
20444434710
-
How to search a social network
-
Adamic L, Adar E. How to search a social network. Social Networks 2005; 27(3): 187-203.
-
(2005)
Social Networks
, vol.27
, Issue.3
, pp. 187-203
-
-
Adamic, L.1
Adar, E.2
-
5
-
-
84938051815
-
A pseudomodel of the small world problem
-
Killworth PD, Bernard HR. A pseudomodel of the small world problem. Social Forces 1979; 58(2): 477-505.
-
(1979)
Social Forces
, vol.58
, Issue.2
, pp. 477-505
-
-
Killworth, P.D.1
Bernard, H.R.2
-
6
-
-
84970354110
-
Patterns of acquaintanceship in society and complex organization: a comparative study of the small world problem
-
Lunfberg CC. Patterns of acquaintanceship in society and complex organization: a comparative study of the small world problem. The Pacific Sociological Review 1975; 18: 206-222.
-
(1975)
The Pacific Sociological Review
, vol.18
, pp. 206-222
-
-
Lunfberg, C.C.1
-
7
-
-
0002687371
-
The small-world problem
-
Milgram S. The small-world problem. Psychology Today 1967; 1: 62-67.
-
(1967)
Psychology Today
, vol.1
, pp. 62-67
-
-
Milgram, S.1
-
8
-
-
0001504032
-
An experimental study of the small world problem
-
Travers J, Milgram S. An experimental study of the small world problem. Sociometry 1969; 32: 425-443.
-
(1969)
Sociometry
, vol.32
, pp. 425-443
-
-
Travers, J.1
Milgram, S.2
-
9
-
-
0042855693
-
An experimental study of search in global social networks
-
Dodds PS, Muhamad R, Watts DJ. An experimental study of search in global social networks. Science 2003; 301: 827-829.
-
(2003)
Science
, vol.301
, pp. 827-829
-
-
Dodds, P.S.1
Muhamad, R.2
Watts, D.J.3
-
10
-
-
0037123661
-
Identity and search in social networks
-
Watts DJ, Dodds PS, Newman MEJ. Identity and search in social networks. Science 2002; 296: 1302-1305.
-
(2002)
Science
, vol.296
, pp. 1302-1305
-
-
Watts, D.J.1
Dodds, P.S.2
Newman, M.E.J.3
-
11
-
-
0343441557
-
Navigation in a small world
-
Kleinberg J. Navigation in a small world. Nature 2000; 406.
-
(2000)
Nature
, vol.406
-
-
Kleinberg, J.1
-
14
-
-
84911915849
-
Improved approximation algorithms for uniform connectivity problems
-
The 27th Annual ACM Symposium on Theory of Computing (STOC), 1995.
-
Khuller S, Raghavachari B. Improved approximation algorithms for uniform connectivity problems. The 27th Annual ACM Symposium on Theory of Computing (STOC), 1995.
-
-
-
Khuller, S.1
Raghavachari, B.2
-
15
-
-
79551646596
-
An implementation scheme of flow-net and its applications on detecting attacks in wireless networks
-
Fu B, Xiao Y. An implementation scheme of flow-net and its applications on detecting attacks in wireless networks. Proc. of IEEE GLOBECOM 2010
-
(2010)
Proc. of IEEE GLOBECOM
-
-
Fu, B.1
Xiao, Y.2
-
16
-
-
84255195594
-
Accountability using flow-net: design, implementation, and performance evaluation
-
Special Issue on Security and Privacy in Emerging Information Technologies, accepted
-
Xiao Y, Meng K, Takahashi D. Accountability using flow-net: design, implementation, and performance evaluation. (Wiley Journal of) Security and Communication Networks, Special Issue on Security and Privacy in Emerging Information Technologies, accepted, DOI: 10.1002/sec.348.
-
(Wiley Journal of) Security and Communication Networks
-
-
Xiao, Y.1
Meng, K.2
Takahashi, D.3
-
17
-
-
85124575461
-
-
Creating user-relationship-graph in use of flow-net and log files for computer and network accountability and forensics. Proceedings of the IEEE Military Communications Conference (IEEE MILCOM 2010).
