-
3
-
-
33947597689
-
Planet scale software updates
-
Gkantsidis, C., Karagiannis, T., Rodriguez, P., Vojnovic, M.: Planet scale software updates. In: Proceedings of ACM SIGCOMM'2006 (2006)
-
(2006)
Proceedings of ACM SIGCOMM
-
-
Gkantsidis, C.1
Karagiannis, T.2
Rodriguez, P.3
Vojnovic, M.4
-
4
-
-
33646735570
-
-
Doyen, G., Nataf, E., Festor, O.: A hierarchical architecture for a distributed management of p2p networks and services. In: Schönwälder J., Serrat J., (eds). DSOM, ser. Lecture Notes in Computer Science, 3775. Springer, pp 257-268 (2005)
-
Doyen, G., Nataf, E., Festor, O.: A hierarchical architecture for a distributed management of p2p networks and services. In: Schönwälder J., Serrat J., (eds). DSOM, ser. Lecture Notes in Computer Science, vol. 3775. Springer, pp 257-268 (2005)
-
-
-
-
5
-
-
33947588121
-
-
prison time for bot master
-
Lemos, R.: Major prison time for bot master, http://www.securityfocus. com/brief/205 (2006)
-
(2006)
Major
-
-
Lemos, R.1
-
7
-
-
79960397800
-
-
Aitel, D.: Nematodes, http://www.immunitysec.com/resources-papers.shtml (2006)
-
(2006)
Nematodes
-
-
Aitel, D.1
-
11
-
-
4344606310
-
-
Wiley, London
-
Koziol, J., Litchfield, D., Aitel, D., Anley, C., Eren, S., Mehta, N.: The Shellcoder's Handbook: Discovering and Exploiting Security Holes. Wiley, London (2004)
-
(2004)
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
-
-
Koziol, J.1
Litchfield, D.2
Aitel, D.3
Anley, C.4
Eren, S.5
Mehta, N.6
-
13
-
-
84878539748
-
Flexible Network Management Using Active Network Framework
-
Covaci S, ed, Active networks: Proceedings of 1st international working Conference, IWAN'99, