Выбрать главу

CHAUDHARY, A, and CHAUBE, M.K. (Чаудхари и Чаубе): «Hiding MP3 in Colour Image Using Whale Optimization», Proc. Second Int’l Conf. on Vision, Image, and Signal Processing, ACM, Art. 54, 2018.

CHEN, S., and NAHRSTEDT, K. (Чэнь и Нарштедт): «An Overview of QoS Routing for Next-Generation Networks», IEEE Network Magazine, vol. 12, pp. 64–69, Nov./Dec. 1998.

CHEN, X., FEIBISH, S., KORAL, Y., REXFORD, J., ROTTENSTREICH, O., MONETTI, S., WANG, T. (Чэнь и др.): «Fine-Grained Queue Measurement in the Data Plane», CoNext, ACM, Dec. 2019.

CHIU, D., and JAIN, R. (Чиу и Джейн): «Analysis of the Increase and Decrease Algorithms for Congestion Avoidance in Computer Networks», Comput. Netw. ISDN Syst., vol. 17, pp. 1–4, June 1989.

CLANCY, T.C., MCGWIER, R.W., and CHEN, L. (Клэнси и др.): «Post-Quantum Crypto­graphy and 5G Security: A Tutorial», Proc. WiSec, ACM, pp. 285–287, 2019.

CLARK, D.D. (Кларк): «The Design Philosophy of the DARPA Internet Protocols», Proc. SIG-COMM ’88 Conf., ACM, pp. 106–114, 1988.

CLARK, D.D.: «Window and Acknowledgement Strategy in TCP», RFC 813, July 1982.

CLARK, D.D., JACOBSON, V., ROMKEY, J., and SALWEN, H. (Кларк и др.): «An Analysis of TCP Processing Overhead», IEEE Commun. Magazine, vol. 27, pp. 23–29, June 1989.

CLARK, D.D., SHENKER, S., and ZHANG, L. (Кларк и др.): «Supporting Real-Time Applications in an Integrated Services Packet Network», Proc. SIGCOMM ’92 Conf., ACM, pp. 14–26, 1992.

CLARKE, A.C. (Кларк): «Extra-Terrestrial Relays», Wireless World, 1945.

CLARKE, I., MILLER, S.G., HONG, T.W., SANDBERG, O., and WILEY, B. (Кларк и др.): «Protecting Free Expression Online with Freenet», IEEE Internet Computing, vol. 6, pp. 40–49, Jan.–Feb. 2002.

CODING, M. (Кодинг): «JavaScript for Beginners», Seattle: Amazon, 2019.

COHEN, B. (Коэн): «Incentives Build Robustness in BitTorrent», Proc. First Workshop on Economics of Peer-to-Peer Systems, June 2003.

COLBACH, B. (Кольбах): «Bluetooth Tutoriaclass="underline" Design, Protocol and Specifications for BLE — Bluetooth Low Energy 4.0 and Bluetooth 5», Seattle: Amazon Kindle, 2019.

COMER, D.E. (Комер): The Internet Book, 4th ed., Upper Saddle River, NJ: Prentice Hall, 2007.

COMER, D.E.: «Internetworking with TCP/IP», vol. 1, 6th ed., Upper Saddle River, NJ: Pren- tice Hall, 2013.

CRAVER, S.A., WU, M., LIU, B., STUBBLEFIELD, A., SWARTZLANDER, B., WALLACH, D.W., DEAN, D., and FELTEN, E.W. (Крейвер и др.): «Reading Between the Lines: Lessons from the SDMI Challenge», Proc. 10th USENIX Security Symp., USENIX, 2001.

CROCKER, S.D. (Крокер): «The Arpanet and Its Impact on the State of Networking», IEEE Computer, vol. 52, pp-14–23, Oct. 2019.

CROVELLA, M., and KRISHNAMURTHY, B. (Кровелла и Кришнамурти): «Internet Measurement», New York: John Wiley & Sons, 2006.

CUEVAS, R., KRYCZKA, M., GINZALEZ, R., CUEVAS, A., and AZCORRZ, A. (Куэвас): «Torrent-Guard: Stopping Scam and Malware Distribution in the BitTorrent Ecosystem», Com puter Networks, vol. 59, pp. 77–90, 2014.

DAEMEN, J., and RIJMEN, V. (Дамен и Рэймен): «The Design of Rijndael», Berlin: Sprin­ger-Verlag, 2002.

