SEARCH

SEARCH BY CITATION

REFERENCES

  • 1
    Kruse WG II, Heiser JG. Computer Forensics: Incident Response Essentials. Addison-Weasley Professional, 2001.
  • 2
    Takahashi D, Xiao Y. Retrieving knowledge from auditing log files for computer and network forensics and accountability, Vol. 1, (Wiley) Security and Communication Networks. No. 2, Feb. 29, 2008; 147160.
  • 3
    Adamic L, Adar E. How to search a social network. Social Networks 2005; 27(3): 187203.
  • 4
    Killworth P, Bernard H. Reverse small world experiment. Social Networks 1978; 1: 159192.
  • 5
    Killworth PD, Bernard HR. A pseudomodel of the small world problem. Social Forces 1979; 58(2): 477505.
  • 6
    Lunfberg CC. Patterns of acquaintanceship in society and complex organization: a comparative study of the small world problem. The Pacific Sociological Review 1975; 18: 206222.
  • 7
    Milgram S. The small-world problem. Psychology Today 1967; 1: 6267.
  • 8
    Travers J, Milgram S. An experimental study of the small world problem. Sociometry 1969; 32: 425443.
  • 9
    Dodds PS, Muhamad R, Watts DJ. An experimental study of search in global social networks. Science 2003; 301: 827829.
  • 10
    Watts DJ, Dodds PS, Newman MEJ. Identity and search in social networks. Science 2002; 296: 13021305.
  • 11
    Kleinberg J. Navigation in a small world. Nature 2000; 406.
  • 12
    Kleinberg J. Small-world phenomena and the dynamics of information. Advances in Neural Information Processing Systems (NIPS) 2001; 14.
  • 13
    Granovetter S. The strength of weak ties. The American Journal of Sociology 1973; 78: 13601380.
  • 14
    Khuller S, Raghavachari B. Improved approximation algorithms for uniform connectivity problems. The 27th Annual ACM Symposium on Theory of Computing (STOC), 1995.
  • 15
    Fu B, Xiao Y. An implementation scheme of flow-net and its applications on detecting attacks in wireless networks. Proc. of IEEE GLOBECOM 2010
  • 16
    Xiao Y, Meng K, Takahashi D. Accountability using flow-net: design, implementation, and performance evaluation. (Wiley Journal of) Security and Communication Networks, Special Issue on Security and Privacy in Emerging Information Technologies, accepted, DOI: 10.1002/sec.348.
  • 17
    Takahashi D, Xiao Y, Meng K, Creating user–relationship-graph in use of flow-net and log files for computer and network accountability and forensics. Proceedings of the IEEE Military Communications Conference 2010 (IEEE MILCOM 2010).
  • 18
    Xiao Y, Yue S, Fu B, Ozdemir S. GlobalView: building global view with log files in a distributed/networked system for accountability. (Wiley Journal of) Security and Communication tworks, accepted, DOI: 10.1002/sec.374.
  • 19
    Liu J, Xiao Y. Temporal accountability and anonymity in medical sensor networks. ACM/Springer Mobile Networks and Applications (MONET), Special issue on Ubiquitous Body Sensor Networks, accepted, DOI: 10.1007/S11030-010-0254-6.
  • 20
    Takahashi D, Xiao Y, Zhang Y, Chatzimisios P, Chen HH. IEEE 802.11 user fingerprinting and its applications. Computers and Mathematics with Applications 2010; 60(2): 307318.
  • 21
    Meng K, Xiao Y, Vrbsky SV. Building a wireless capturing tool for WiFi. (Wiley Journal of) Security and Communication Networks 2009; 2(6); 654668.
