共 36 条
[1]
Ahn T.S., 2016, 8 INT C UB FUT NETW, DOI 10.1109/ICUFN.2016.7537071
[2]
Archibald R., 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), P970, DOI 10.1109/TrustCom.2012.21
[3]
Berk V., 2005, Rapport technique TR536, de lUniversite de Dartmouth, P19
[4]
Beyrami B., 2014, J ELECTRON CYBER DEF, V2, P13
[5]
Brown E, 2010, PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, P56
[6]
Cabuk S., 2004, P 11 ACM C COMP COMM, P178, DOI DOI 10.1145/1030083.1030108
[8]
Carrara Brent., 2016, IHMMSec'16, page, P115, DOI DOI 10.1145/2909827
[9]
Chen A., 2014, 13 USENIX S OP SYST, V14
[10]
Practical codes for queueing channels: An algebraic, state-space, message-passing approach
[J].
2008 IEEE INFORMATION THEORY WORKSHOP,
2008,
:318-+