Author:
Castiglione Aniello,De Prisco Roberto,De Santis Alfredo,Fiore Ugo,Palmieri Francesco
Subject
Computer Networks and Communications,Computer Science Applications,Hardware and Architecture
Reference31 articles.
1. Awerbuch B, Holmer D, Rubens H. Provably secure competitive routing against proactive byzantine adversaries via reinforcement learning. Technical Report, In JHU Tech Report Version 1; 2003.
2. Emergence of scaling in random networks;Barabási;Science,1999
3. Berger A, Hefeeda M. Exploiting SIP for botnet communication. In: 5th IEEE workshop on secure network protocols (NPSec 2009); 2009. p. 31–6. http://dx.doi.org/10.1109/NPSEC.2009.5342244.
4. Binsalleeh H, Ormerod T, Boukhtouta A, Sinha P, Youssef A, Debbabi M, Wang L. On the analysis of the Zeus botnet crimeware toolkit. In: 8th annual international conference on privacy security and trust (PST). IEEE; 2010. p. 31–8.
5. Bui TN, Zrncic CM. An ant-based algorithm for finding degree-constrained minimum spanning tree. In: Proceedings of the 8th annual conference on genetic and evolutionary computation (GECCO '06). New York, NY, USA: ACM; 2006. p. 11–8.
Cited by
26 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献