  • 22
    Y Xiao. Accountability for wireless LANs, ad hoc networks, and wireless mesh networks. IEEE Communication Magazine, Special Issue on Security in Mobile Ad Hoc and Sensor Networks. 2008; 46(4): 116126. DOI: 10.1109/MCOM.2008.4481350
  • 23
    Takahashi D, Xiao Y. Retrieving knowledge from auditing log files for computer and network forensics and accountability. (Wiley Journal) Security and Communication Networks 2008; 1(2): 147160, DOI: 10.1002/sec.10
  • 24
    Fu B, Xiao Y, Q-accountable: a overhead-based quantifiable accountability in wireless networks. Proceedings of IEEE Consumer Communications and Networking Conference (IEEE CCNC 2012).
  • 25
    Xiao Z, Y Xiao, Du D. Building accountable smart grids in neighborhood area networks. Proceeding of The IEEE Global Telecommunications Conference 2011 (IEEE GLOBECOM 2011).
  • 26
    Zeng L, Chen H, Xiao Y.Accountable administration and implementation in operating systems. Proceeding of The IEEE Global Telecommunications Conference 2011 (IEEE GLOBECOM 2011).
  • 27
    Xiao Z, Xiao Y. Accountable MapReduce in cloud computing. Proceedings of The IEEE International Workshop on Security in Computers, Networking and Communications (SCNC 2011).
  • 28
    Liu J, Xiao Y, Gao J. Accountability in smart grids. Proceedings of IEEE Consumer Communications and Networking Conference 2011 (IEEE CCNC 2011), Smart Grids Special Session.
  • 29
    Xiao Z, Xiao Y, Wu J. A quantitative study of accountability in wireless multi-hop networks. Proceedings of 2010 39th International Conference on Parallel Processing (ICPP 2010).
  • 30
    Xiao Z, Xiao Y. PeerReview analysis and re-evaluation for accountability in distributed systems or networks. Proceedings of the 4th International Conference on Information Security and Assurance (ISA2010), CCIS 76, 149162, 2010.
  • 31
    Xiao Z, Xiao Y. P-accountable networked systems. Proceeding of INFOCOM 2010, Work in Progress (WIP) Track, acceptance rate is 28% (27 over 97).
  • 32
    Ramsey BW, Mullins BE, Thomas RW, Andel TR. Subjective audio quality over a secure IEEE 802.11n network. International Journal of Security and Networks 2011; 6(1): 5363.
  • 33
    Xiao Y. Editorial. International Journal of Security and Networks 2011; 6(1): 11.
  • 34
    Kundur D, Feng X, Mashayekh S, Liu S, Zourntos T, Butler-Purry KL. Towards modelling the impact of cyber attacks on a smart grid. International Journal of Security and Networks 2011; 6(1): 213.
  • 35
    Kalogridis G, Denic SZ, Lewis T, Cepeda R. Privacy protection system and metrics for hiding electrical events. International Journal of Security and Networks 2011; 6(1): 1427.
  • 36
    Li F, Luo B, Liu P. Secure and privacy-preserving information aggregation for smart grids. International Journal of Security and Networks 2011; 6(1): 2839.
  • 37
    Zhang J, Gunter CA. Application-aware secure multicast for power grid communications. International Journal of Security and Networks 2011; 6(1): 4052.
  • 38
    Choi T, Acharya HB. Is that you? Authentication in a network without identities. International Journal of Security and Networks 2011; 6(4).
  • 39
    Chai Q, Gong G. On the (in)security of two joint encryption and error correction schemes. International Journal of Security and Networks 2011; 6(4)
  • 40
    Tang S, Li W. An epidemic model with adaptive virus spread control for wireless sensor networks. International Journal of Security and Networks 2011; 6(4).
  • 41
    Luo G, Subbalakshmi KP. KL-sense secure image steganography. International Journal of Security and Networks 2011; 6(4).
  • 42
    Chang W, Wu J, Tan CC. Friendship-based location privacy in mobile social networks. International Journal of Security and Networks 2011; 6(4).
  • 43
    Zhao X, Li L, Xue G. Authenticating strangers in online social networks. International Journal of Security and Networks 2011; 6(4).
  • 44
    Walker D, Latifi S. Partial iris recognition as a viable biometric scheme. International Journal of Security and Networks 2011; 6(2/3).
