-
1
-
-
30644469258
-
-
ZDNet UK News. http://news.zdnet.co.uk/internet/security/ 0,39020375,2085099,00.htm
-
ZDNet UK News
-
-
-
2
-
-
30644464305
-
"Fun With Packets: Designing a Stick"
-
Endeavor Systems Inc
-
G. Coretex. "Fun With Packets: Designing a Stick." Endeavor Systems Inc., 2002.
-
(2002)
-
-
Coretex, G.1
-
3
-
-
0004145058
-
"Insertion, Evasion and Denial of Service: Eluding Network Intrusion Detection"
-
Secure Networks Inc
-
T. H. Ptacek and N. N. Newsham. "Insertion, Evasion and Denial of Service: Eluding Network Intrusion Detection." Secure Networks Inc., 1998.
-
(1998)
-
-
Ptacek, T.H.1
Newsham, N.N.2
-
6
-
-
17644383894
-
"Building Attack Scenarios through Integration of Complementary Alert Methods"
-
Peng Ning, Dingbang X, Christopher G. Healey, Robert and St. Amant. "Building Attack Scenarios through Integration of Complementary Alert Methods." Proceedings of the 11th Annual Network and Distributed System Security Symposium, 2004, pp. 97-111.
-
(2004)
Proceedings of the 11th Annual Network and Distributed System Security Symposium
, pp. 97-111
-
-
Peng, N.1
Dingbang, X.2
Christopher, G.3
Healey, R.4
St. Amant5
-
8
-
-
30644460366
-
"The Science of Intrusion Detection System Attack Identification"
-
Cisco Systems.2002
-
"The Science of Intrusion Detection System Attack Identification." Cisco Systems.2002, http://www.cisco.com/warp/ public/cc/pd/sqsw/sqidsz/prodlit/idssa_wp.htm
-
-
-
-
9
-
-
30644476815
-
"snot"
-
Sniph
-
Sniph. "snot". 2001.
-
(2001)
-
-
-
11
-
-
0041807793
-
"A congestion control framework for high-speed integrated packetized transport"
-
19988
-
G. Woodruff, R. Rogers and P. Richards. "A congestion control framework for high-speed integrated packetized transport." IEEE Globecomm, 88. 19988.
-
IEEE Globecomm
, vol.88
-
-
Woodruff, G.1
Rogers, R.2
Richards, P.3
-
13
-
-
0022796415
-
"New directions in communications (or which way to the information age?)"
-
J. Turner. "New directions in communications (or which way to the information age?)" IEEE Communications Magazine, Vol.24, No.10, pp. 8-15.
-
IEEE Communications Magazine
, vol.24
, Issue.10
, pp. 8-15
-
-
Turner, J.1
-
14
-
-
33646042272
-
"An Efficient Unified Approach to Correlating Hypothesising, and Predicting Intrusion Alerts"
-
Lingyu Wang, Anyi Liu and Sushil Jajoda. "An Efficient Unified Approach to Correlating Hypothesising, and Predicting Intrusion Alerts." Proceedings of European Symposium on Computer Security, 2005. pp. 247-266.
-
(2005)
Proceedings of European Symposium on Computer Security
, pp. 247-266
-
-
Wang, L.1
Liu, A.2
Jajoda, S.3
-
16
-
-
30644481114
-
"Hierarchical token bucket theory"
-
Martin Devera. "Hierarchical token bucket theory." 2002. http://luxik.cdi.cz/~devik/qos/htb/manual/theory.htm
-
(2002)
-
-
Devera, M.1
-
17
-
-
30644467621
-
-
Firestorm IDS
-
Gianni Tedesco. 2005. Firestorm IDS. http://www.scaramanga.co.uk/ firestorm/
-
(2005)
-
-
Tedesco, G.1
-
18
-
-
30644472748
-
"tcpdump"
-
Lawrence Berkeley National Laboratory
-
Leres Van Jacobson, Craig McCanne and Steven McCanne. "tcpdump". Lawrence Berkeley National Laboratory.
-
-
-
Van Jacobson, L.1
McCanne, C.2
McCanne, S.3
-
19
-
-
30644459848
-
"CCTF Defcon Data"
-
Shmoo Group
-
Shmoo Group. "CCTF Defcon Data". 2001. http://www.shmoo.com/ cctf/
-
(2001)
-
-
|