An infrastructure for detecting and punishing malicious hosts using mobile agent watermarking
Wireless Communications and Mobile Computing, Vo. 11, No. 11, pp. 1446–1462, November 2011
CTTC copyright disclaimer
For the reports in this repository we specifically note that
- the use of articles under IEEE copyright is governed by the IEEE copyright policy (available at http://www.ieee.org/web/publications/rights/copyrightpolicy.html)
- the use of articles under ACM copyright is governed by the ACM copyright policy (available at http://www.acm.org/publications/copyright-statement)
By accepting I agree to acknowledge and respect the rights of the copyright owner of the document I am about to access.