  • 45
    Desoky A. Edustega: an education-centric steganography methodology. International Journal of Security and Networks 2011; 6(2/3).
  • 46
    Ampah N, Akujuobi C, Alam S, Sadiku M. An intrusion detection technique based on continuous binary communication channels. International Journal of Security and Networks 2011; 6(2/3).
  • 47
    Chen H, Sun B. Editorial. International Journal of Security and Networks 2011; 6(2/3).
  • 48
    Barua M, Liang X, Lu R, Shen X. ESPAC: enabling security and patient-centric access control for eHealth in cloud computing. International Journal of Security and Networks 2011; 6(2/3).
  • 49
    Jaggi N, Reddy UM, Bagai R. A three dimensional sender anonymity metric. International Journal of Security and Networks 2011; 6(2/3).
  • 50
    Sharma MJ, Leung VCM. Improved IP multimedia subsystem authentication mechanism for 3G-WLAN networks. International Journal of Security and Networks 2011; 6(2/3).
  • 51
    Cheng N, Govindan K, Mohapatra P. Rendezvous based trust propagation to enhance distributed network security. International Journal of Security and Networks 2011; 6(2/3).
  • 52
    Fathy A, ElBatt T, Youssef M. A source authentication scheme using network coding. International Journal of Security and Networks 2011; 6(2/3).
  • 53
    Liu L, Xiao Y, Zhang V, Faulkner A, Weber K. Hidden information in Microsoft Word. International Journal of Security and Networks 2011; 6(2/3).
  • 54
    Chow SSM, Yiu S. Exclusion–intersection encryption. International Journal of Security and Networks 2011; 6(2/3).
  • 55
    Chinnappen-Rimer S, Hancke GP. Actor coordination using info-gap decision theory in wireless sensor and actor networks. International Journal of Sensor Networks 2011; 10(4): 177191.
  • 56
    Zhang F, Dojen R, Coffey T. Comparative performance and energy consumption analysis of different AES implementations on a wireless sensor network node. International Journal of Sensor Networks 2011; 10(4): 192201.
  • 57
    Xiao Y, Takahashi D, Liu J, Deng H, Zhang J. Wireless telemedicine and m-health: technologies, applications and research issues. International Journal of Sensor Networks 2011; 10(4): 202236.
  • 58
    Rosi A, Berti M, Bicocchi N, Castelli G, Corsini A, Mamei M, et al. Landslide monitoring with sensor networks: experiences and lessons learnt from a real-world deployment. International Journal of Sensor Networks 2011; 10(3): 111122.
  • 59
    Wang F, Zeng P, Yu H, Xiao Y. Error compensation algorithm in wireless sensor networks synchronisation. International Journal of Sensor Networks 2011; 10(3): 123131.
  • 60
    Toscani D, Giordani I, Cislaghi M, Quarenghi L. Querying sensor data for environmental monitoring. International Journal of Sensor Networks 2011; 10(3): 132142.
  • 61
    Fedor S, Collier M, Sreenan CJ. Cross-layer routing and time synchronisation in wireless sensor networks. International Journal of Sensor Networks 2011; 10(3): 143159.
  • 62
    Mishra V, Mathew J, Pradhan DK. Fault-tolerant de-Bruijn graph based multipurpose architecture and routing protocol for wireless sensor networks. International Journal of Sensor Networks 2011; 10(3): 160175.
  • 63
    Tseng C, Lee S, Prasad NR, Wódczak M. Editorial. International Journal of Sensor Networks 2011; 10(1/2): 12.
  • 64
    Kafetzoglou S, Papavassiliou S. Energy-efficient framework for data gathering in wireless sensor networks via the combination of sleeping MAC and data aggregation strategies. International Journal of Sensor Networks 2011; 10(1/2): 313.
  • 65
    Krontiris I, Dimitriou T. Scatter—secure code authentication for efficient reprogramming in wireless sensor networks. International Journal of Sensor Networks 2011; 10(1/2): 1424.
