共 19 条
[1]
Al-Shaer E, 2011, ADV INFORM SECUR, V54, P153
[2]
[Anonymous], 2014, Proceedings of the IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks WoWMoM, DOI DOI 10.1109/WOWMOM.2014.6918979
[3]
Atighetchi M, 2003, ISORC 2003: SIXTH IEEE INTERNATIONAL SYMPOSIUM ON OBJECT-ORIENTED REAL-TIME DISTRIBUTED COMPUTING, PROCEEDINGS, P183
[4]
Badishi G, 2007, IEEE T DEPEND SECURE, V4, P191, DOI [10.1109/TDSC.2007.70209, 10.1109/TDSC.2007.70209.]
[5]
Duan Q, 2013, IEEE CONF COMM NETW, P260, DOI 10.1109/CNS.2013.6682715
[6]
Dunlop M, 2011, 2011 - MILCOM 2011 MILITARY COMMUNICATIONS CONFERENCE, P1321, DOI 10.1109/MILCOM.2011.6127486
[7]
Gillani Fida, 2015, 2015 IEEE Conference on Computer Communications (INFOCOM). Proceedings, P729, DOI 10.1109/INFOCOM.2015.7218442
[8]
Jafarian Jafar Haadi, 2015, 2015 IEEE Conference on Computer Communications (INFOCOM). Proceedings, P738, DOI 10.1109/INFOCOM.2015.7218443
[9]
Jafarian Jafar Haadi, 2013, Computer Security - ESORICS 2013. 18th European Symposium on Research in Computer Security. Proceedings: LNCS 8134, P237, DOI 10.1007/978-3-642-40203-6_14