-
1
-
-
84992267980
-
Internet watch: Mapping the Internet
-
Apr.
-
H. Burch and B. Cheswick, "Internet watch: Mapping the Internet," Computer, 32(4):97-98, Apr. 1999.
-
(1999)
Computer
, vol.32
, Issue.4
, pp. 97-98
-
-
Burch, H.1
Cheswick, B.2
-
3
-
-
10044275248
-
-
Caida. Skitter, http://www.caida.org/tools/measurement/-skitter/, 2000.
-
(2000)
-
-
-
6
-
-
0242456132
-
Breaking the barriers: High performance security for HighPerformance computing
-
Kay Connelly and Andrew A. Chien, "Breaking the Barriers: High Performance Security for HighPerformance Computing," in New Security Paradigms Workshop '02, 2000.
-
(2000)
New Security Paradigms Workshop '02
-
-
Connelly, K.1
Chien, A.A.2
-
7
-
-
85006413597
-
Analyzing distributed denial of service attack tools: The shaft case
-
Sven Dietrich, Neil Long, and David Dittrich, "Analyzing distributed denial of service attack tools: The shaft case," in 14th Systems Administration Conference, LISA 2000, 2000.
-
(2000)
14th Systems Administration Conference, LISA 2000
-
-
Dietrich, S.1
Long, N.2
Dittrich, D.3
-
10
-
-
0003336855
-
Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing
-
Jan.
-
P. Ferguson and D. Senie, "Network Ingress Filtering: Defeating Denial of Service Attacks Which Employ IP Source Address Spoofing," Internet RFC 2267, Jan. 1998.
-
(1998)
Internet RFC
, vol.2267
-
-
Ferguson, P.1
Senie, D.2
-
11
-
-
0002000920
-
Denial-of-service attack rip the internet
-
April
-
L. Garber, "Denial-of-Service Attack Rip the Internet," Computer, April 2000.
-
(2000)
Computer
-
-
Garber, L.1
-
13
-
-
0002493137
-
Managing security in high- Performance distributed computations
-
Foster Ian, Nicholas Karonis, Carl Kesselman and Steven Tuecke, "Managing Security in High- Performance Distributed Computations," Cluster Computing, Vol 1, issue 1, pages 95-107, 1998.
-
(1998)
Cluster Computing
, vol.1
, Issue.1
, pp. 95-107
-
-
Ian, F.1
Karonis, N.2
Kesselman, C.3
Tuecke, S.4
-
14
-
-
2442572423
-
-
Internet mapping, http://research.lumeta.com/ches/map/, 2002.
-
(2002)
Internet Mapping
-
-
-
15
-
-
0042035474
-
Nimda worm analysis
-
Incident Analysis, SecurityFocus, Sept.
-
A. Machie, J. Roculan, R. Russell, and M. V. Velzen, "Nimda Worm Analysis," Tech. Rep., Incident Analysis, SecurityFocus, Sept. 2001.
-
(2001)
Tech. Rep.
-
-
Machie, A.1
Roculan, J.2
Russell, R.3
Velzen, M.V.4
-
16
-
-
0041534274
-
A snapshot of global internet worm activity
-
Arbor Networks, Nov.
-
D. Song, R. Malan, and R. Stone, "A Snapshot of Global Internet Worm Activity," Tech. Rep., Arbor Networks, Nov.2001.
-
(2001)
Tech. Rep.
-
-
Song, D.1
Malan, R.2
Stone, R.3
-
17
-
-
0034997397
-
Advanced and authenticated marking schemes for IP traceback
-
Dawn X. Song and Adrian Perrig, "Advanced and Authenticated Marking Schemes for IP Traceback," in Proceedings of INFOCOM 2001, 2001.
-
(2001)
Proceedings of INFOCOM 2001
-
-
Song, D.X.1
Perrig, A.2
-
19
-
-
0001647024
-
Practical network support for IP traceback
-
Stefan Savage, David Wetherall, Anna Karlin, and Tom Anderson, "Practical Network Support for IP Traceback," in Proceedings of SIGCOMM 2000, 2000.
-
(2000)
Proceedings of SIGCOMM 2000
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
|