-
1
-
-
33749056611
-
-
Sun Microsystems, Inc., Palo Alto, Calif.
-
"C User's Guide, Forte Developer 6 Update 2," Sun Microsystems, Inc., Palo Alto, Calif., 2001.
-
(2001)
C User's Guide, Forte Developer 6 Update 2
-
-
-
2
-
-
0027886590
-
Fbufs: A high-bandwidth cross-domain transfer facility
-
ACm CS Press, New York, N.Y
-
P. Druschel and L. Peterson, "Fbufs: A High-Bandwidth Cross-Domain Transfer Facility," Proc. 14th Symp. Operating Systems Principles (SOSP-14), ACm CS Press, New York, N.Y, pp. 189-202, 1993.
-
(1993)
Proc. 14th Symp. Operating Systems Principles (SOSP-14)
, pp. 189-202
-
-
Druschel, P.1
Peterson, L.2
-
3
-
-
84981174482
-
Experiences with a high-speed network adaptor: A software perspective
-
ACM CS Press, New York, N.Y.
-
P. Druschel, L. Peterson, and B. Davie, "Experiences with a High-speed Network Adaptor: A Software Perspective," Proc. ACM SIGCOMM Conf., ACM CS Press, New York, N.Y., pp. 2-13, 1994.
-
(1994)
Proc. ACM SIGCOMM Conf.
, pp. 2-13
-
-
Druschel, P.1
Peterson, L.2
Davie, B.3
-
4
-
-
1542492179
-
Trapeze/IP: TCP/IP at near-gigabit speeds
-
Usenix Assoc., Berkeley, Calif.
-
A. Gallatin, J. Chase, and K. Yocum, "Trapeze/IP: TCP/IP at Near-Gigabit Speeds," Proc. 1999 Usenix Technical Conference, Usenix Assoc., Berkeley, Calif., 1999, pp. 109-120.
-
(1999)
Proc. 1999 Usenix Technical Conference
, pp. 109-120
-
-
Gallatin, A.1
Chase, J.2
Yocum, K.3
-
5
-
-
0038595377
-
-
tech. report 1062, MIT Lincoln Laboratory, Boston, Mass.
-
J. Haines, R. Lippmann, D. Fried, J. Korba and K. Das, "1999 DARPA Intrusion Detection System Evaluation: Design and Procedures, " tech. report 1062, MIT Lincoln Laboratory, Boston, Mass., 2001.
-
(2001)
1999 DARPA Intrusion Detection System Evaluation: Design and Procedures
-
-
Haines, J.1
Lippmann, R.2
Fried, D.3
Korba, J.4
Das, K.5
-
6
-
-
0037957323
-
The AMD opteron processor for multiprocessor servers
-
IEEE CS Press, Los Alamitos, Calif.
-
C. Keltcher, K. McGrath, A. Ahmed, and P. Conway, "The AMD Opteron Processor for Multiprocessor Servers," IEEE Micro, IEEE CS Press, Los Alamitos, Calif., vol. 23, no. 2, pp. 66-76, 2003.
-
(2003)
IEEE Micro
, vol.23
, Issue.2
, pp. 66-76
-
-
Keltcher, C.1
McGrath, K.2
Ahmed, A.3
Conway, P.4
-
7
-
-
35248819234
-
Using decision trees to improve signature-based intrusion detection
-
Springer-Verlag, Berlin-Heidelberg-New York
-
C. Kruegel and T. Toth, "Using Decision Trees to Improve Signature-based Intrusion Detection," Proc. Sixth Int'l Symp. Recent Advances in Intrusion Detection (RAID), Springer-Verlag, Berlin-Heidelberg-New York, pp. 173-191, 2003.
-
(2003)
Proc. Sixth Int'l Symp. Recent Advances in Intrusion Detection (RAID)
, pp. 173-191
-
-
Kruegel, C.1
Toth, T.2
-
8
-
-
85084163349
-
Data mining approaches for intrusion detection
-
Usenix Assoc., Berkeley, Calif.
-
W. Lee and S, Stolfo, "Data Mining Approaches for Intrusion Detection," USENIX Security Symp., Usenix Assoc., Berkeley, Calif., 1998.
-
(1998)
USENIX Security Symp.
-
-
Lee, W.1
Stolfo, S.2
-
9
-
-
0344551104
-
Profiling interrupt handler performance through kernel instrumentation
-
IEEE CS Press, Los Alamitos, Calif
-
B. Moore, T. Slabach and L. Schaelicke "Profiling Interrupt Handler Performance through Kernel Instrumentation," Proc. Int'l Conf. Computer Design (ICCD), IEEE CS Press, Los Alamitos, Calif, 2003, pp. 156-163.
