-
1
-
-
2542419686
-
Transmission control protocol
-
Transmission control protocol. In RFC 793. 1981.
-
(1981)
RFC
, vol.793
-
-
-
3
-
-
84861249837
-
-
Cert advisory. www.cert.org/advisories/CA-1996-21.html, 1996.
-
(1996)
-
-
-
4
-
-
24944472024
-
-
GNU C compiler, gcc.gnu.org, 2004
-
GNU C compiler, gcc.gnu.org, 2004.
-
-
-
-
6
-
-
0028413052
-
A theory of timed automata
-
Rajeev Alur and David L. Dill. A theory of timed automata. Theoretical Computer Science, 126(2): 183-235, 1994.
-
(1994)
Theoretical Computer Science
, vol.126
, Issue.2
, pp. 183-235
-
-
Alur, R.1
Dill, D.L.2
-
7
-
-
84957372059
-
Timing verification by successive approximation
-
Rajeev Alur, Alon Itai, Robert P. Kurshan, and Mihalis Yannakakis. Timing verification by successive approximation. In Computer Aided Verification, pages 137-150, 1992.
-
(1992)
Computer Aided Verification
, pp. 137-150
-
-
Alur, R.1
Itai, A.2
Kurshan, R.P.3
Yannakakis, M.4
-
9
-
-
84975806796
-
Distributed internet traffic generator (D-ITG): Analysis and experimentation over heterogeneous networks
-
November
-
Stefano Avallone, Antonio Pescapé, and Giorgio Ventre. Distributed internet traffic generator (D-ITG): analysis and experimentation over heterogeneous networks. In ICNP 2003 poster Proceedings, International Conference on Network Protocols, Atlanta, Georgia, November 2003.
-
(2003)
ICNP 2003 Poster Proceedings, International Conference on Network Protocols, Atlanta, Georgia
-
-
Avallone, S.1
Pescapé, A.2
Ventre, G.3
-
10
-
-
0036655939
-
Automated analysis of an audio control protocol using UPPAAL
-
July-August
-
Johan Bengtsson, W. O. David Griffioen, Kåre J. Kristoffersen, Kim G. Larsen, Fredrik Larsson, Paul Pettersson, and Wang Yi. Automated analysis of an audio control protocol using UPPAAL. Journal of Logic and Algebraic Programming, 52-53:163-181, July-August 2002.
-
(2002)
Journal of Logic and Algebraic Programming
, vol.52-53
, pp. 163-181
-
-
Bengtsson, J.1
Griffioen, W.O.D.2
Kristoffersen, K.J.3
Larsen, K.G.4
Larsson, F.5
Pettersson, P.6
Wang, Yi.7
-
11
-
-
0001380807
-
UPPAAL - A tool suite for automatic verification of real-time systems
-
October
-
Johan Bengtsson, Kim G. Larsen, Fredrik Larsson, Paul Pettersson, and Wang Yi. UPPAAL - a tool suite for automatic verification of real-time systems. In Proceedings of Workshop on Verification and Control of Hybrid Systems III, October 1995.
-
(1995)
Proceedings of Workshop on Verification and Control of Hybrid Systems III
-
-
Bengtsson, J.1
Larsen, K.G.2
Larsson, F.3
Pettersson, P.4
Wang, Yi.5
-
15
-
-
0036967463
-
Use of spectral analysis in defense against DoS attacks
-
Chen-Mou Cheng, H.T. Kung, and Koan-Sin Tan. Use of spectral analysis in defense against DoS attacks. In Proceedings of the IEEE GLOBECOM, Taipei, Taiwan, 2002.
-
(2002)
Proceedings of the IEEE GLOBECOM, Taipei, Taiwan
-
-
Cheng, C.-M.1
Kung, H.T.2
Tan, K.-S.3
-
16
-
-
79960675398
-
Approximation of worst-case execution time for preemptive multitasking systems
-
Matteo Corti, Roberto Brega, and Thomas Gross. Approximation of worst-case execution time for preemptive multitasking systems. In Proceedings of LCTES'00, Languages, Compilers, and Tools for Embedded Systems, LNCS 1985, 2000.
-
(2000)
Proceedings of LCTES'00, Languages, Compilers, and Tools for Embedded Systems, LNCS
, vol.1985
-
-
Corti, M.1
Brega, R.2
Gross, T.3
-
17
-
-
40149092144
-
The tool KRONOS
-
Springer-Verlag
-
C. Daws, A. Olivero, S. Tripakis, and S. Yovine. The tool KRONOS. In Proceedings of DIMACS/SYCON Workshop on Hybrid Systems III: Verification and Control, pages 208-219. Springer-Verlag, 1996.
-
(1996)
Proceedings of DIMACS/SYCON Workshop on Hybrid Systems III: Verification and Control
, pp. 208-219
-
-
Daws, C.1
Olivero, A.2
Tripakis, S.3
Yovine, S.4
-
18
-
-
84861247752
-
-
January
-
Dennis. Attack on RIAA, January 2003. www.cdfreaks.com/news/5583.