-
Takahashi D, Xiao Y, Meng K, Creating user-relationship-graph in use of flow-net and log files for computer and network accountability and forensics. Proceedings of the IEEE Military Communications Conference 2010 (IEEE MILCOM 2010).
-
(2010)
-
-
Takahashi, D.1
Xiao, Y.2
Meng, K.3
-
19
-
-
84855641355
-
Temporal accountability and anonymity in medical sensor networks
-
Special issue on Ubiquitous Body Sensor Networks, accepted
-
Liu J, Xiao Y. Temporal accountability and anonymity in medical sensor networks. ACM/Springer Mobile Networks and Applications (MONET), Special issue on Ubiquitous Body Sensor Networks, accepted, DOI: 10.1007/S11030-010-0254-6.
-
ACM/Springer Mobile Networks and Applications (MONET)
-
-
Liu, J.1
Xiao, Y.2
-
20
-
-
77955713637
-
IEEE 802.11 user fingerprinting and its applications
-
Takahashi D, Xiao Y, Zhang Y, Chatzimisios P, Chen HH. IEEE 802.11 user fingerprinting and its applications. Computers and Mathematics with Applications 2010; 60(2): 307-318.
-
(2010)
Computers and Mathematics with Applications
, vol.60
, Issue.2
, pp. 307-318
-
-
Takahashi, D.1
Xiao, Y.2
Zhang, Y.3
Chatzimisios, P.4
Chen, H.H.5
-
22
-
-
42649088128
-
Accountability for wireless LANs, ad hoc networks, and wireless mesh networks
-
Special Issue on Security in Mobile Ad Hoc and Sensor Networks.
-
Y Xiao. Accountability for wireless LANs, ad hoc networks, and wireless mesh networks. IEEE Communication Magazine, Special Issue on Security in Mobile Ad Hoc and Sensor Networks. 2008; 46(4): 116-126. DOI: 10.1109/MCOM.2008.4481350
-
(2008)
IEEE Communication Magazine
, vol.46
, Issue.4
, pp. 116-126
-
-
Xiao, Y.1
-
23
-
-
70350068836
-
Retrieving knowledge from auditing log files for computer and network forensics and accountability
-
Takahashi D, Xiao Y. Retrieving knowledge from auditing log files for computer and network forensics and accountability. (Wiley Journal) Security and Communication Networks 2008; 1(2): 147-160, DOI: 10.1002/sec.10
-
(2008)
(Wiley Journal) Security and Communication Networks
, vol.1
, Issue.2
, pp. 147-160
-
-
Takahashi, D.1
Xiao, Y.2
-
24
-
-
85124574899
-
Q-accountable: a overhead-based quantifiable accountability in wireless networks
-
Proceedings of IEEE Consumer Communications and Networking Conference (IEEE CCNC 2012).
-
Fu B, Xiao Y, Q-accountable: a overhead-based quantifiable accountability in wireless networks. Proceedings of IEEE Consumer Communications and Networking Conference (IEEE CCNC 2012).
-
-
-
Fu, B.1
Xiao, Y.2
-
25
-
-
84857226855
-
Building accountable smart grids in neighborhood area networks
-
Proceeding of The IEEE Global Telecommunications Conference 2011 (IEEE GLOBECOM 2011).
-
Xiao Z, Y Xiao, Du D. Building accountable smart grids in neighborhood area networks. Proceeding of The IEEE Global Telecommunications Conference 2011 (IEEE GLOBECOM 2011).
-
-
-
Xiao, Z.1
Xiao, Y.2
Du, D.3
-
26
-
-
84863166638
-
Accountable administration and implementation in operating systems
-
Proceeding of The IEEE Global Telecommunications Conference 2011 (IEEE GLOBECOM 2011).
-
Zeng L, Chen H, Xiao Y.Accountable administration and implementation in operating systems. Proceeding of The IEEE Global Telecommunications Conference 2011 (IEEE GLOBECOM 2011).
