共 25 条
- [1] Detecting Multi-Hop Stepping-Stone Pairs with Chaff and Clock Skew JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2011, 6 (06): : 452 - 461
- [2] Detect Stepping-Stone Insider Attacks by Network Traffic Mining and Dynamic Programming 25TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA 2011), 2011, : 151 - 158
- [3] Detecting Stepping-Stone Connection using Association Rule Mining 2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 90 - 97
- [4] Detect Stepping-stone Intrusion by Mining Network Traffic using k-Means Clustering 2020 IEEE 39TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2020,
- [5] Theory and key techniques about multi-hop TCP connection based on XMPP Beijing Gongye Daxue Xuebao J. Beijing Univ. Technol., 2008, SUPPL. 2 (32-35+78):
- [7] DIRAC: A Dynamic Programming Approach to Rateless Coded Multi-hop Multi-Relay Transmission 2013 IEEE 24TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2013, : 2265 - 2269
- [10] Using rate balancing to improve throughput in a wireless multi-hop chain topology TENCON 2005 - 2005 IEEE REGION 10 CONFERENCE, VOLS 1-5, 2006, : 311 - +