  • 66
    Boubiche D, Bilami A. HEEP (Hybrid Energy Efficiency Protocol) based on chain clustering. International Journal of Sensor Networks 2011; 10(1/2): 2535.
  • 67
    Soliman H, Al-Otaibi M. Enhancing AODV routing protocol over mobile ad hoc sensor networks. International Journal of Sensor Networks 2011; 10(1/2): 3641.
  • 68
    Jaggi N, Kar K. Multi-sensor activation for temporally correlated event monitoring with renewable energy sources. International Journal of Sensor Networks 2011; 10(1/2): 4258.
  • 69
    Lu L, Wu JC, Chen S. A cluster-based algorithm for redundant nodes discovery in dense sensor networks. International Journal of Sensor Networks 2011; 10(1/2): 5972.
  • 70
    Morreale P, Qi F, Croft P. A green wireless sensor network for environmental monitoring and risk identification. International Journal of Sensor Networks 2011; 10(1/2): 7382.
  • 71
    Wodczak M. Autonomic cooperative networking for wireless green sensor systems. International Journal of Sensor Networks 2011; 10(1/2): 8393.
  • 72
    Poornima AS, Amberker BB. PERSEN: power-efficient logical ring based key management for clustered sensor networks. International Journal of Sensor Networks 2011; 10(1/2): 94103.
  • 73
    Li F. Adaptive resource allocation in multiuser cooperative networks with proportional rate constraints. International Journal of Sensor Networks 2011; 10(1/2): 104110.
  • 74
    Amundson I, Sallai J, Koutsoukos X, Ledeczi A, Maroti M. RF angle of arrival-based node localisation. International Journal of Sensor Networks 2011; 9(3/4): 209224.
  • 75
    Shen C, Hong Y-WP, Chao C, Yang S. Editorial. International Journal of Sensor Networks 2011; 9(3/4): 121123.
  • 76
    Arienzo L, Longo M. Energy-efficient collaborative tracking in wireless sensor networks. International Journal of Sensor Networks 2011; 9(3/4): 124138.
  • 77
    Azad AP, Chockalingam A. Enhancing lifetime of wireless sensor networks using multiple data sinks. International Journal of Sensor Networks 2011; 9(3/4): 139157.
  • 78
    Majumdar A, Ward RK. Increasing energy efficiency in sensor networks: blue noise sampling and non-convex matrix completion. International Journal of Sensor Networks 2011; 9(3/4): 158169.
  • 79
    Jedermann R, Becker M, Gorg C, Lang W. Testing network protocols and signal attenuation in packed food transports. International Journal of Sensor Networks 2011; 9(3/4): 170181.
  • 80
    Taniguchi Y, Kitani T, Leibnitz K. A uniform airdrop deployment method for large-scale wireless sensor networks. International Journal of Sensor Networks 2011; 9(3/4): 182191.
  • 81
    Tran TD, Agbinya JI, Al-Jumaily AA. Per node deployment based detection of controlled link establishment attack in distributed sensor networks. International Journal of Sensor Networks 2011; 9(3/4): 192208.
  • 82
    Takahashi D, Xiao Y. Complexity analysis of retrieving knowledge from auditing log files for computer and network forensics and accountability. Proc. of IEEE ICC 2008, 14741478.
  • 83
    Xiao Y. Flow-net methodology for accountability in wireless networks. IEEE Network, Vol. 23, No. 5, Sept./Oct. 2009, 3037.
  • 84
    Xiao Y, Meng K, Takahashi D. Implementation and evaluation of accountability using flow-net in wireless networks. Proc. of IEEE MILCOM 2010
  • 85
    Elmasri R, Navathe SB. Fundamentals of Database Systems, 5th edn, Pearson Education, Benjamin/Cummings, 2006.
  • 86
  • 87
  • 88
  • 89
  • 90
    Ding L, Dixon B. Using an edge-dual graph and k-connectivity to identify strong connections in social networks. Proc. of the ACM 46th Annual Southeast Regional Conference, 475480, 2008.