-
-
-
Zeng, L.1
Chen, H.2
Xiao, Y.3
-
27
-
-
79960584361
-
Accountable MapReduce in cloud computing
-
Proceedings of The IEEE International Workshop on Security in Computers, Networking and Communications (SCNC 2011).
-
Xiao Z, Xiao Y. Accountable MapReduce in cloud computing. Proceedings of The IEEE International Workshop on Security in Computers, Networking and Communications (SCNC 2011).
-
-
-
Xiao, Z.1
Xiao, Y.2
-
28
-
-
79957925781
-
Accountability in smart grids
-
Proceedings of IEEE Consumer Communications and Networking Conference 2011 (IEEE CCNC 2011) Smart Grids Special Session.
-
Liu J, Xiao Y, Gao J. Accountability in smart grids. Proceedings of IEEE Consumer Communications and Networking Conference 2011 (IEEE CCNC 2011), Smart Grids Special Session.
-
-
-
Liu, J.1
Xiao, Y.2
Gao, J.3
-
29
-
-
78649625552
-
A quantitative study of accountability in wireless multi-hop networks
-
Proceedings of 2010 39th International Conference on Parallel Processing (ICPP 2010).
-
Xiao Z, Xiao Y, Wu J. A quantitative study of accountability in wireless multi-hop networks. Proceedings of 2010 39th International Conference on Parallel Processing (ICPP 2010).
-
-
-
Xiao, Z.1
Xiao, Y.2
Wu, J.3
-
30
-
-
77957970541
-
PeerReview analysis and re-evaluation for accountability in distributed systems or networks
-
Proceedings of the 4th International Conference on Information Security and Assurance (ISA2010), CCIS 76
-
Xiao Z, Xiao Y. PeerReview analysis and re-evaluation for accountability in distributed systems or networks. Proceedings of the 4th International Conference on Information Security and Assurance (ISA2010), CCIS 76, 149-162, 2010.
-
(2010)
, pp. 149-162
-
-
Xiao, Z.1
Xiao, Y.2
-
31
-
-
77953884604
-
P-accountable networked systems
-
Proceeding of INFOCOM 2010, Work in Progress (WIP) Track, acceptance rate is 28% (27 over 97).
-
Xiao Z, Xiao Y. P-accountable networked systems. Proceeding of INFOCOM 2010, Work in Progress (WIP) Track, acceptance rate is 28% (27 over 97).
-
-
-
Xiao, Z.1
Xiao, Y.2
-
32
-
-
79954594099
-
Subjective audio quality over a secure IEEE 802.11n network
-
Ramsey BW, Mullins BE, Thomas RW, Andel TR. Subjective audio quality over a secure IEEE 802.11n network. International Journal of Security and Networks 2011; 6(1): 53-63.
-
(2011)
International Journal of Security and Networks
, vol.6
, Issue.1
, pp. 53-63
-
-
Ramsey, B.W.1
Mullins, B.E.2
Thomas, R.W.3
Andel, T.R.4
-
34
-
-
79954619874
-
Towards modelling the impact of cyber attacks on a smart grid
-
Kundur D, Feng X, Mashayekh S, Liu S, Zourntos T, Butler-Purry KL. Towards modelling the impact of cyber attacks on a smart grid. International Journal of Security and Networks 2011; 6(1): 2-13.
-
(2011)
International Journal of Security and Networks
, vol.6
, Issue.1
, pp. 2-13
-
-
Kundur, D.1
Feng, X.2
Mashayekh, S.3
Liu, S.4
Zourntos, T.5
Butler-Purry, K.L.6
-
35
-
-
79954597540
-
Privacy protection system and metrics for hiding electrical events
-
Kalogridis G, Denic SZ, Lewis T, Cepeda R. Privacy protection system and metrics for hiding electrical events. International Journal of Security and Networks 2011; 6(1): 14-27.
