B. Lee, Y. Kim, and J. Kim. Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, page 271--281. New York, NY, USA, ACM, (2010)
A. Blum, B. Wardman, T. Solorio, and G. Warner. Proceedings of the 3rd ACM workshop on Artificial intelligence and security, page 54--60. New York, NY, USA, ACM, (2010)
Y. Park, D. Reeves, V. Mulukutla, and B. Sundaravel. Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research, page 45:1--45:4. New York, NY, USA, ACM, (2010)
P. Owezarski, J. Mazel, and Y. Labit. Wired/Wireless Internet Communications, volume 6074 of Lecture Notes in Computer Science, Springer Berlin / Heidelberg, 10.1007/978-3-642-13315-2_27.(2010)
Z. Li, Y. Liang, Z. Wu, and C. Tan. Bio-Inspired Models of Network, Information and Computing Systems, 2007. Bionetics 2007. 2nd, page 57 -64. (December 2007)
D. Chen, J. Liu, G. Sun, and J. Han. Computer Network and Multimedia Technology, 2009. CNMT 2009. International Symposium on, page 1 -4. (January 2009)
K. Huang, Y. Ye, and Q. Jiang. Anti-counterfeiting, Security, and Identification in Communication, 2009. ASID 2009. 3rd International Conference on, page 509 -512. (August 2009)
Y. Wang, Y. Ye, H. Chen, and Q. Jiang. Anti-counterfeiting, Security, and Identification in Communication, 2009. ASID 2009. 3rd International Conference on, page 544 -547. (August 2009)