DAGON, D., ANTONAKAKIS, M., VIXIE, P., JINMEI, T., and LEE, W. (Дейгон и др.): «Increased DNS Forgery Resistance Through 0x20-bit Encoding», Proceedings of the 15th ACM Conf. on Computer and Commun. Security, ACM, pp. 211–222, 2008.

DALAL, Y., and METCLFE, R. (Далал и Меткалф): «Reverse Path Forwarding of Broadcast Packets», Commun. of the ACM, vol. 21, pp. 1040–1048, Dec. 1978.

DAN, K., KITAGAWA, N., SAKURABA, S., and YAMAI, N. (Дэн и др.): «Spam Domain Detection Method Using Active DNS Data and E-Mail Reception Log», Proc. 43rd Computer Softw. and Appl. Conf., IEEE, pp. 896–899, 2019.

DAVIE, B., and FARREL, A. (Дейви и Фаррел): «MPLS: Next Steps», San Francisco: Morgan Kaufmann, 2008.

DAVIE, B., and REKHTER, Y. (Дейви и Рехтер): «MPLS Technology and Applications», San Francisco: Morgan Kaufmann, 2000.

DAVIES, J. (Дэвис): «Understanding IPv6», 2nd ed., Redmond, WA: Microsoft Press, 2008.

DAVIS, J. (Дэвис): «Wifi Technology: Advances and Applications», New York: NY Research Press, 2018.

DAY, J.D. (Дэй): «The (Un)Revised OSI Reference Model», Computer Commun. Rev., vol. 25, pp. 39–55, Oct. 1995.

DAY, J.D., and ZIMMERMANN, H. (Дэй и Циммерман): «The OSI Reference Model», Proc. of the IEEE, vol. 71, pp. 1334–1340, Dec. 1983.

DE ANDRADE, M., MAIER, M., MCGARRY, M., REISSLEIN, M. (Де Андраде и др.): «Passive optical network (PON) supported networking», Optical Switching and Networking, 2014.

DE MARCO, G., and KOWALSKI, D. (Де Марко и Ковальски): «Contention Resolution in a Nonsynchronized Multiple Access Channel», J. of Theoretical Computer Science, vol. 689, pp. 1–13, Aug. 2017.

DEAN, J., and GHEMAWAT, S. (Дин и Гемават): «MapReduce: a Flexible Data Processing Tool», Commun. of the ACM, vol. 53, pp. 72–77, Jan. 2008.

DEERING, S.E. (Диринг): «SIP: Simple Internet Protocol», IEEE Network Magazine, vol. 7, pp. 16–28, May/June 1993.

DEERING, S.E., and CHERITON, D. (Диринг и Черитон): «Multicast Routing in Datagram Networks and Extended LANs», ACM Trans. on Computer Systems, vol. 8, pp. 85–110, May 1990.

DEMERS, A., KESHAV, S., and SHENKER, S. (Демерс и др.): «Analysis and Simulation of a Fair Queueing Algorithm», Internetwork: Research and Experience, vol. 1, pp. 3–26, Sept. 1990.

DENNING, D.E., and SACCO, G.M. (Деннинг и Сакко): «Timestamps in Key Distribution Protocols», Commun. of the ACM, vol. 24, pp. 533–536, Aug. 1981.

DIFFIE, W., and HELLMAN, M.E. (Диффи и Хеллман): «Exhaustive Cryptanalysis of the NBS Data Encryption Standard», IEEE Computer, vol. 10, pp. 74–84, June 1977.

DIFFIE, W., and HELLMAN, M.E. (Диффи и Хеллман): «New Directions in Cryptography», IEEE Trans. on Information Theory, vol. IT-2, pp. 644–654, Nov. 1976.

DIJKSTRA, E.W. (Дейкстра): «A Note on Two Problems in Connexion with Graphs», Numer. Math., vol. 1, pp. 269–271, Oct. 1959.

DIZDAREVIC, J., CARPIO, D., JUKAN, A., and MASIP-BRUIN, X. (Диздаревич и др.): «A Survey of Communication Protocols for Internet of Things and Related Challenges of Fog and Cloud Computing Integration», ACM Computing Surveys, vol. 51, Art. 116, Jan. 2019.

DONAHOO, M., and CALVERT, K. (Донаху и Калверт): «TCP/IP Sockets in C», 2nd ed., San Francisco: Morgan Kaufmann, 2009.