-
(2011)
International Journal of Security and Networks
, vol.6
, Issue.1
, pp. 14-27
-
-
Kalogridis, G.1
Denic, S.Z.2
Lewis, T.3
Cepeda, R.4
-
36
-
-
79954614519
-
Secure and privacy-preserving information aggregation for smart grids
-
Li F, Luo B, Liu P. Secure and privacy-preserving information aggregation for smart grids. International Journal of Security and Networks 2011; 6(1): 28-39.
-
(2011)
International Journal of Security and Networks
, vol.6
, Issue.1
, pp. 28-39
-
-
Li, F.1
Luo, B.2
Liu, P.3
-
39
-
-
84857202234
-
On the (in)security of two joint encryption and error correction schemes
-
Chai Q, Gong G. On the (in)security of two joint encryption and error correction schemes. International Journal of Security and Networks 2011; 6(4)
-
(2011)
International Journal of Security and Networks
, vol.6
, Issue.4
-
-
Chai, Q.1
Gong, G.2
-
40
-
-
84863170280
-
An epidemic model with adaptive virus spread control for wireless sensor networks
-
Tang S, Li W. An epidemic model with adaptive virus spread control for wireless sensor networks. International Journal of Security and Networks 2011; 6(4).
-
(2011)
International Journal of Security and Networks
, vol.6
, Issue.4
-
-
Tang, S.1
Li, W.2
-
53
-
-
84863152521
-
Hidden information in Microsoft Word
-
Liu L, Xiao Y, Zhang V, Faulkner A, Weber K. Hidden information in Microsoft Word. International Journal of Security and Networks 2011; 6(2/3).
-
(2011)
International Journal of Security and Networks
, vol.6
, Issue.2-3
-
-
Liu, L.1
Xiao, Y.2
Zhang, V.3
Faulkner, A.4
Weber, K.5
-
55
-
-
80053611671
-
Actor coordination using info-gap decision theory in wireless sensor and actor networks
-
Chinnappen-Rimer S, Hancke GP. Actor coordination using info-gap decision theory in wireless sensor and actor networks. International Journal of Sensor Networks 2011; 10(4): 177-191.
-
(2011)
International Journal of Sensor Networks
, vol.10
, Issue.4
, pp. 177-191
-
-
Chinnappen-Rimer, S.1
Hancke, G.P.2
-
56
-
-
80053600885
-
Comparative performance and energy consumption analysis of different AES implementations on a wireless sensor network node
-
Zhang F, Dojen R, Coffey T. Comparative performance and energy consumption analysis of different AES implementations on a wireless sensor network node. International Journal of Sensor Networks 2011; 10(4): 192-201.
-
(2011)
International Journal of Sensor Networks
, vol.10
, Issue.4
, pp. 192-201
-
-
Zhang, F.1
Dojen, R.2
Coffey, T.3
-
57
-
-
80053577189
-
Wireless telemedicine and m-health: technologies, applications and research issues
-
Xiao Y, Takahashi D, Liu J, Deng H, Zhang J. Wireless telemedicine and m-health: technologies, applications and research issues. International Journal of Sensor Networks 2011; 10(4): 202-236.
-
(2011)
International Journal of Sensor Networks
, vol.10
, Issue.4
, pp. 202-236
-
-
Xiao, Y.1
Takahashi, D.2
Liu, J.3
Deng, H.4
Zhang, J.5
-
58
-
-
80052386012
-
Landslide monitoring with sensor networks: experiences and lessons learnt from a real-world deployment
-
Rosi A, Berti M, Bicocchi N, Castelli G, Corsini A, Mamei M, et al. Landslide monitoring with sensor networks: experiences and lessons learnt from a real-world deployment. International Journal of Sensor Networks 2011; 10(3): 111-122.
-
(2011)
International Journal of Sensor Networks
, vol.10
, Issue.3
, pp. 111-122
-
-
Rosi, A.1
Berti, M.2
Bicocchi, N.3
Castelli, G.4
Corsini, A.5
Mamei, M.6
-
59
-
-
80052380878
-
Error compensation algorithm in wireless sensor networks synchronisation
-
Wang F, Zeng P, Yu H, Xiao Y. Error compensation algorithm in wireless sensor networks synchronisation. International Journal of Sensor Networks 2011; 10(3): 123-131.