-
(2003)
Proc. Int'l Conf. Computer Design (ICCD)
, pp. 156-163
-
-
Moore, B.1
Slabach, T.2
Schaelicke, L.3
-
10
-
-
84903593793
-
An experience developing an IDS stimulator for the black-box testing of network intrusion detection systems
-
D. Mutz, G. Vigna, and R.A. Kemmerer, "An Experience Developing an IDS Stimulator for the Black-Box Testing of Network Intrusion Detection Systems," Proc. Ann. Comp. Security Applications Conference (ACSAC), pp. 374-383, 2003.
-
(2003)
Proc. Ann. Comp. Security Applications Conference (ACSAC)
, pp. 374-383
-
-
Mutz, D.1
Vigna, G.2
Kemmerer, R.A.3
-
11
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
V. Paxson, "Bro: A System for Detecting Network Intruders in Real-Time", Computer Networks, vol. 31, no. 23-24, 1999, pp. 2435-2463.
-
(1999)
Computer Networks
, vol.31
, Issue.23-24
, pp. 2435-2463
-
-
Paxson, V.1
-
12
-
-
0004145058
-
Insertion, evasion, and denial of service: Eluding network intrusion detection
-
Secure Networks, Inc.
-
T. Ptacek and T. Newsham, "Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection, " tech. report, Secure Networks, Inc., 1998.
-
(1998)
Tech. Report
-
-
Ptacek, T.1
Newsham, T.2
-
13
-
-
0001214789
-
A methodology for testing intrusion detection systems
-
IEEE CS Press, Los Alamitos, Calif.
-
N. Puketza, K. Zhang, M. Chung, B. Mukherjee and R. Olsson, "A Methodology for Testing Intrusion Detection Systems," IEEE Trans. Software Engineering, IEEE CS Press, Los Alamitos, Calif., vol. 22", no. 10, 1996, pp. 719-729.
-
(1996)
IEEE Trans. Software Engineering
, vol.22
, Issue.10
, pp. 719-729
-
-
Puketza, N.1
Zhang, K.2
Chung, M.3
Mukherjee, B.4
Olsson, R.5
-
16
-
-
35248869269
-
Characterizing the performance of network intrusion detection sensors
-
Springer-Verlag, Berlin-Heidelberg-New York
-
L. Schaelicke, T. Slabach, B. Moore and C. Freeland, "Characterizing the Performance of Network Intrusion Detection Sensors," Proc. Sixth Int'l Symp. Recent Advances in Intrusion Detection (RAID), Springer-Verlag, Berlin-Heidelberg-New York, pp. 155-172, 2003.
-
(2003)
Proc. Sixth Int'l Symp. Recent Advances in Intrusion Detection (RAID)
, pp. 155-172
-
-
Schaelicke, L.1
Slabach, T.2
Moore, B.3
Freeland, C.4
-
17
-
-
12444292669
-
-
tech. report TR 02-10, Dept. Computer Science Engineering, Univ. of Notre Dame, Notre Dame, In.
-
L. Schaelicke, M. Parker, ML-RSIM Reference Manual, tech. report TR 02-10, Dept. Computer Science Engineering, Univ. of Notre Dame, Notre Dame, In., 2002.
-
(2002)
ML-RSIM Reference Manual
-
-
Schaelicke, L.1
Parker, M.2
-
18
-
-
0003450887
-
-
tech. report 2001-02, Compaq Western Research Laboratory, Palo Alto, Calif.
-
P. Shivakumar and N.P. Jouppi, "CACTI 3.0: An Integrated Cache Timing, Power, and Area Model," tech. report 2001-02, Compaq Western Research Laboratory, Palo Alto, Calif., 2001.
-
(2001)
CACTI 3.0: An Integrated Cache Timing, Power, and Area Model
-
-
Shivakumar, P.1
Jouppi, N.P.2
-
19
-
-
2442505048
-
-
whitepaper, Sourcefire Network Security Inc.
-
"Snort 2.0 - Detection Revisited," whitepaper, Sourcefire Network Security Inc., 2002.
-
(2002)
Snort 2.0 - Detection Revisited
-
-
-
20
-
-
84859289762
-
-
tcpdump/libpacp, http://www.tcpdump.org.
-
-
-
-
21
-
-
85084160699
-
LMBench: Portable tools for performance analysis
-
Usenix Assoc., Berkeley, Calif.
-
L. McVoy and C. Staelin, "LMBench: Portable Tools for Performance Analysis," Proc. USENIX Annual Technical Conference, Usenix Assoc., Berkeley, Calif., 1996, pp. 279-294.
-
(1996)
Proc. USENIX Annual Technical Conference
, pp. 279-294
-
-
McVoy, L.1
Staelin, C.2
|