1 |
Geetha, R., Delbert, H., A P2P Intrusion Detection System based on Mobile Agents, ACM ACME'04, pp. 185-195, April 2004.
|
2 |
National Center for Biotechnology Information, http://www.ncbi.nlm.nih.gov
|
3 |
Smith, T.F., Waterman, M.s., Identification of Common Molecular Subsequences, J. Mol. Biol. 147, pp. 195-197, July 1981.
DOI
|
4 |
Benjamin, H., Mobile Device Security, ACM InfoSecCD Conference'04, pp. 99-101, September 2004.
|
5 |
Dan, B., James, S., Collusion-Secure Fingerprinting for Digital Data, IEEE Transactions on Information Theory, Vol. 44, No. 5, September 1998.
|
6 |
Binomial Distribution, http://en.wikipedia.org/wiki/Binomial_distribution
|
7 |
Digital Rights Management, http://en.wikipedia.org/wiki/Digital_rights_management
|
8 |
Narayanan Shivakuma, Hector Garcia- Molina, "Building a scalable and accurate copy detection mechanism", DL'96 Proceedings of the first ACM international conference on Digital libraries, pp. 160-168, March 1996.
|
9 |
Yogesh Prem, S., Hannes, T., Protecting Mobile Devices from TCP Flooding Attacks, ACM mobiarch'06, pp. 63-68, December 2006.
|
10 |
Ingemar, J. Ton, K., Georg, P., Information Transmission and Steganography, IWDW 2005, LNCS 3710, pp. 15-29, 2005.
|
11 |
Young-guang, Z., Wenke, L., Yi-an, H., Intrusion Detection Technique for Mobile Wireless Networks, ACM MONET, pp. 545-556, November. 2004.
|
12 |
David, C., Sebastian, H., Pasquale, M., Quantitative Analysis of the Leakage of Confidential Data, Electronic Notes in Theoretical Computer Science 59 No. 3., November 2003.
|
13 |
Christian, C., An Information Theoretic Model for Steganography, Information Hiding 1998, LNCS 1525, pp. 306-318, 1998.
|
14 |
Shi, Z., Ji, Z., Hu, M., A Novel Distributed Intrusion Detection Model Based on Mobile Agent, ACM InfoSecu04, pp. 155-159, November 2006.
|
15 |
Deepak, V., An Efficient Signature Representation and Matching Method for Mobile Devices, Proceedings of the 2nd annual international workshop on Wireless internet, Vol 220, August 2006.
|