-
3
-
-
31844437754
-
-
NLANR-PMA Traffic Archive: Bell Labs-I trace. http://pma.nlanr.net/ Traces/Traces/long/bell/1, 2002.
-
Bell Labs-I Trace
-
-
-
4
-
-
31844447832
-
-
NLANR-PMA Traffic Archive: Leipzig-I trace. http.//pma.nlanr.net/Traces/ Traces/long/leip/1, 2002.
-
Leipzig-I Trace
-
-
-
6
-
-
31844442326
-
-
Fingerprinting: The complete documentation. http://www.10t3k.org/ security/docs/fingerprinting/, 2004.
-
The Complete Documentation
-
-
-
7
-
-
31844443973
-
-
Fingerprinting: The complete toolsbox. http://www.10t3k.org/security/ tools/fingerprinting/, 2004.
-
The Complete Toolsbox
-
-
-
9
-
-
31844454612
-
-
THC-Amap. http://thc.org/releases.php, 2004.
-
(2004)
THC-Amap
-
-
-
10
-
-
84890863223
-
A cooperative immunization system for an untrusting internet
-
Sept./Oct.
-
K. G. Anagnostakis, M. B. Greenwald, S. Ioannidis, A. D. Keromytis, and D. Li. A Cooperative Immunization System for an Untrusting Internet. In Proceedings of the 11th IEEE International Conference on Networking (ICON), pages 403-408, Sept./Oct. 2003.
-
(2003)
Proceedings of the 11th IEEE International Conference on Networking (ICON)
, pp. 403-408
-
-
Anagnostakis, K.G.1
Greenwald, M.B.2
Ioannidis, S.3
Keromytis, A.D.4
Li, D.5
-
12
-
-
84966929628
-
Adaptive use of network-centric mechanisms in cyber-defense
-
May
-
M. Atighetchi, P. Pal, F. Webber, R. Schantz, and C. Jones. Adaptive use of network-centric mechanisms in cyber-defense. In Proceedings of the 6th IEEE International Symposium on Object-oriented Real-time Distributed Computing, May 2003.
-
(2003)
Proceedings of the 6th IEEE International Symposium on Object-oriented Real-time Distributed Computing
-
-
Atighetchi, M.1
Pal, P.2
Webber, F.3
Schantz, R.4
Jones, C.5
-
13
-
-
11244308946
-
Mobidesk: Mobile virtual desktop computing
-
ACM Press
-
R. A. Baratto, S. Potter, G. Su, and J. Nieh. Mobidesk: mobile virtual desktop computing. In Proceedings of the 10th Annual International Conference on Mobile Computing and Networking (MOBICOM), pages 1-15. ACM Press, 2004.
-
(2004)
Proceedings of the 10th Annual International Conference on Mobile Computing and Networking (MOBICOM)
, pp. 1-15
-
-
Baratto, R.A.1
Potter, S.2
Su, G.3
Nieh, J.4
-
14
-
-
18744376889
-
Randomized instruction set emulation to disrupt binary code injection attacks
-
Oct.
-
E. G. Barrantes, D. H. Ackley, T. S. Palmer, D. Stefanovic, and D. D. Zovi. Randomized instruction set emulation to disrupt binary code injection attacks. In Proceedings of the 10th ACM Conference on Computer and Communications Security, Oct. 2003.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security
-
-
Barrantes, E.G.1
Ackley, D.H.2
Palmer, T.S.3
Stefanovic, D.4
Zovi, D.D.5
-
15
-
-
84862209017
-
Address obfuscation: An efficient approach to combat a broad range of memory error exploits
-
Aug.
-
S. Bhatkar, D. DuVarney, and R. Sekar. Address obfuscation: An efficient approach to combat a broad range of memory error exploits. In In Proceedings of the 12th USENIX Security Symposium, pages 105-120, Aug. 2003.
-
(2003)
In Proceedings of the 12th USENIX Security Symposium
, pp. 105-120
-
-
Bhatkar, S.1
DuVarney, D.2
Sekar, R.3
-
16
-
-
84976797486
-
Sharing and protection in a single-address-space operating system
-
J. S. Chase, H. M. Levy, M. J. Feeley, and E. D. Lazowska. Sharing and protection in a single-address-space operating system. ACM Transactions on Computer Systems, 12(4):271-307, 1994.
