Author:
Brooks R. R.,Yu Lu,Fu Yu,Cordone Guthrie,Oakley Jon,Zhong Xingsi
Publisher
Springer International Publishing
Reference45 articles.
1. Antonakakis, M., Perdisci, R., Nadji, Y., Vasiloglou, N., Abu-Nimeh, S., Lee, W., Dagon, D.: From throw-away traffic to bots: detecting the rise of DGA-based malware. In: USENIX Security Symposium, vol. 12 (2012)
2. Barber, S., Boyen, X., Shi, E., Uzun, E.: Bitter to better—how to make bitcoin a better currency. In: International Conference on Financial Cryptography and Data Security, pp. 399–414. Springer, New York (2012)
3. Beasley, C., Zhong, X., Deng, J., Brooks, R., Kumar Venayagamoorthy, G.: A survey of electric power synchrophasor network cyber security. In: Innovative Smart Grid Technologies Conference Europe (ISGT-Europe), 2014 IEEE PES, pp. 1–5 (2014). https://doi.org/10.1109/ISGTEurope.2014.7028738
4. Bhanu, H., Schwier, J., Craven, R., Brooks, R.R., Hempstalk, K., Gunetti, D., Griffin, C.: Side-channel analysis for detecting protocol tunneling. Adv. Internet Things 1(02), 13 (2011)
5. Bowerman, B.L., O’connell, R.T.: Linear Statistical Models: An Applied Approach. Brooks/Cole, Belmont (1990)