Related references
Note: Only part of the references are listed.Building a wireless capturing tool for WiFi
Ke Meng et al.
SECURITY AND COMMUNICATION NETWORKS (2009)
Accountability for wireless LANs ad hoc networks and wireless mesh networks
Yang Xiao
IEEE COMMUNICATIONS MAGAZINE (2008)
Retrieving knowledge from auditing log-files for computer and network forensics and accountability
Daisuke Takahashi et al.
SECURITY AND COMMUNICATION NETWORKS (2008)
Enhancing security using mobility-based anomaly detection in cellular mobile networks
Bo Sun et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2006)
Drm {and, or, vs.} the law
P Samuelson
COMMUNICATIONS OF THE ACM (2003)
Accountable web-computing
AL Rosenberg
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2003)
SAFKASI: A security mechanism for language-based systems
DS Wallach et al.
ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY (2000)