-
2
-
-
0036871268
-
Internet infrastructure security: A taxonomy
-
Nov.
-
A. Chakrabarti and G. Manimaran, "Internet Infrastructure Security: A Taxonomy," IEEE Network, Nov. 2002, pp. 13-21.
-
(2002)
IEEE Network
, pp. 13-21
-
-
Chakrabarti, A.1
Manimaran, G.2
-
3
-
-
0037298256
-
A scalable peer-to-peer lookup protocol for Internet applications
-
I. Stoica et al., "A Scalable Peer-to-Peer Lookup Protocol for Internet Applications," IEEE/ACM Trans. Networking, vol. 11, no. 1, 2003, pp. 17-32.
-
(2003)
IEEE/ACM Trans. Networking
, vol.11
, Issue.1
, pp. 17-32
-
-
Stoica, I.1
-
4
-
-
33744945767
-
SOS: Secure overlay services
-
ACM Press
-
A.D. Keromytis, V. Misra, and D. Rubenstein, "SOS: Secure Overlay Services," Proc. ACM SIGCOMM, ACM Press, 2002, pp. 61-72.
-
(2002)
Proc. ACM SIGCOMM
, pp. 61-72
-
-
Keromytis, A.D.1
Misra, V.2
Rubenstein, D.3
-
5
-
-
0742269305
-
Resilient self-organizing overlay networks for security update delivery
-
Jan.
-
J. Li, P. Reiher, and G. Popek, "Resilient Self-Organizing Overlay Networks for Security Update Delivery," IEEE J. Selected Areas in Comm.,Jan. 2004, pp. 189-202.
-
(2004)
IEEE J. Selected Areas in Comm.
, pp. 189-202
-
-
Li, J.1
Reiher, P.2
Popek, G.3
-
6
-
-
33746272228
-
Defending distributed systems against malicious intrusions and network anomalies
-
IEEE CS Press
-
K. Hwang, Y. Chen, and H. Liu, "Defending Distributed Systems against Malicious Intrusions and Network Anomalies," Proc. IEEE Workshop Security in Systems and Networks (SSN 05), IEEE CS Press, 2005, pp. 286-286.
-
(2005)
Proc. IEEE Workshop Security in Systems and Networks (SSN 05)
, pp. 286-286
-
-
Hwang, K.1
Chen, Y.2
Liu, H.3
-
7
-
-
0042474173
-
Internet quarantine: Requirements for containing self-propagating codes
-
IEEE CS Press
-
D. Moore et al., "Internet Quarantine: Requirements for Containing Self-Propagating Codes," Proc. IEEE INFOCOM, IEEE CS Press, 2003, pp. 1901-1910.
-
(2003)
Proc. IEEE INFOCOM
, pp. 1901-1910
-
-
Moore, D.1
-
8
-
-
20844432436
-
WormShield: Collaborative worm signature detection using distributed aggregation trees
-
Internet and Grid Computing Lab, Univ. of Southern California
-
M. Cai et al., "WormShield: Collaborative Worm Signature Detection Using Distributed Aggregation Trees," tech. report TR 2005-10, Internet and Grid Computing Lab, Univ. of Southern California, 2005; http://grid sec.usc.edu/TR/TR-2005-10.pdf.
-
(2005)
Tech. Report
, vol.TR 2005-10
-
-
Cai, M.1
-
9
-
-
84860953014
-
Fast and accurate traffic matrix measurement using adaptive cardinality counting
-
Internet and Grid Computing Lab, Univ. of Southern California
-
M. Cai et al., "Fast and Accurate Traffic Matrix Measurement Using Adaptive Cardinality Counting," tech. report TR 2005-12, Internet and Grid Computing Lab, Univ. of Southern California, 2005; http://gridsec.usc.edu/TR/TR- 2005-12.pdf.
-
(2005)
Tech. Report
, vol.TR 2005-12
-
-
Cai, M.1
-
10
-
-
85137546697
-
Global intrusion detection in the domino overlay system
-
Internet Soc.
-
V. Yegneswaran, P. Barford, and S. Jha, "Global Intrusion Detection in the Domino Overlay System," Proc. Network and Distributed System Security (NDSS 04), Internet Soc., 2004, pp. 79-95.
-
(2004)
Proc. Network and Distributed System Security (NDSS 04)
, pp. 79-95
-
-
Yegneswaran, V.1
Barford, P.2
Jha, S.3
-
12
-
-
0003676885
-
Fingerprinting by random polynomials
-
Center for Research in Computing Technology, Harvard Univ.
-
M.O. Rabin, "Fingerprinting by Random Polynomials," tech. report 15-81, Center for Research in Computing Technology, Harvard Univ., 1981.
-
(1981)
Tech. Report
, vol.15
, Issue.81
-
-
Rabin, M.O.1
-
13
-
-
85084163246
-
Autograph: Toward automated distributed worm signature detection
-
Usenix Assoc.
-
H.A. Kim and B. Karp, "Autograph: Toward Automated Distributed Worm Signature Detection," Proc. Usenix Security Symp., Usenix Assoc., 2004, pp. 271-286.
-
(2004)
Proc. Usenix Security Symp.
, pp. 271-286
-
-
Kim, H.A.1
Karp, B.2
-
14
-
-
0142152716
-
LogLog counting of large cardinalities
-
LNCS 2832, Springer-Verlag
-
M. Durand and P. Flajolet, "LogLog Counting of Large Cardinalities," Proc. European Sytnp. Algorithms, LNCS 2832, Springer-Verlag, 2003. pp. 605-617.
-
(2003)
Proc. European Sytnp. Algorithms
, pp. 605-617
-
-
Durand, M.1
Flajolet, P.2
-
15
-
-
1242308107
-
Fast accurate computation of large-scale IP traffic matrices from link loads
-
ACM Press
-
Y. Zhang et al., "Fast Accurate Computation of Large-scale IP Traffic Matrices from Link Loads," Proc. SIGCOMM, ACM Press, 2003, pp. 301-312.
-
(2003)
Proc. SIGCOMM
, pp. 301-312
-
-
Zhang, Y.1
-
16
-
-
14944367267
-
Characterization of network-wide anomalies in traffic flows
-
ACM Press
-
A. Lakhina, M. Crovella, and C. Diot, "Characterization of Network-Wide Anomalies in Traffic Flows," Proc. ACM/SIGCOMM Internet Measurement Conf., ACM Press, 2004, pp. 201-206.
-
(2004)
Proc. ACM/SIGCOMM Internet Measurement Conf.
, pp. 201-206
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
|