-
(1994)
ACM Transactions on Computer Systems
, vol.12
, Issue.4
, pp. 271-307
-
-
Chase, J.S.1
Levy, H.M.2
Feeley, M.J.3
Lazowska, E.D.4
-
17
-
-
34547419305
-
Exploiting the IPID field to infer network path and end-system characteristics
-
Mar.
-
W. Chen, Y. Huang, B. F. Ribeiro, K. Suh, H. Zhang, E. de Souza e Silva, J. Kurose, and D. Towsley. Exploiting the IPID field to infer network path and end-system characteristics. In Proceedings of the 6th Passive and Active Measurement Workshop (PAM 2005), Mar. 2005.
-
(2005)
Proceedings of the 6th Passive and Active Measurement Workshop (PAM 2005)
-
-
Chen, W.1
Huang, Y.2
Ribeiro, B.F.3
Suh, K.4
Zhang, H.5
De Souza e Silva, E.6
Kurose, J.7
Towsley, D.8
-
18
-
-
0004881443
-
Bootstrap protocol (BOOTP)
-
Sept.
-
B. Croft and J. Gilmore. Bootstrap Protocol (BOOTP). RFC 951, http://www.rfc-editor.org/, Sept. 1985.
-
(1985)
RFC
, vol.951
-
-
Croft, B.1
Gilmore, J.2
-
19
-
-
0003290981
-
Dynamic host configuration protocol
-
Mar.
-
R. Droms. Dynamic Host Configuration Protocol. RFC 2131, http://www.rfc-editor.org/, Mar. 1997.
-
(1997)
RFC
, vol.2131
-
-
Droms, R.1
-
21
-
-
0342770299
-
The design and implementation of a mobile internetworking architecture
-
J. Ioannidis and G. Q. Maguire Jr. The design and implementation of a mobile internetworking architecture. In USENIX Winter, pages 489-502, 1993.
-
(1993)
USENIX Winter
, pp. 489-502
-
-
Ioannidis, J.1
Maguire Jr., G.Q.2
-
24
-
-
31844453927
-
REX: Secure, extensible remote execution
-
June-July
-
M. Kaminsky, E. Peterson, D. B. Giffin, K. Fu, D. Mazires, and M. F. Kaashoek. REX: Secure, extensible remote execution. In In Proceedings of the 2004 USENIX Technical Conference, pages 199-212, June-July 2004.
-
(2004)
In Proceedings of the 2004 USENIX Technical Conference
, pp. 199-212
-
-
Kaminsky, M.1
Peterson, E.2
Giffin, D.B.3
Fu, K.4
Mazires, D.5
Kaashoek, M.F.6
-
25
-
-
14944345677
-
Transport layer identification of P2P traffic
-
New York, NY, USA, ACM Press
-
T. Karagiannis, A. Broido, M. Faloutsos, and K. claffy. Transport layer identification of P2P traffic. In IMC '04: Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, pages 121-134, New York, NY, USA, 2004. ACM Press.
-
(2004)
IMC '04: Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement
, pp. 121-134
-
-
Karagiannis, T.1
Broido, A.2
Faloutsos, M.3
Claffy, K.4
-
29
-
-
31844455887
-
Final report for the network security mechanisms utilizing network address translation LDRD project
-
Sandia National Laboratories, November
-
J. Michalski, C. Price, E. Stanton, E. L. Chua, K. Seah, W. Y. Heng, and T. C. Pheng. Final Report for the Network Security Mechanisms Utilizing Network Address Translation LDRD Project. Technical Report SAND2002-3613, Sandia National Laboratories, November 2002.
-
(2002)
Technical Report
, vol.SAND2002-3613
-
-
Michalski, J.1
Price, C.2
Stanton, E.3
Chua, E.L.4
Seah, K.5
Heng, W.Y.6
Pheng, T.C.7
-
30
-
-
0742276097
-
Inside the slammer worm
-
July/Aug.
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver. Inside the slammer worm. IEEE Security & Privacy, pages 33-39, July/Aug. 2003.
-
(2003)
IEEE Security & Privacy
, pp. 33-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
33
-
-
4544239482
-
Buttercup: On network-based detection of polymorphic buffer overflow vulnerabilities
-
Apr.
-
A. Pasupulati, J. Coit, K. Levitt, S. F. Wu, S. H. Li, J. C. Kuo, and K. P. Fan. Buttercup: On Network-based Detection of Polymorphic Buffer Overflow Vulnerabilities. In Proceedings of the Network Operations and Management Symposium (NOMS), pages 235-248, vol. 1, Apr. 2004.
