Author:
Ullah Faheem,Edwards Matthew,Ramdhany Rajiv,Chitchyan Ruzanna,Babar M. Ali,Rashid Awais
Subject
Computer Networks and Communications,Computer Science Applications,Hardware and Architecture
Reference179 articles.
1. Watermarking relational data: framework, algorithms and analysis;Agrawal;The VLDB J.,2003
2. Ahmadinejad, S.H., Fong, P.W., Safavi-Naini, R., 2016. Privacy and utility of inference control mechanisms for social computing applications. In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security. ACM.
3. Ahn, S.-H., Kim, N.-U., Chung, T.-M. 2014. Big data analysis system concept for detecting unknown attacks. In: Proceedings of the 16th International Conference on Advanced Communication Technology. IEEE.
4. Al-Bataineh, A., White, G. 2012. Analysis and detection of malicious data exfiltration in web traffic. In: Proceedings of the Malicious and Unwanted Software (MALWARE), 2012 7th International Conference on. IEEE.
5. Alexander, J.S., Dean, T., Knight, S., 2011. Spy vs. spy: Counter-intelligence methods for backtracking malicious intrusions. In: Proceedings of the 2011 Conference of the Center for Advanced Studies on Collaborative Research. IBM Corp.
Cited by
84 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献