共 19 条
[1]
Padmanabhan V.N., Subramanian L., An investigation of geographic mapping techniques for Internet hosts, ACM SIGCOMM Comp. Commun. Rev., 31, 4, pp. 173-185, (2001)
[2]
Muir J.A., Oorschot P.C.V., Internet geolocation: evasion and counterevasion, ACM Comput. Surv., 42, 1, pp. 1-22, (2009)
[3]
Gondree M., Peterson Z.N., Geolocation of data in the cloud, proceedings of the third ACM conference on data and application security and privacy, ACM, pp. 25-36, (2013)
[4]
Peterson Z.N., Gondree M., Beverly R., A position paper on data sovereignty: the mportance of geolocating data in the cloud, proceedings of the 8th USENIX conference on networked systems design and implementation, (2011)
[5]
Gueye B., Ziviani A., Crovella M., Fdida S., Constraint-based geolocation of Internet hosts, IEEE/ACM Trans. Networking, 14, 6, pp. 1219-1232, (2006)
[6]
Katz-Bassett E., John J.P., Krishnamurthy A., Wetherall D., Anderson T., Chawathe Y., Towards IP geolocation using delay and topology measurements, proceedings of the 6th ACM SIGCOMM conference on Internet measurement, pp. 71-84, (2006)
[7]
Wong B., Stoyanov I., Sirer E.G., Octant: a comprehensive framework for the geolocation of Internet hosts, proceedings of USENIX NSDI conference, pp. 23-36, (2007)
[8]
Wang Y., Burgener D., Flores M., Kuzmanovic A., Huang C., Towards street-level client-independent IP geolocation, proceedings of the 8th USENIX conference on networked systems design and implementation, pp. 27-36, (2011)
[9]
Eriksson B., Barford P., Sommers J., Nowak R., A learning-based approach for IP geolocation, proceedings of passive and active measurements conference, pp. 171-180, (2010)
[10]
Guo P., Wang J., Li B., Lee S., A variable threshold-value authentication architecture for wireless mesh networks, J. Internet Technol., 15, 6, pp. 929-936, (2014)