-
3
-
-
8744281125
-
-
CERT Advisory CA-2003-20
-
CERT Advisory CA-2003-20: W32/Blaster worm. http://www.cert.org/ advisories/CA-2003-20.html, 2003.
-
(2003)
W32/Blaster Worm
-
-
-
7
-
-
18744391788
-
Multiscale stepping-stone detection: Detecting pairs of jittered interactive streams by exploiting maximum tolerable delay
-
D. L. Donoho, A. G. Flesia, U. Shankar, V. Paxson, J. Coit, and S. Staniford-Chen. Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay. In Proc. of The 5th International Symposium on Recent Advances in Intrusion Detection (RAID), 2002.
-
(2002)
Proc. of the 5th International Symposium on Recent Advances in Intrusion Detection (RAID)
-
-
Donoho, D.L.1
Flesia, A.G.2
Shankar, U.3
Paxson, V.4
Coit, J.5
Staniford-Chen, S.6
-
8
-
-
84861258853
-
-
The Dragnet Project. http://www.cs.cmu.edu/~dragnet.
-
-
-
-
13
-
-
33646048960
-
Honeycomb - Creating intrusion detection signatures using honeypots
-
C. Kreibich and J. Crowcroft. Honeycomb - Creating Intrusion Detection Signatures Using Honeypots. In Proc. of ACM HotNets-II, 2003.
-
(2003)
Proc. of ACM HotNets-II
-
-
Kreibich, C.1
Crowcroft, J.2
-
15
-
-
3543126644
-
Large-scale IP traceback in high-speed internet: Practical techniques and theoretical foundation
-
J. Li, M. Sung, J. Xu, L. Li, and Q. Zhao. Large-scale IP Traceback in High-speed Internet: Practical Techniques and Theoretical Foundation. In Proc. of IEEE Symposium of Security and Privacy, 2004.
-
(2004)
Proc. of IEEE Symposium of Security and Privacy
-
-
Li, J.1
Sung, M.2
Xu, J.3
Li, L.4
Zhao, Q.5
-
17
-
-
85084164413
-
Bro: A system for detecting network intruders in real-time
-
V. Paxson. Bro: A System for Detecting Network Intruders in Real-Time. In Proc. of 7th USENIX Security Symposium, 1998.
-
(1998)
Proc. of 7th USENIX Security Symposium
-
-
Paxson, V.1
-
21
-
-
27544467640
-
Toward a framework for Internet forensic analysis
-
V. Sekar, Y. Xie, D. Maltz, M. K. Reiter, and H. Zhang. Toward a Framework For Internet Forensic Analysis. In Proc. of ACM HotNets-III, 2004.
-
(2004)
Proc. of ACM HotNets-III
-
-
Sekar, V.1
Xie, Y.2
Maltz, D.3
Reiter, M.K.4
Zhang, H.5
-
22
-
-
27544500273
-
Public review of 'toward a framework for internet forensic analysis'
-
A. Snoeren. Public review of 'Toward a Framework for internet Forensic Analysis'. In Proc. ACM HotNets-III, 2004.
-
(2004)
Proc. ACM HotNets-III
-
-
Snoeren, A.1
-
23
-
-
0001887844
-
Hash-based IP traceback
-
A. C. Snoeren, C. Partridge, L. A. Sanchez, C. E. Jones, F. Tchakountio, S. T. Kent, and W. T. Strayer. Hash-Based IP Traceback. In Proc. of ACM SIGCOMM, 2001.
-
(2001)
Proc. of ACM SIGCOMM
-
-
Snoeren, A.C.1
Partridge, C.2
Sanchez, L.A.3
Jones, C.E.4
Tchakountio, F.5
Kent, S.T.6
Strayer, W.T.7
|