4.7 Article

Flow-Net Methodology for Accountability in Wireless Networks

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Building a wireless capturing tool for WiFi

Ke Meng et al.

SECURITY AND COMMUNICATION NETWORKS (2009)

Article Engineering, Electrical & Electronic

Accountability for wireless LANs ad hoc networks and wireless mesh networks

Yang Xiao

IEEE COMMUNICATIONS MAGAZINE (2008)

Article Computer Science, Information Systems

Retrieving knowledge from auditing log-files for computer and network forensics and accountability

Daisuke Takahashi et al.

SECURITY AND COMMUNICATION NETWORKS (2008)

Article Engineering, Electrical & Electronic

Enhancing security using mobility-based anomaly detection in cellular mobile networks

Bo Sun et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2006)

Article Computer Science, Hardware & Architecture

Drm {and, or, vs.} the law

P Samuelson

COMMUNICATIONS OF THE ACM (2003)

Article Computer Science, Theory & Methods

Accountable web-computing

AL Rosenberg

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2003)

Article Computer Science, Software Engineering

SAFKASI: A security mechanism for language-based systems

DS Wallach et al.

ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY (2000)