DONAHOO, M., and CALVERT, K. (Донаху и Калверт): «TCP/IP Sockets in Java», 2nd ed., San Francisco: Morgan Kaufmann, 2008.

DORFMAN, R. (Дорфман): «Detection of Defective Members of a Large Population», Annals Math. Statistics, vol. 14, pp. 436–440, 1943.

DU, W. (Ду): «Computer & Internet Security: A Hands-on Approach», 2nd ed., Seattle: Amazon, 2019.

DUTCHER, B. (Датчер): «The NAT Handbook», New York: John Wiley & Sons, 2001.

EL GAMAL, T. (Эль Гамаль): «A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms», IEEE Trans. on Information Theory, vol. IT-1, pp. 469–472, July 1985.

ESPOSITO, V. (Эспозито): «Cryptography for Beginners: a Useful Support for Under­standing», Seattle: Amazon Digital Services, 2018.

FALL, K. (Фолл): «A Delay-Tolerant Network Architecture for Challenged Internets», Proc. SIG-COMM 2003 Conf., ACM, pp. 27–34, Aug. 2003.

FAWAZ, K., and SHIN, K.G. (Фаваз и Шин): «Security and Privacy in the Internet of Things», IEEE Computer, vol. 52, pp. 40–49, Apr. 2019.

FEAMSTER, N., BALAKRISHNAN, H., REXFORD, J., SHAIKH, A., and VAN DER MERWE, J. (Фимстер и др.): «The Case for Separating Routing from Routers», Proc. SIGCOMM Workshop on Future Directions in Network Architecture, ACM, pp. 5–12, 2004.

FEAMSTER, N., and LIVINGOOD, J. (Фимстер и Ливингуд): «Internet Speed Measurement: Current Challenges and Future Recommendations», Commun. of the ACM, ACM, 2020.

FEAMSTER, N., REXFORD, J., and ZEGURA, E. (Фимстер и др.): «The Road to SDN», ACM Queue, vol. 11, p. 20, Dec. 2013.

FENNER, B., HANDLEY, M., HOLBROOK, H., and KOUVELAS, I. (Феннер и др.): «Protocol Independent Multicast-Sparse Mode (PIM-SM)», RFC 4601, Aug. 2006.

FERGUSON, N., SCHNEIER, B., and KOHNO, T. (Фергюсон и др.): «Cryptography Engineering: Design Prin- ciples and Practical Applications», New York: John Wiley & Sons, 2010.

FLETCHER, J. (Флетчер): «An Arithmetic Checksum for Serial Transmissions», IEEE Trans. on Commun., vol. COM-0, pp. 247–252, Jan. 1982.

FLOYD, S., HANDLEY, M., PADHYE, J., and WIDMER, J. (Флойд и др.): «Equation-Based Congestion Control for Unicast Applications», Proc. SIGCOMM 2000 Conf., ACM, pp. 43–56, Aug. 2000.

FLOYD, S., and JACOBSON, V. (Флойд и Джейкобсон): «Random Early Detection for Congestion Avoidance», IEEE/ACM Trans. on Networking, vol. 1, pp. 397–413, Aug. 1993.

FLUHRER, S., MANTIN, I., and SHAMIR, A. (Флюрер и др.): «Weakness in the Key Scheduling Algorithm of RC4», Proc. Eighth Ann. Workshop on Selected Areas in Cryptography, Springer-Verlag LNCS 2259, pp. 1–24, 2001.

FONTUGNE, R., ABRY, P., FUKUDA, K., VEITCH, D., BORGNAT, P., and WENDT, H. (Фонтюнь и др.): «Scaling in Internet Traffic: A 14 Year and 3 Day Longitudinal Study, With Multiscale Analyses and Random Projections», IEEE/ACM Trans. on Networking, vol. 25, pp. 2152–2165, Aug. 2017.

FORD, B. (Форд): «Structured Streams: A New Transport Abstraction», Proc. SIGCOMM 2007 Conf., ACM, pp. 361–372, 2007.

FORD, L.R., Jr., and FULKERSON, D.R. (Форд и Фалкерсон): «Flows in Networks», Princeton, NJ: Princeton University Press, 1962.

FORD, W., and BAUM, M.S. (Форд и Баум): «Secure Electronic Commerce», Upper Saddle River, NJ: Pren tice Hall, 2000.