-
(2004)
Proceedings of the Network Operations and Management Symposium (NOMS)
, vol.1
, pp. 235-248
-
-
Pasupulati, A.1
Coit, J.2
Levitt, K.3
Wu, S.F.4
Li, S.H.5
Kuo, J.C.6
Fan, K.P.7
-
35
-
-
19944406146
-
Accurate, scalable in-network identification of P2P traffic using application signatures
-
New York, NY, USA. ACM Press
-
S. Sen, O. Spatscheck, and D. Wang. Accurate, scalable in-network identification of P2P traffic using application signatures. In WWW '04: Proceedings of the 13th international conference on World Wide Web, pages 512-521, New York, NY, USA, 2004. ACM Press.
-
(2004)
WWW '04: Proceedings of the 13th International Conference on World Wide Web
, pp. 512-521
-
-
Sen, S.1
Spatscheck, O.2
Wang, D.3
-
36
-
-
14844328033
-
On the effectiveness of address-space randomization
-
New York, NY, USA. ACM Press
-
H. Shacham, M. Page, B. Pfaff, E.-J. Goh, N. Modadugu, and D. Boneh. On the effectiveness of address-space randomization. In CCS '04: Proceedings of the 11th ACM Conference on Computer and Communications Security, pages 298-307, New York, NY, USA, 2004. ACM Press.
-
(2004)
CCS '04: Proceedings of the 11th ACM Conference on Computer and Communications Security
, pp. 298-307
-
-
Shacham, H.1
Page, M.2
Pfaff, B.3
Goh, E.-J.4
Modadugu, N.5
Boneh, D.6
-
39
-
-
0034545683
-
An end-to-end approach to host mobility
-
New York, NY, USA. ACM Press
-
A. C. Snoeren and H. Balakrishnan. An end-to-end approach to host mobility. In MobiCom '00: Proceedings of the 6th annual international conference on Mobile computing and networking, pages 155-166, New York, NY, USA, 2000. ACM Press.
-
(2000)
MobiCom '00: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking
, pp. 155-166
-
-
Snoeren, A.C.1
Balakrishnan, H.2
-
40
-
-
14844308379
-
Containment of scanning worms in enterprise networks
-
S. Staniford. Containment of Scanning Worms in Enterprise Networks. Journal of Computer Security, 2004.
-
(2004)
Journal of Computer Security
-
-
Staniford, S.1
-
44
-
-
21844456680
-
Shield: Vulnerability-driven network filters for preventing known vulnerability exploits
-
H. J. Wang, C. Guo, D. R. Simon, and A. Zugenmaier. Shield: vulnerability-driven network filters for preventing known vulnerability exploits. In Proceedings of ACM SIGCOMM'04, pages 193-204, 2004.
-
(2004)
Proceedings of ACM SIGCOMM'04
, pp. 193-204
-
-
Wang, H.J.1
Guo, C.2
Simon, D.R.3
Zugenmaier, A.4
-
48
-
-
4243483478
-
Throttling viruses: Restricting propagation to defeat malicious mobile code
-
HP Laboratories Bristol
-
M. Williamson. Throttling Viruses: Restricting Propagation to Defeat Malicious Mobile Code. Technical Report HPL-2002-172, HP Laboratories Bristol, 2002.
-
(2002)
Technical Report
, vol.HPL-2002-172
-
-
Williamson, M.1
-
49
-
-
84892612179
-
An effective architecture and algorithm for detecting worms with various scan techniques
-
Feb.
-
J. Wu, S. Vangala, L. Gao, and K. Kwiat. An Effective Architecture and Algorithm for Detecting Worms with Various Scan Techniques. In Proceedings of the Network and Distributed System Security Symposium (NDSS), pages 143-156, Feb. 2004.
-
(2004)
Proceedings of the Network and Distributed System Security Symposium (NDSS)
, pp. 143-156
-
-
Wu, J.1
Vangala, S.2
Gao, L.3
Kwiat, K.4
-
50
-
-
27644457078
-
Transparent runtime randomization for security
-
Oct.
-
J. Xu, Z. Kalbarczyk, and R. Iyer. Transparent runtime randomization for security. In A. Fantechi, editor, Proc. 22nd Symp. on Reliable Distributed Systems -SRDS 2003, pages 260-269, Oct. 2003.
-
(2003)
A. Fantechi, Editor, Proc. 22nd Symp. on Reliable Distributed Systems -SRDS 2003
, pp. 260-269
-
-
Xu, J.1
Kalbarczyk, Z.2
Iyer, R.3
|