-
2
-
-
27844555787
-
-
June
-
Young prefer texting to calls'. http://news.bbc.co.uk/2/hi/business/ 2985072.stm, June 2003.
-
(2003)
Young Prefer Texting to Calls
-
-
-
5
-
-
0028761757
-
Control and quality-of-service provisioning in high- speed microcellular networks
-
A. Acampora and M. Naghshineh. Control and Quality-of-Service Provisioning in High- Speed Microcellular Networks. IEEE Personal Communications, 1(2):36-43, 1994.
-
(1994)
IEEE Personal Communications
, vol.1
, Issue.2
, pp. 36-43
-
-
Acampora, A.1
Naghshineh, M.2
-
6
-
-
33751034083
-
Online extortion - How a bookmaker and a whiz kid took on an extortionist and won
-
May
-
S. Berinato. Online Extortion - How a Bookmaker and a Whiz Kid Took On an Extortionist and Won. CSO Online, May 2005.
-
(2005)
CSO Online
-
-
Berinato, S.1
-
7
-
-
0003621085
-
-
rfc2309.txt
-
B. Branden, D. Clark, J. Crowcroft, B. Davie, S. Deering, D. Estrin, S. Floyd, V. Jacobson, G. Minshall, C. Partridge, L. Peterson, K. Ramakrishnan, S. Shenker, J. Wroclawski, and L. Zhang. RFC 2309 - Recommendations on Queue Management and congestion Avoidance in the Internet, rfc2309.txt, 1998.
-
(1998)
RFC 2309 - Recommendations on Queue Management and Congestion Avoidance in the Internet
-
-
Branden, B.1
Clark, D.2
Crowcroft, J.3
Davie, B.4
Deering, S.5
Estrin, D.6
Floyd, S.7
Jacobson, V.8
Minshall, G.9
Partridge, C.10
Peterson, L.11
Ramakrishnan, K.12
Shenker, S.13
Wroclawski, J.14
Zhang, L.15
-
8
-
-
4444317270
-
Defending against an internet-based attack on the physical world
-
August
-
S. Byers, A. Rubin, and D. Kormann. Defending Against an Internet-based Attack on the Physical World. ACM Transactions on Internet Technology (TOIT), 4(3):239-254, August 2004.
-
(2004)
ACM Transactions on Internet Technology (TOIT)
, vol.4
, Issue.3
, pp. 239-254
-
-
Byers, S.1
Rubin, A.2
Kormann, D.3
-
11
-
-
0034581037
-
Ten risks of PKI: What you're not being told about public-key infrastructure
-
C. M. Ellison and B. Schneier. Ten Risks of PKI: What You're Not Being Told About Public-Key Infrastructure. Computer Security Journal, 16(1):1-7, 1999.
-
(1999)
Computer Security Journal
, vol.16
, Issue.1
, pp. 1-7
-
-
Ellison, C.M.1
Schneier, B.2
-
13
-
-
0027647490
-
Random early detection gateways for congestion avoidance
-
August
-
S. Floyd and V. Jacobson. Random Early Detection Gateways for Congestion Avoidance. IEEE/ACM Transactions on Networking, 1(4):397-413, August 1993.
-
(1993)
IEEE/ACM Transactions on Networking
, vol.1
, Issue.4
, pp. 397-413
-
-
Floyd, S.1
Jacobson, V.2
-
17
-
-
0000006151
-
Myths about congestion management in high speed networks
-
R. Jain. Myths about congestion management in high speed networks. Internetworking: Research and Experience, 3:101-113, 1992.
-
(1992)
Internetworking: Research and Experience
, vol.3
, pp. 101-113
-
-
Jain, R.1
-
18
-
-
33751059223
-
Perimeter security ain't what it used to be, experts say
-
G. Kunene. Perimeter Security Ain't What It Used to Be, Experts Say. DevX.com, 2004.
-
(2004)
DevX.com
-
-
Kunene, G.1
-
20
-
-
0028554980
-
The performance of the GSM random access procedure
-
June
-
C. Luders and R. Haferbeck. The Performance of the GSM Random Access Procedure. In Vehicular Technology Conference, pages 1165-1169, June 1994.
-
(1994)
Vehicular Technology Conference
, pp. 1165-1169
-
-
Luders, C.1
Haferbeck, R.2
-
24
-
-
0742276097
-
Inside the slammer worm
-
July
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver. Inside the Slammer Worm. IEEE Security and Privacy, 1(4), July 2003.
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.4
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
25
-
-
33751038468
-
-
Motorola Corporation
-
Motorola Corporation, Motorola GSM Solutions, www.motorola.com/ networkoperators/pdfs/GSM-Solutions.pdf, 2006.
-
(2006)
Motorola GSM Solutions
-
-
-
26
-
-
0023329886
-
On packet switches with infinite storage
-
April
-
J. B. Nagle, On Packet Switches with Infinite Storage, IEEE Transactions on Communications, COM-35(4), April 1987.
-
(1987)
IEEE Transactions on Communications
, vol.COM-35
, Issue.4
-
-
Nagle, J.B.1
-
30
-
-
0011311015
-
-
R. F. Rey, editor. Bell Telephone Laboratories, INC, second edition
-
R. F. Rey, editor. Engineering and Operations in the Bell System. Bell Telephone Laboratories, INC, second edition, 1984.
-
(1984)
Engineering and Operations in the Bell System
-
-
-
31
-
-
33751026898
-
Yahoo attributes a lengthy service failure to an attack
-
February 8
-
M. Richtel. Yahoo Attributes a Lengthy Service Failure to an Attack. The New York Times, February 8 2000.
-
(2000)
The New York Times
-
-
Richtel, M.1
-
33
-
-
33751031776
-
Al-Jazeera sites hit with denial-of-service attacks
-
March 26
-
P. Roberts, Al-Jazeera Sites Hit With Denial-of-Service Attacks. PCWorld Magazine, March 26 2003.
-
(2003)
PCWorld Magazine
-
-
Roberts, P.1
-
34
-
-
0033650584
-
Practical network support for IP traceback
-
October
-
S. Savage, D. Wetherall, A. Karlin, and T. Anderson. Practical network support for IP traceback. In Proceedings of ACM SIGCOMM, pages 295-306, October 2000.
-
(2000)
Proceedings of ACM SIGCOMM
, pp. 295-306
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
37
-
-
14844300104
-
New client puzzle outsourcing techniques for DoS resistance
-
B. Waters, A. Juels, J. Halderman, and E. Felten. New client puzzle outsourcing techniques for DoS resistance. In Proceedings of ACM CCS'04, pages 246-256, 2004.
-
(2004)
Proceedings of ACM CCS'04
, pp. 246-256
-
-
Waters, B.1
Juels, A.2
Halderman, J.3
Felten, E.4
|