B. Lee, Y. Kim, und J. Kim. Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, Seite 271--281. New York, NY, USA, ACM, (2010)
A. Blum, B. Wardman, T. Solorio, und G. Warner. Proceedings of the 3rd ACM workshop on Artificial intelligence and security, Seite 54--60. New York, NY, USA, ACM, (2010)
Y. Park, D. Reeves, V. Mulukutla, und B. Sundaravel. Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research, Seite 45:1--45:4. New York, NY, USA, ACM, (2010)
P. Owezarski, J. Mazel, und Y. Labit. Wired/Wireless Internet Communications, Volume 6074 von Lecture Notes in Computer Science, Springer Berlin / Heidelberg, 10.1007/978-3-642-13315-2_27.(2010)
Z. Li, Y. Liang, Z. Wu, und C. Tan. Bio-Inspired Models of Network, Information and Computing Systems, 2007. Bionetics 2007. 2nd, Seite 57 -64. (Dezember 2007)
D. Chen, J. Liu, G. Sun, und J. Han. Computer Network and Multimedia Technology, 2009. CNMT 2009. International Symposium on, Seite 1 -4. (Januar 2009)
K. Huang, Y. Ye, und Q. Jiang. Anti-counterfeiting, Security, and Identification in Communication, 2009. ASID 2009. 3rd International Conference on, Seite 509 -512. (August 2009)
Y. Wang, Y. Ye, H. Chen, und Q. Jiang. Anti-counterfeiting, Security, and Identification in Communication, 2009. ASID 2009. 3rd International Conference on, Seite 544 -547. (August 2009)