|
L. M. Adleman, "Molecular Computation of Solution to Combinatorial Problems," Science, New Series, vol. 266, No. 5187, pp.1021-1024, Nov. 1994
|
|
G. Badishi, A. Herzberg, and I. Keidar, "Keeping Denial-of-Service Attackers in the Dark," IEEE Transactions on Dependable and Secure Computing, vol. 4, no. 3, pp. 191-204, 2007
|
|
G. Badishi, A. Herzberg, I. Keidar, O. Romanov, and A. Yachin, "Denial of Service? Leave it to Beaver," Working Paper, TR CCIT, vol. 595, 2006
|
|
G. Badishi, I. Keidar, A. Herzberg, O. Romanov and A. Yachin, "Denial of Service Protection with Beaver," From Security to Dependability Proceedings of Dagstuhl Seminar, pp.1-6, 2007
|
|
M. Carvalho and R. Ford, "Moving-Target Defenses for Computer Networks," IEEE symposium on security and privacy, vol. 12, no. 2, pp. 73-76, 2014
|
|
C. T. Clelland, V. Risca, and C. Bancroft, "Hiding Messages in DNA Microdots," Nature, vol. 399, pp.533-534, 1999
|
|
G. Z. Cui, L. M. Qin, Y. F. Wang, and X. C. Zhang, "Information Security Technology Based on DNA Computing," IEEE International Workshop on Anti-Counterfeiting, Security, Identification IEEE, pp.288-291, Xiamen, China, 2007
|
|
Z. Fu, M. Papatriantafilou, and P. Tsigas, "Mitigating Distributed Denial of Service Attacks in Multiparty Applications in the Presence of Clock Drifts," IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 3, pp. 401-413, 2008
|
|
R. Guesmi, M. A. B. Farah, A. Kachouri, and Samet, "A novel Chaos-Based Image Encryption Using DNA Sequence Operation and Secure Hash Algorithm SHA-2," Nonlinear Dynamics, vol. 83, no. 3, pp.1123-1136, 2016
|
|
K. Hari and T. Dohi, "Dependability Modeling and Analysis of Random Port Hopping," Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and trusted Computing, pp.586-593, Fukuoka, Japan, 2012
|
|
K. Hari and T. Dohi, "Sensitivity Analysis of Random Port Hopping," Proceedings of the 2nd International Symposium on Multidisciplinary Emerging Networks and Systems (MENS-2010), IEEE CS Press, pp.316-321, Xi’an, China, 2010
|
|
M. I. Khalil, "Real-Time Encryption/Decryption of Audio Signal," International Journal of Computer Network and Information Security, vol. 8, no. 2, pp.25-31, 2016
|
|
D. Kumar and S. Singh, "Secret Data Writing Using DNA Sequences," In Emerging Trends in Networks and computer Communications (ETNCC), IEEE International Conference on, pp.402-405, Udaipur, Rajasthan, India, 2011
|
|
R. P. Kumar, J. Babu, T. Gunasekhar, and S. B. Bhushan, "Mitigating Application DDoS Attacks using Random Port Hopping Technique," International Journal of Emerging Research in Management and Technology, vol. 4, pp.1-4, 2015
|
|
H. C. J. Lee and V. L. Thing, "Port Hopping for Resilient Networks," vehicular technology conference, VTC2004-Fall. 2004 IEEE 60th, vol.5, pp. 3291-3295, 2004
|
|
Y. B. Luo, B. S. Wang, G. L. Cai, Luo, Yue Bin, B. S. Wang, and G. L. Cai. "Analysis of Port Hopping for Proactive Cyber Defense," International Journal of Security and Its Applications, vol. 9, no. 2, pp. 123-134, 2015
|
|
G. Madhulika, and C. S. Rao, "Generating Digital Signature Using DNA Coding," In Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA), Springer International Publishing, pp. 21-28, Bhubaneswar, India, 2014
|
|
Mousa and M. Hamdy, "DNA-Genetic Encryption Technique," International Journal of Computer Network and Information Security, vol. 8, 2016
|
|
E. Sitnikova and M. Asgarkhani, "A Strategic Framework for Managing Internet Security," 11th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), pp. 947-955, Xiamen, China, Aug 2014
|
|
L. Y. Shi, C. F. Jia, S. L, and Z. Liu, "Port and Address Hopping for Active Cyber-Defense," Lecture Notes in Computer Science, Springer, vol. 4430, pp.295-300, Berlin Heidelberg, 2007
|
|
A. K. Verma, M. Dave, and R. C. Joshi, “Securing Ad hoc Networks Using DNA Cryptography," IEEE International Conference on Computers and Devices for Communication (CODEC06), pp.781-786, Swissotel Kolkata, Indiak, December 2006
|
|
X. Wang and Q. Zhang, "DNA Computing-Based Cryptography," Fourth International Conference on Bio-Inspired Computing, Beijing, China, 2009
|
|
J. D. Waston and F. H. C. Crick, "A Structure for Deoxy Ribose Nucleic Acid," Nature, vol. 25, pp.737-738, 1953
|
|
Y. P. Zhang, Z. Yu, W. Zhong, and R. O. Sinnott, "Index-Based Symmetric DNA Encryption Algorithm," 4th International Congress on Image and Signal Processing IEEE, vol. 5, pp. 2290-2294, Shanghai, China, 2011
|