-
(2011)
International Journal of Sensor Networks
, vol.10
, Issue.3
, pp. 123-131
-
-
Wang, F.1
Zeng, P.2
Yu, H.3
Xiao, Y.4
-
60
-
-
80052380361
-
Querying sensor data for environmental monitoring
-
Toscani D, Giordani I, Cislaghi M, Quarenghi L. Querying sensor data for environmental monitoring. International Journal of Sensor Networks 2011; 10(3): 132-142.
-
(2011)
International Journal of Sensor Networks
, vol.10
, Issue.3
, pp. 132-142
-
-
Toscani, D.1
Giordani, I.2
Cislaghi, M.3
Quarenghi, L.4
-
62
-
-
80052343253
-
Fault-tolerant de-Bruijn graph based multipurpose architecture and routing protocol for wireless sensor networks
-
Mishra V, Mathew J, Pradhan DK. Fault-tolerant de-Bruijn graph based multipurpose architecture and routing protocol for wireless sensor networks. International Journal of Sensor Networks 2011; 10(3): 160-175.
-
(2011)
International Journal of Sensor Networks
, vol.10
, Issue.3
, pp. 160-175
-
-
Mishra, V.1
Mathew, J.2
Pradhan, D.K.3
-
63
-
-
84859400076
-
Editorial
-
Tseng C, Lee S, Prasad NR, Wódczak M. Editorial. International Journal of Sensor Networks 2011; 10(1/2): 1-2.
-
(2011)
International Journal of Sensor Networks
, vol.10
, Issue.1-2
, pp. 1-2
-
-
Tseng, C.1
Lee, S.2
Prasad, N.R.3
Wódczak, M.4
-
64
-
-
79959709535
-
Energy-efficient framework for data gathering in wireless sensor networks via the combination of sleeping MAC and data aggregation strategies
-
Kafetzoglou S, Papavassiliou S. Energy-efficient framework for data gathering in wireless sensor networks via the combination of sleeping MAC and data aggregation strategies. International Journal of Sensor Networks 2011; 10(1/2): 3-13.
-
(2011)
International Journal of Sensor Networks
, vol.10
, Issue.1-2
, pp. 3-13
-
-
Kafetzoglou, S.1
Papavassiliou, S.2
-
65
-
-
79959730306
-
Scatter-secure code authentication for efficient reprogramming in wireless sensor networks
-
Krontiris I, Dimitriou T. Scatter-secure code authentication for efficient reprogramming in wireless sensor networks. International Journal of Sensor Networks 2011; 10(1/2): 14-24.
-
(2011)
International Journal of Sensor Networks
, vol.10
, Issue.1-2
, pp. 14-24
-
-
Krontiris, I.1
Dimitriou, T.2
-
66
-
-
79959697645
-
HEEP (Hybrid Energy Efficiency Protocol) based on chain clustering
-
Boubiche D, Bilami A. HEEP (Hybrid Energy Efficiency Protocol) based on chain clustering. International Journal of Sensor Networks 2011; 10(1/2): 25-35.
-
(2011)
International Journal of Sensor Networks
, vol.10
, Issue.1-2
, pp. 25-35
-
-
Boubiche, D.1
Bilami, A.2
-
67
-
-
79959707702
-
Enhancing AODV routing protocol over mobile ad hoc sensor networks
-
Soliman H, Al-Otaibi M. Enhancing AODV routing protocol over mobile ad hoc sensor networks. International Journal of Sensor Networks 2011; 10(1/2): 36-41.
-
(2011)
International Journal of Sensor Networks
, vol.10
, Issue.1-2
, pp. 36-41
-
-
Soliman, H.1
Al-Otaibi, M.2
-
68
-
-
79959698370
-
Multi-sensor activation for temporally correlated event monitoring with renewable energy sources
-
Jaggi N, Kar K. Multi-sensor activation for temporally correlated event monitoring with renewable energy sources. International Journal of Sensor Networks 2011; 10(1/2): 42-58.