FORNEY, G.D. (Форни): «The Viterbi Algorithm», Proc. of the IEEE, vol. 61, pp. 268–278, Mar. 1973.

FOSTER, N., HARRISON, R., FREEDMAN, M., MONSANTO, C., REXFORD, J., STORY, A., and WALKER, D. (Фостер и др.): «Frenetic: A Network Programming Language», ACM Sigplan Notices, vol. 46, pp. 279–291, Sep. 2011.

FRANCIS, P. (Фрэнсис): «A Near-Term Architecture for Deploying Pip», IEEE Network Magazine, vol. 7, pp. 30–37, May/June 1993.

FRASER, A.G. (Фрейзер): «Towards a Universal Data Transport System», IEEE J. on Selected Areas in Commun., vol. 5, pp. 803–816, Nov. 1983.

FRIDRICH, J. (Фридрих): «Steganography in Digital Media: Principles, Algorithms, and Applications», Cambridge: Cambridge University Press, 2009.

FULLER, V., and LI, T. (Фуллер и Ли): «Classless Inter-domain Routing (CIDR): The Internet Address Assignment and Aggregation Plan», RFC 4632, Aug. 2006.

GALLAGER, R.G. (Галлагер): «A Minimum Delay Routing Algorithm Using Distributed Computation», IEEE Trans. on Commun., vol. COM-5, pp. 73–85, Jan. 1977.

GALLAGER, R.G.: «Low-Density Parity Check Codes», IRE Trans. on Information Theory, vol. 8, pp. 21–28, Jan. 1962.

GARCIA-LUNA-ACEVES, J. (Гарсия-Луна-Асевес): «Carrier-Sense Multiple Access with Collision Avoidance and Detection», Proc. 20th Int’l Conf. on Modelling, Analysis, and Simulation of Wireless and Mobile Systems, ACM, pp. 53–61, Nov. 2017.

GETTYS, J. (Геттис): «Bufferbloat: Dark Buffers in the Internet», IEEE Internet Computing, IEEE, p. 96, 2011.

GILDER, G. (Гилдер): «Metcalfe’s Law and Legacy», Forbes ASAP, Sept. 13, 1993.

GORALSKI, W. (Горальски): «The Illustrated Network: How TCP/IP Works in a Modern Network», 2nd ed., San Francisco: Morgan Kaufmann, 2017.

GRAYSON, M., SHATZKAMER, K., and WAINNER, S. (Грейсон и др.): «IP Design for Mobile Networks», Indianapolis, IN: Cisco Press, 2009.

GROBE, K., and EISELT, M. (Гроуб и Эйзелт): «Wavelength Division Multiplexing: A Practical Engineering Guide», New York: John Wiley & Sons, 2013.

GROBE, K., and ELBERS, J. (Гроуб и Элберс): «PON in Adolescence: From TDMA to WDM-PON», IEEE Commun. Magazine, vol. 46, pp. 26–34, Jan. 2008.

GROSS, G., KAYCEE, M., LIN, A., MALIS, A., and STEPHENS, J. (Гросс и др.): «The PPP Over AAL5», RFC 2364, July 1998.

GUPTA, A., HARRISON, R., CANINI, M., FEAMSTER, N., REXFORD, J., and WILLINGER, W. (Гупта и др.): «Sonata: Query-driven Streaming Network Telemetry», Proc. SIGCOMM 2018 Conf., ACM, pp. 357–371, 2018.

HA, S., RHEE, I., and LISONG, X. (Ха и др.): «CUBIC: A New TCP-Friendly High-Speed TCP Variant», SIGOPS Oper. Syst. Rev., vol. 42, pp. 64–74, June 2008.

HALLBERG, G. (Халльберг): «Quality of Service in Modern Packet Networks», Seattle: Amazon, 2019.

HALPERIN, D., HEYDT-BENJAMIN, T., RANSFORD, B., CLARK, S., DEFEND, B., MORGAN, W., FU, K., KOHNO, T., and MAISEL, W. (Халперин и др.): «Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses», IEEE Symp. on Security and Privacy, pp. 129–142, May 2008.

HALPERIN, D., HU, W., SHETH, A., and WETHERALL, D. (Халперин и др.): «802.11 with Multiple Antennas for Dummies», Computer Commun. Rev., vol. 40, pp. 19–25, Jan. 2010.