-
1
-
-
0034823003
-
A trend analysis of exploitations
-
BROWNE, H., ARBAUGH, W. A., McHUGH, J., AND FITHEN, W. L. 2001. A trend analysis of exploitations. In Proceedings of the 2001 IEEE Symposium on Security and Privacy. 214-229.
-
(2001)
Proceedings of the 2001 IEEE Symposium on Security and Privacy
, pp. 214-229
-
-
Browne, H.1
Arbaugh, W.A.2
McHugh, J.3
Fithen, W.L.4
-
4
-
-
34250446073
-
Multipart pricing of public goods
-
CLARKE, E. H. 1971. Multipart pricing of public goods. Public Choice 11, 17-33.
-
(1971)
Public Choice
, vol.11
, pp. 17-33
-
-
Clarke, E.H.1
-
8
-
-
0036957186
-
A BGP-based mechanism for lowest-cost routing
-
FEIGENBAUM, J., PAPADIMITRIOU, C., SAMI, R., AND SHENKER, S. 2002. A BGP-based mechanism for lowest-cost routing. In Proceedings of the 2002 ACM Symposium on Principles of Distributed Computing.
-
(2002)
Proceedings of the 2002 ACM Symposium on Principles of Distributed Computing
-
-
Feigenbaum, J.1
Papadimitriou, C.2
Sami, R.3
Shenker, S.4
-
9
-
-
0038223766
-
Using information security as a response to competitor analysis systems
-
GORDON, L. A. AND LOEB, M. P. 2001. Using information security as a response to competitor analysis systems. Commun. ACM 9, 44.
-
(2001)
Commun. ACM
, vol.9
, pp. 44
-
-
Gordon, L.A.1
Loeb, M.P.2
-
10
-
-
0001314984
-
Incentives in teams
-
GROVES, T. 1973. Incentives in teams. Econometrica 41, 617-663.
-
(1973)
Econometrica
, vol.41
, pp. 617-663
-
-
Groves, T.1
-
14
-
-
0028514027
-
A taxonomy of computer program security flaws
-
LANDWEHR, C. E., BULL, A. R., MCDERMOTT, J. P., AND CHOI, W. S. 1994. A taxonomy of computer program security flaws. ACM Comput. Surv. 26, 3.
-
(1994)
ACM Comput. Surv.
, vol.26
, pp. 3
-
-
Landwehr, C.E.1
Bull, A.R.2
Mcdermott, J.P.3
Choi, W.S.4
-
15
-
-
0034513874
-
Intrusion confinement by isolation in information systems
-
Liu, P., JAJODIA, S., AND MCCOLLUM, C. D. 2000. Intrusion confinement by isolation in information systems. J. Comput. Security 8, 4, 243-279.
-
(2000)
J. Comput. Security
, vol.8
, Issue.4
, pp. 243-279
-
-
Liu, P.1
Jajodia, S.2
Mccollum, C.D.3
-
16
-
-
0027609384
-
A survey of intrusion detection techniques
-
LUNT, T. F. 1993. A survey of intrusion detection techniques. Computers & Security 4, 12 (June), 405-418.
-
(1993)
Computers & Security
, vol.4
, Issue.12 JUNE
, pp. 405-418
-
-
Lunt, T.F.1
-
18
-
-
0034479192
-
Secure execution of java applets using a remote playground
-
MALKHI, D. AND REITER, M. K 2000, Secure execution of java applets using a remote playground. IEEE Trans. Software Eng. 26, 12.
-
(2000)
IEEE Trans. Software Eng.
, vol.26
, pp. 12
-
-
Malkhi, D.1
Reiter, M.K.2
-
19
-
-
0004235785
-
-
Oxford University Press, Oxford, UK
-
MAS-COLELL, A., WHINSTON, M. D., AND GREEN, J. R. 1995. Microeconomic Theory. Oxford University Press, Oxford, UK.
-
(1995)
Microeconomic Theory
-
-
Mas-Colell, A.1
Whinston, M.D.2
Green, J.R.3
-
20
-
-
0012127229
-
Intrusion and intrusion detection
-
McHUGH, J. 2001. Intrusion and intrusion detection. Int. J. Inf. Security 1, 14-35.
-
(2001)
Int. J. Inf. Security
, vol.1
, pp. 14-35
-
-
McHugh, J.1
-
21
-
-
0034836055
-
An approach to universal topology generation
-
MEDINA, A., LAKHINA, A., MATTA, I., AND BYERS, J. 2001. An approach to universal topology generation. In Proceedings of the International Workshop on Modeling, Analysis and Simulation of Computer and Telecommunications Systems.
-
(2001)
Proceedings of the International Workshop on Modeling, Analysis and Simulation of Computer and Telecommunications Systems
-
-
Medina, A.1
Lakhina, A.2
Matta, I.3
Byers, J.4
-
23
-
-
0028430224
-
Network intrusion detection
-
MUKHERJEE, B., HEBERLEIN, L. T., AND LEVITT, K. N. 1994. Network intrusion detection. IEEE Network, 26-41.
-
(1994)
IEEE Network
, pp. 26-41
-
-
Mukherjee, B.1
Heberlein, L.T.2
Levitt, K.N.3
-
26
-
-
0000421874
-
Algorithmic mechanism design
-
NS2. The network simulator
-
NISAN, N. AND RONAN, A. 2001. Algorithmic mechanism design. Games and Economic Behavior 35. NS2. The network simulator, http://www.isi.edu/nsnam/ns/.
-
(2001)
Games and Economic Behavior
, vol.35
-
-
Nisan, N.1
Ronan, A.2
-
29
-
-
84980096808
-
Counterspeculation, auctions, and competitive sealed tenders
-
VICKREY, W. 1961. Counterspeculation, auctions, and competitive sealed tenders. J. Finance 16, 8-37.
-
(1961)
J. Finance
, vol.16
, pp. 8-37
-
-
Vickrey, W.1
-
32
-
-
0037328484
-
Sustaining availability of web services under distributed denial of service attacks
-
XU, J. AND LEE, W. 2003. Sustaining availability of web services under distributed denial of service attacks. IEEE Trans. Comput. 52, 4 (Feb.), 195-208.
-
(2003)
IEEE Trans. Comput.
, vol.52
, Issue.4 FEB
, pp. 195-208
-
-
Xu, J.1
Lee, W.2
|