[1] Grizzard JB,Sharma V,Nunnery C Peer-to-PeerBotnets:Overview And Case Study[C], In Proc.of the 1stWorkshop on Hot Topics in Understanding Botnets(Hot—Bots 2007),Boston,2007.
[2] Ying Ling-yun, Feng Deng-guo, Su Pu-rui, P2P-Based Super Botnet:Threats and Defenses, ACTA ELECTRONICA SINICA, 2009.
[3] Fran?ois Jér?me, State Radu, Festor Olivier, Towards malware inspired management frameworks, IEEE/IFIP Network Operations and Management Symposium, 2008.
[4] Chen Lu-Ying, Wang Xin-Liang, Zhao Xin, et al, “Research of botnet anomaly detection algorithm based on private protocol”, Proceedings of 2010 3rd IEEE International Conference on Broadband Network & Multimedia Technology, pp.55-59, 2010.
[5] Wang Xin-Liang, Lu Nan, Wang Cui-Cui, “Research of botnet detection based on multi-stage classifier”, Proceedings of the 2011 International Conference on Electrical, Information Engineering and Mechatronics, pp.1463-1472, 2011.
[6] Lu Nan, Wang Xin-Liang, Liu Fang, et al, “Research of the combined botnet detection method based on random subspace”, 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology, pp.615-619, 2011.
[7] Ma Xiao-Bo, Guan Xiao-Hong, Tao Jing, et al, “A novel IRC botnet detection method based on packet size sequence”, 2010 IEEE International Conference on Communications, pp.1-5, 2010.
[8] Genevieve Bartlett, John Heidemann, Christos Papadopoulos, “Low-rate, flow-level periodicity detection”, 2011 IEEE Conference on Computer Communications Workshops, pp.804-809, 2011.
[9] Bennett C H, Brassard G, Quantum cryptography: Public-key distribution and coin tossing, Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, pp.175-179, 1984.
[10] Ekert A K, Quantum cryptography based on Bell’s theorem, Phys. Rev. Lett., vol. 67, no. 6, pp.661-663, 1991.
[11] Bennett C H, Quantum cryptography using any two nonorthogonal states, Phys. Rev. Lett., vol. 68, no. 21, pp.3121-3124, 1992.
[12] Goldenberg L, Vaidman L, Quantum Cryptography based on Orthogonal States, Phys. Rev. Lett., vol. 75, pp.1239-1243, 1995.
[13] Beige A, Englert B G, Kurtsiefer C, et al, Secure communication with a publicly known key, Acta Phys Pol A, vol. 101, no. 3, pp.357-368, 2002.
[14] Bostrom K, Felbinger T, Deterministic secure direct communication using entanglement, Phys. Rev. Lett., vol. 89, no. 18, pp.7902-7905, 2002.
[15] Deng Fu-Guo, Long Gui-Lu, Liu Xiao-Shu, Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block, Phys. Rev. A., vol. 68, no. 4, pp. 042317-042324, 2003.
[16] Deng Fu-Guo, Long Gui-Lu, Secure direct communication with a quantum one-time pad, Phys. Rev. A, vol. 69, no. 5, pp.1-4, 2004.
[17] Ba An Nguyen, Quantum dialogue, Phys. Lett. A, vol. 328, no. 1, pp. 6-10, 2004.
[18] Sameh El-ansary, Luc Onana Alima, Per Brand, Seif Haridi, Efficient Broadcast in Structured P2P Network, In 2nd International Workshop on Peer-to-Peer Systems, 2003. |