[1]Ding-Jie Huang, Kai-Ting Yang, Chien-Chun Ni, Wei-Chung Teng, Tien-Ruey Hsiang, and Yuh-Jye Lee, “Clock Skew Based Client Device Identification in Cloud Environments,” The 26th IEEE International Conference on Advanced Information Networking and Applications (IEEE AINA 2012) , pp. 526-533, 2012.
[2]鄭理介(2013)。《基於時脈偏移的可攜式裝置識別技術》。國立臺灣科技大學碩士論文,未出版,臺北市。[3]Makoto Aoki, Eiji Oki, and Roberto Rojas-Cessa, “Measurement Scheme for One-Way Delay Variation with Detection and Removal of Clock Skew,” ETRI journal, vol. 32, no. 6, pp. 854-862, 2010.
[4]Vern Paxson, “On Calibrating Measurements of Packet Transit Times,” ACM SIGMETRICS joint international conference on Measurement and modeling of computer systems (SIGMETRICS 1998/PERFORMANCE 1998), vol. 26, no. 1, pp. 11-21, 1998.
[5]Sue B. Moon, Paul Skell, and Don Towsley, “Estimation and Removal of Clock Skew from Network Delay Measurements,” IEEE INFOCOM '99. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings vol. 1, pp. 1-25, 1999.
[6]Tadayoshi Kohno, Andre Broido, and Kc Claffy, “Remote Physical Device Fingerprinting,” IEEE Transactions on Dependable and Secure Computing, vol. 2, no. 2, pp. 93-108, 2005.
[7]Steven J. Murdoch, “Hot or not: Revealing Hidden Services by Their Clock Skew,” in Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 27-36, 2006.
[8]Roger Dingledine, Nick Mathewson, and Paul Syverson. “Tor: The Second-Generation Onion Router,” in Proceedings of the 13th conference on USENIX Security Symposium, vol. 13, pp. 21-21, 2004.
[9]Sebastian Zander and Steven J. Murdoch, “An Improved Clock-skew Measurement Technique for Revealing Hidden Services,” in Proceedings of the 17th conference on Security symposium, pp. 211-225, 2008.
[10]Suman Jana and Sneha Kumar Kasera, “On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews,” in Proceedings of the 14th ACM International Conference on Mobile Computing and Networking, pp. 104-115, 2008.
[11]Chrisil Arackaparambil, Sergey Bratus, Anna Shubina, and David Kotz “On the Reliability of Wireless Fingerprinting Using Clock Skews.” in Proceedings of the third ACM conference on Wireless network security (WiSec 2010), pp. 169-174, 2010
[12]Ding-Jie Huang, Wei-Chung Teng, Chih-Yuan Wang, Hsuan-Yu Huang, and Joseph M. Hellerstein, “Clock Skew Based Node Identification in Wireless Sensor Networks,” IEEE Global Communications Conference (GLOBECOM 2008), pp. 1-5, 2008.
[13]Ding-Jie Huang and Wei-Chung Teng, “A defense against clock skew replication attacks in wireless sensor networks,” Journal of Network and Computer Applications, Elsevier, vol. 39, pp. 26-37, 2013.
[14]Xiaowei Mei, Donggang Liu, Kun Sun, and Dingbang Xu, “On Feasibility of Fingerprinting Wireless Sensor Nodes Using Physical Properties,” IEEE 27th International Symposium on Parallel &; Distributed Processing (IPDPS 2013), pp. 1112-1121, 2013.
[15]Marius Cristea and Bogdan Groza, “Fingerprinting Smartphones Remotely via ICMP Timestamps,” IEEE Communications Letters, vol. 17, no. 6, pp. 1081-1083, 2013.
[16]Md. Borhan Uddin and Claude Castelluccia, “Toward Clock Skew Based Wireless Sensor Node Services,” in The 5th Annual ICST Wireless Internet Conference, pp. 1-9, 2010.
[17]Paul V. C. Hough, “Method and Means for Recognizing Complex Patterns,” U.S. Patent 3,069,654, 1962.
[18]Richard O. Duda and Peter E. Hart, “Use of the Hough Transformation to Detect Lines and Curves in Pictures,” Communications of the ACM, vol. 15, no. 1, pp. 11-15, 1972.
[19]Peter E. Hart, “How the Hough Transform Was Invented,” IEEE Signal Processing Magazine, vol. 26, no. 6,pp. 18-22, 2009.
[20]鍾國亮(2012)。《影像處理與電腦視覺》。臺北市:臺灣東華書局股份有限公司。
[21]Swati Sharma, Alefiya Hussain, and Huzur Saran, “Experience with Heterogenous Clock-skew Based Device Fingerprinting,” in Proceedings of the 2012 Workshop on Learning from Authoritative Security Experiment Results (LASER 2012), pp. 9-18, 2012.