메뉴 건너뛰기




Volumn 4, Issue , 2005, Pages 2395-2404

Configuring networks with content filtering nodes with applications to network security

Author keywords

Computer Virus; Content Filtering; Network Containment; Network Security; Worms

Indexed keywords

CONTENT FILTERING; NETWORK CONTAINMENT; NETWORK SECURITY; WORM PROPAGATION;

EID: 25644441776     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2005.1498525     Document Type: Conference Paper
Times cited : (7)

References (8)
  • 1
    • 0042474173 scopus 로고    scopus 로고
    • Internet quarantine: Requirements for containing self-propagating code
    • March
    • D. Moore, C. Shannon, G. M. Voelker, and S. Savage, "Internet Quarantine: Requirements for Containing Self-Propagating Code", IEEE Infocom 2003, March 2003.
    • (2003) IEEE Infocom 2003
    • Moore, D.1    Shannon, C.2    Voelker, G.M.3    Savage, S.4
  • 2
    • 0035020117 scopus 로고    scopus 로고
    • Configuring sessions in programmable networks
    • April
    • S. Choi, J. Turner, and T. Wolf, "Configuring Sessions in Programmable Networks", IEEE Infocom 2001, April 2001.
    • (2001) IEEE Infocom 2001
    • Choi, S.1    Turner, J.2    Wolf, T.3
  • 3
    • 25644437038 scopus 로고    scopus 로고
    • Configuring sessions in programmable networks with capacity constraints
    • May
    • S. Choi and J. Turner, "Configuring Sessions in Programmable Networks with Capacity Constraints", IEEE ICC 2003, May 2003.
    • (2003) IEEE ICC 2003
    • Choi, S.1    Turner, J.2
  • 8
    • 0000663732 scopus 로고
    • Finding the K shortest loopless paths in a network
    • July
    • J. Y. Yen, "Finding the K Shortest Loopless Paths in a Network", Management Science, vol. 17, no. 11, July 1971.
    • (1971) Management Science , vol.17 , Issue.11
    • Yen, J.Y.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.