參考文獻 |
[1] D. Anthony, T. Henderson, and D. Kotz. Privacy in location-aware computing environments. Pervasive Computing, IEEE, 6(4):64–72, Oct 2007.
[2] Marco Gruteser and Dirk Grunwald. Anonymous usage of locationbased services through spatial and temporal cloaking. In Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, MobiSys’03, pages 31–42. ACM, 2003.
[3] T.J. Walsh and R. Kuhn. Challenges in securing voice over ip. Security Privacy, IEEE, 3(3):44–49, May 2005.
[4] M. Srivatsa, A. Iyengar, Ling Liu, and Hongbo Jiang. Privacy in voip networks: Flow analysis attacks and defense. Parallel and Distributed Systems, IEEE Transactions on, 22(4):621–633, April 2011.
[5] M. Reed D. Goldschlag and P. Syverson. Onion routing for anonymous and private internet connections. In Communications of ACM, 42(2):246–255, May 1999.
[6] S. Das, G. Parulkar, N. McKeown, P. Singh, D. Getachew, and L. Ong. Packet and circuit network convergence with openflow. In Optical Fiber Communication, collocated National Fiber Optic Engineers Conference, pages 1–3, March 2010.
[7] Natasha Gude, Teemu Koponen, Justin Pettit, Ben Pfaff, Martín Casado, Nick McKeown, and Scott Shenker. Nox: Towards an operating system for networks. SIGCOMM Comput. Commun. Rev., 38(3):105–110, July 2008.
[8] M. Srivatsa, A. Iyengar, and Ling Liu. Privacy in voip networks: A k-anonymity approach. In INFOCOM 2009, IEEE, pages 2856– 2860, April 2009.
[9] R. Braga, E. Mota, and A. Passito. Lightweight ddos flooding attack detection using nox/openflow. In Local Computer Networks (LCN), 2010 IEEE 35th Conference on, pages 408–415, Oct 2010.
[10] T. Kohonen. The self-organizing map. Proceedings of the IEEE, 78(9):1464–1480, Sep 1990.
[11] Yifu Feng, Rui Guo, Dongqi Wang, and Bencheng Zhang. Research on the active ddos filtering algorithm based on ip flow. In Natural Computation, 2009. ICNC ’09. Fifth International Conference on, volume 4, pages 628–632, Aug 2009.
[12] Stefan Saroiu, P. Krishna Gummadi, and Steven D. Gribble. A measurement study of peer-to-peer file sharing systems. 2003.
[13] http://en.wikipedia.org/wiki/IPsec. ”ipsec”.
[14] Alexander Ageev, Refael Hassin, and Maxim Sviridenko. A 0.5- approximation algorithm for max dicut with given sizes of parts. SIAM J. Discret. Math., 14(2):246–255, February 2001.
[15] http://mininet.org/. ”mininet”.
[16] http://www.projectfloodlight.org/floodlight/. ”project floodlight”. [17] http://estinet.com/. ”estinet”. |