Fangming Zhao, Takashi Nishide, Yoshiaki Hori, Kouichi Sakurai. Analysis of Methods for Detecting Compromised Nodes and its Countermeasures. In Kuinam J. Kim, Kyung-Yong Chung, editors, Proceedings of the International Conference on IT Convergence and Security, ICITCS 2012, Pyeong Chang, Korea, December 5-7, 2012. Volume 215 of Lecture Notes in Electrical Engineering, pages 53-60, Springer, 2012. [doi]
@inproceedings{ZhaoNHS12, title = {Analysis of Methods for Detecting Compromised Nodes and its Countermeasures}, author = {Fangming Zhao and Takashi Nishide and Yoshiaki Hori and Kouichi Sakurai}, year = {2012}, doi = {10.1007/978-94-007-5860-5_7}, url = {http://dx.doi.org/10.1007/978-94-007-5860-5_7}, researchr = {https://researchr.org/publication/ZhaoNHS12}, cites = {0}, citedby = {0}, pages = {53-60}, booktitle = {Proceedings of the International Conference on IT Convergence and Security, ICITCS 2012, Pyeong Chang, Korea, December 5-7, 2012}, editor = {Kuinam J. Kim and Kyung-Yong Chung}, volume = {215}, series = {Lecture Notes in Electrical Engineering}, publisher = {Springer}, isbn = {978-94-007-5859-9}, }