-
(2011)
International Journal of Sensor Networks
, vol.10
, Issue.1-2
, pp. 42-58
-
-
Jaggi, N.1
Kar, K.2
-
69
-
-
79959731712
-
A cluster-based algorithm for redundant nodes discovery in dense sensor networks
-
Lu L, Wu JC, Chen S. A cluster-based algorithm for redundant nodes discovery in dense sensor networks. International Journal of Sensor Networks 2011; 10(1/2): 59-72.
-
(2011)
International Journal of Sensor Networks
, vol.10
, Issue.1-2
, pp. 59-72
-
-
Lu, L.1
Wu, J.C.2
Chen, S.3
-
70
-
-
79959737881
-
A green wireless sensor network for environmental monitoring and risk identification
-
Morreale P, Qi F, Croft P. A green wireless sensor network for environmental monitoring and risk identification. International Journal of Sensor Networks 2011; 10(1/2): 73-82.
-
(2011)
International Journal of Sensor Networks
, vol.10
, Issue.1-2
, pp. 73-82
-
-
Morreale, P.1
Qi, F.2
Croft, P.3
-
71
-
-
79959743592
-
Autonomic cooperative networking for wireless green sensor systems
-
Wodczak M. Autonomic cooperative networking for wireless green sensor systems. International Journal of Sensor Networks 2011; 10(1/2): 83-93.
-
(2011)
International Journal of Sensor Networks
, vol.10
, Issue.1-2
, pp. 83-93
-
-
Wodczak, M.1
-
72
-
-
79959704098
-
PERSEN: power-efficient logical ring based key management for clustered sensor networks
-
Poornima AS, Amberker BB. PERSEN: power-efficient logical ring based key management for clustered sensor networks. International Journal of Sensor Networks 2011; 10(1/2): 94-103.
-
(2011)
International Journal of Sensor Networks
, vol.10
, Issue.1-2
, pp. 94-103
-
-
Poornima, A.S.1
Amberker, B.B.2
-
73
-
-
79959751417
-
Adaptive resource allocation in multiuser cooperative networks with proportional rate constraints
-
Li F. Adaptive resource allocation in multiuser cooperative networks with proportional rate constraints. International Journal of Sensor Networks 2011; 10(1/2): 104-110.
-
(2011)
International Journal of Sensor Networks
, vol.10
, Issue.1-2
, pp. 104-110
-
-
Li, F.1
-
74
-
-
79960579795
-
RF angle of arrival-based node localisation
-
Amundson I, Sallai J, Koutsoukos X, Ledeczi A, Maroti M. RF angle of arrival-based node localisation. International Journal of Sensor Networks 2011; 9(3/4): 209-224.
-
(2011)
International Journal of Sensor Networks
, vol.9
, Issue.3-4
, pp. 209-224
-
-
Amundson, I.1
Sallai, J.2
Koutsoukos, X.3
Ledeczi, A.4
Maroti, M.5
-
75
-
-
84859388278
-
Editorial
-
Shen C, Hong Y-WP, Chao C, Yang S. Editorial. International Journal of Sensor Networks 2011; 9(3/4): 121-123.
-
(2011)
International Journal of Sensor Networks
, vol.9
, Issue.3-4
, pp. 121-123
-
-
Shen, C.1
Hong, Y.-W.2
Chao, C.3
Yang, S.4
-
76
-
-
79960617501
-
Energy-efficient collaborative tracking in wireless sensor networks
-
Arienzo L, Longo M. Energy-efficient collaborative tracking in wireless sensor networks. International Journal of Sensor Networks 2011; 9(3/4): 124-138.
-
(2011)
International Journal of Sensor Networks
, vol.9
, Issue.3-4
, pp. 124-138
-
-
Arienzo, L.1
Longo, M.2
-
77
-
-
79960568862
-
Enhancing lifetime of wireless sensor networks using multiple data sinks
-
Azad AP, Chockalingam A. Enhancing lifetime of wireless sensor networks using multiple data sinks. International Journal of Sensor Networks 2011; 9(3/4): 139-157.
