Surveillance/Attributions: Difference between revisions

No edit summary
No edit summary
Line 1: Line 1:
AbuHmed, T. Mohaisen, A. Nyang, D. (2008). 'A Survey on Deep Packet Inspection for Intrusion Detection Systems.' ''eprint arXiv.org''. 0803.0037, 3, 2008. [http://arxiv.org/abs/0803.0037v1 http://arxiv.org/abs/0803.0037v1]
Licence: © 2010 AbuHmed et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.<br>
Gayo-Avello, D. (2010). 'All liaisons are dangerous when all your friends are known to us.' ''eprint arXiv.org''.&nbsp;1012.5913, 12, 2010.&nbsp;[http://arxiv.org/abs/1012.5913 http://arxiv.org/abs/1012.5913]  
Gayo-Avello, D. (2010). 'All liaisons are dangerous when all your friends are known to us.' ''eprint arXiv.org''.&nbsp;1012.5913, 12, 2010.&nbsp;[http://arxiv.org/abs/1012.5913 http://arxiv.org/abs/1012.5913]  


Licence: © 2010 Gayo-Avello. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.  
Licence: © 2010 Gayo-Avello. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.  


<br>


Kholghi, M. Keyvanpour, M. (2011). 'An analytical framework for data stream mining techniques based on challenges and requirements.' ''eprint arXiv.org''. 1105.1950, 5, 2011.&nbsp;[http://arxiv.org/abs/1105.1950 http://arxiv.org/abs/1105.1950]


Kholghi, M. Keyvanpour, M. (2011). 'An analytical framework for data stream mining techniques based on challenges and requirements.' ''eprint arXiv.org''. 1105.1950, 5, 2011.&nbsp;[http://arxiv.org/abs/1105.1950 http://arxiv.org/abs/1105.1950]
Licence: © 2011 Khoglhi et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.  
 
Licence: © 2011 Khoglhi et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
 


<br>


Lee SH, Kim P-J, Ahn Y-Y, Jeong H, (2010). 'Googling Social Interactions: Web Search Engine Based Social Network Construction.' PLoS ONE 5(7): e11233. 3, 2010.&nbsp;[http://www.plosone.org/article/info:doi/10.1371/journal.pone.0011233 doi:10.1371/journal.pone.0011233]  
Lee SH, Kim P-J, Ahn Y-Y, Jeong H, (2010). 'Googling Social Interactions: Web Search Engine Based Social Network Construction.' PLoS ONE 5(7): e11233. 3, 2010.&nbsp;[http://www.plosone.org/article/info:doi/10.1371/journal.pone.0011233 doi:10.1371/journal.pone.0011233]  


Licence: © 2010 Lee et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
Licence: © 2010 Lee et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.

Revision as of 15:39, 21 August 2011

AbuHmed, T. Mohaisen, A. Nyang, D. (2008). 'A Survey on Deep Packet Inspection for Intrusion Detection Systems.' eprint arXiv.org. 0803.0037, 3, 2008. http://arxiv.org/abs/0803.0037v1

Licence: © 2010 AbuHmed et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.

Gayo-Avello, D. (2010). 'All liaisons are dangerous when all your friends are known to us.' eprint arXiv.org. 1012.5913, 12, 2010. http://arxiv.org/abs/1012.5913

Licence: © 2010 Gayo-Avello. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.


Kholghi, M. Keyvanpour, M. (2011). 'An analytical framework for data stream mining techniques based on challenges and requirements.' eprint arXiv.org. 1105.1950, 5, 2011. http://arxiv.org/abs/1105.1950

Licence: © 2011 Khoglhi et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.


Lee SH, Kim P-J, Ahn Y-Y, Jeong H, (2010). 'Googling Social Interactions: Web Search Engine Based Social Network Construction.' PLoS ONE 5(7): e11233. 3, 2010. doi:10.1371/journal.pone.0011233

Licence: © 2010 Lee et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.