T-dominance: Prioritized defense deployment for BYOD security

Wei Peng, Feng Li, Keesook J. Han, Xukai Zou, Jie Wu 0001. T-dominance: Prioritized defense deployment for BYOD security. In IEEE Conference on Communications and Network Security, CNS 2013, National Harbor, MD, USA, October 14-16, 2013. pages 37-45, IEEE, 2013. [doi]

Authors

Wei Peng

This author has not been identified. Look up 'Wei Peng' in Google

Feng Li

This author has not been identified. Look up 'Feng Li' in Google

Keesook J. Han

This author has not been identified. Look up 'Keesook J. Han' in Google

Xukai Zou

This author has not been identified. Look up 'Xukai Zou' in Google

Jie Wu 0001

This author has not been identified. Look up 'Jie Wu 0001' in Google