-
(2011)
International Journal of Sensor Networks
, vol.9
, Issue.3-4
, pp. 139-157
-
-
Azad, A.P.1
Chockalingam, A.2
-
78
-
-
79960596453
-
Increasing energy efficiency in sensor networks: blue noise sampling and non-convex matrix completion
-
Majumdar A, Ward RK. Increasing energy efficiency in sensor networks: blue noise sampling and non-convex matrix completion. International Journal of Sensor Networks 2011; 9(3/4): 158-169.
-
(2011)
International Journal of Sensor Networks
, vol.9
, Issue.3-4
, pp. 158-169
-
-
Majumdar, A.1
Ward, R.K.2
-
79
-
-
79960606732
-
Testing network protocols and signal attenuation in packed food transports
-
Jedermann R, Becker M, Gorg C, Lang W. Testing network protocols and signal attenuation in packed food transports. International Journal of Sensor Networks 2011; 9(3/4): 170-181.
-
(2011)
International Journal of Sensor Networks
, vol.9
, Issue.3-4
, pp. 170-181
-
-
Jedermann, R.1
Becker, M.2
Gorg, C.3
Lang, W.4
-
81
-
-
79960610662
-
Per node deployment based detection of controlled link establishment attack in distributed sensor networks
-
Tran TD, Agbinya JI, Al-Jumaily AA. Per node deployment based detection of controlled link establishment attack in distributed sensor networks. International Journal of Sensor Networks 2011; 9(3/4): 192-208.
-
(2011)
International Journal of Sensor Networks
, vol.9
, Issue.3-4
, pp. 192-208
-
-
Tran, T.D.1
Agbinya, J.I.2
Al-Jumaily, A.A.3
-
82
-
-
51249106649
-
Complexity analysis of retrieving knowledge from auditing log files for computer and network forensics and accountability
-
Takahashi D, Xiao Y. Complexity analysis of retrieving knowledge from auditing log files for computer and network forensics and accountability. Proc. of IEEE ICC 2008, 1474-1478.
-
(2008)
Proc. of IEEE ICC
, pp. 1474-1478
-
-
Takahashi, D.1
Xiao, Y.2
-
83
-
-
70350060199
-
Flow-net methodology for accountability in wireless networks
-
Sept./Oct.
-
Xiao Y. Flow-net methodology for accountability in wireless networks. IEEE Network, Vol. 23, No. 5, Sept./Oct. 2009, 30-37.
-
(2009)
IEEE Network
, vol.23
, Issue.5
, pp. 30-37
-
-
Xiao, Y.1
-
84
-
-
79951647755
-
Implementation and evaluation of accountability using flow-net in wireless networks
-
Xiao Y, Meng K, Takahashi D. Implementation and evaluation of accountability using flow-net in wireless networks. Proc. of IEEE MILCOM 2010
-
(2010)
Proc. of IEEE MILCOM
-
-
Xiao, Y.1
Meng, K.2
Takahashi, D.3
-
86
-
-
84911909256
-
-
http://www.jgraph.com
-
-
-
-
87
-
-
84911919483
-
-
http://www.mysql.com/
-
-
-
-
88
-
-
84911923027
-
-
http://www.java.com
-
-
-
-
89
-
-
84911948798
-
-
http://www.mysql.com/products/connector/j/
-
-
-
-
90
-
-
70449842997
-
Using an edge-dual graph and k-connectivity to identify strong connections in social networks
-
Ding L, Dixon B. Using an edge-dual graph and k-connectivity to identify strong connections in social networks. Proc. of the ACM 46th Annual Southeast Regional Conference, 475-480, 2008.
-
(2008)
Proc. of the ACM 46th Annual Southeast Regional Conference
, pp. 475-480
-
-
Ding, L.1
Dixon, B.2
|