-
(2003)
Attack on RIAA
-
-
Dennis1
-
20
-
-
84947261898
-
Reliable and precise wcet determination for a real-life processor
-
Springer-Verlag
-
Christian Ferdinand, Reinhold Heckmann, Marc Langenbach, Florian Martin, Michael Schmidt, Henrik Theiling, Stephan Thesing, and Reinhard Wilhelm. Reliable and precise wcet determination for a real-life processor. In Proceedings of the First International Workshop on Embedded Software, pages 469-485. Springer-Verlag, 2001.
-
(2001)
Proceedings of the First International Workshop on Embedded Software
, pp. 469-485
-
-
Ferdinand, C.1
Heckmann, R.2
Langenbach, M.3
Martin, F.4
Schmidt, M.5
Theiling, H.6
Thesing, S.7
Wilhelm, R.8
-
21
-
-
84948391665
-
Mitigation of DOS attacks through QOS regulation
-
May
-
Aman Garg and A. L. Narasimha Reddy. Mitigation of DOS attacks through QOS regulation. In Proceedings of IWQOS'02, May 2002.
-
(2002)
Proceedings of IWQOS'02
-
-
Garg, A.1
Reddy, A.L.N.2
-
26
-
-
84947939700
-
Model-checking for real-time systems
-
number 965 in Lecture Notes in Computer Science, August
-
Kim G. Larsen, Paul Pettersson, and Wang Yi. Model-Checking for Real-Time Systems. In Proc. of Fundamentals of Computation Theory, number 965 in Lecture Notes in Computer Science, pages 62-88, August 1995.
-
(1995)
Proc. of Fundamentals of Computation Theory
, pp. 62-88
-
-
Larsen, K.G.1
Pettersson, P.2
Wang, Yi.3
-
27
-
-
3042859154
-
Resisting syn flooding DoS attacks with a syn cache
-
J. Lemon. Resisting syn flooding DoS attacks with a syn cache. In Proceedings of USENIX BSDConference, 2002.
-
(2002)
Proceedings of USENIX BSDConference
-
-
Lemon, J.1
-
29
-
-
24944509401
-
-
May news.com.com/2100-1001_3-257068.html.
-
Robert Lemos. White House website attacked, May 2001. news.com.com/2100-1001_3-257068.html.
-
(2001)
White House Website Attacked
-
-
Lemos, R.1
-
30
-
-
0003552333
-
-
R. Mahajan, S. Bellovin, S. Floyd, J. Vern, and P. Scott. Controlling high bandwidth aggregates in the network, 2001.
-
(2001)
Controlling High Bandwidth Aggregates in the Network
-
-
Mahajan, R.1
Bellovin, S.2
Floyd, S.3
Vern, J.4
Scott, P.5
-
32
-
-
84861241438
-
Life support
-
November
-
Ed Nisley. Life support. Dr. Dobb's Journal, November 2001. www.ddjembedded.com/resources/articles/2001/0111n/0111n.htm.
-
(2001)
Dr. Dobb's Journal
-
-
Nisley, E.1
-
39
-
-
0030715989
-
Analysis of a denial of service attack on TCP
-
May
-
C. L. Schuba, I. V. Krsul, M. G. Kühn, E. H. Spafford, A. Sundaram, and D. Zamboni. Analysis of a denial of service attack on TCP. In Proceedings of IEEE Symposium on Security and Privacy, May 1997.
-
(1997)
Proceedings of IEEE Symposium on Security and Privacy
-
-
Schuba, C.L.1
Krsul, I.V.2
Kühn, M.G.3
Spafford, E.H.4
Sundaram, A.5
Zamboni, D.6
-
40
-
-
84861252773
-
-
Karyl F. Stein. Spak, 2004. www.xenos.net/software/spak/.
-
(2004)
Spak
-
-
Stein, K.F.1
-
42
-
-
35248884302
-
Efficient verification of timed automata with BDD-like data-structures
-
Proceedings of VMCAl'03, Verification, Model Checking, and Abstract Interpretation. Springer-Verlag
-
Farn Wang. Efficient verification of timed automata with BDD-like data-structures. In Proceedings of VMCAl'03, Verification, Model Checking, and Abstract Interpretation. Springer-Verlag (LNCS 2575).
-
LNCS
, vol.2575
-
-
Wang, F.1
-
44
-
-
0038030410
-
-
December
-
B. White, J. Lepreau, L. Stoller, R. Ricci, S. Guruprasad, M. Newbold, M. Hibler, C. Barb, and A. Joglekar. An integrated experimental environment for distributed systems and networks. December 2002.
-
(2002)
An Integrated Experimental Environment for Distributed Systems and Networks
-
-
White, B.1
Lepreau, J.2
Stoller, L.3
Ricci, R.4
Guruprasad, S.5
Newbold, M.6
Hibler, M.7
Barb, C.8
Joglekar, A.9
-
45
-
-
0004210998
-
-
OŔeilly, Cambridge, MA
-
E. D. Zwicky, S. Chapman, D. B. Chapman, and D. Ru. Building Internet Firewalls. OŔeilly, Cambridge, MA, 1995.
-
(1995)
Building Internet Firewalls
-
-
Zwicky, E.D.1
Chapman, S.2
Chapman, D.B.3
Ru, D.4
|