Analysis of Methods for Detecting Compromised Nodes and its Countermeasures

Fangming Zhao, Takashi Nishide, Yoshiaki Hori, Kouichi Sakurai. Analysis of Methods for Detecting Compromised Nodes and its Countermeasures. In Kuinam J. Kim, Kyung-Yong Chung, editors, Proceedings of the International Conference on IT Convergence and Security, ICITCS 2012, Pyeong Chang, Korea, December 5-7, 2012. Volume 215 of Lecture Notes in Electrical Engineering, pages 53-60, Springer, 2012. [doi]

@inproceedings{ZhaoNHS12,
  title = {Analysis of Methods for Detecting Compromised Nodes and its Countermeasures},
  author = {Fangming Zhao and Takashi Nishide and Yoshiaki Hori and Kouichi Sakurai},
  year = {2012},
  doi = {10.1007/978-94-007-5860-5_7},
  url = {http://dx.doi.org/10.1007/978-94-007-5860-5_7},
  researchr = {https://researchr.org/publication/ZhaoNHS12},
  cites = {0},
  citedby = {0},
  pages = {53-60},
  booktitle = {Proceedings of the International Conference on IT Convergence and Security, ICITCS 2012, Pyeong Chang, Korea, December 5-7, 2012},
  editor = {Kuinam J. Kim and Kyung-Yong Chung},
  volume = {215},
  series = {Lecture Notes in Electrical Engineering},
  publisher = {Springer},
  isbn = {978-94-007-5859-9},
}