共 33 条
[21]
Enck William., 2005, ACM CCS, P393, DOI [10.1145/1102120. 1102171, DOI 10.1145/1102120.1102171]
[22]
Metrics for scene change detection in digital video sequences
[J].
IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS '97, PROCEEDINGS,
1997,
:610-611
[23]
BPLRU: A buffer management scheme for improving random writes in flash storage
[J].
PROCEEDINGS OF THE 6TH USENIX CONFERENCE ON FILE AND STORAGE TECHNOLOGIES (FAST '08),
2008,
:239-252
[24]
Denial-of-service attacks on battery-powered mobile computers
[J].
SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS,
2004,
:309-318
[25]
Mickens JamesW., 2005, WISE 05, P77, DOI DOI 10.1145/1080793.1080806
[26]
Testing and evaluating virus detectors for handheld devices
[J].
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES,
2006, 2 (02)
:135-147
[27]
Compressed video processing for cut detection
[J].
IEE PROCEEDINGS-VISION IMAGE AND SIGNAL PROCESSING,
1996, 143 (05)
:315-323
[28]
The sleep deprivation attack in sensor networks: Analysis and methods of defense
[J].
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS,
2006, 2 (03)
:267-287
[29]
Racic R., 2006, PROC SECURECOMM WORK, P1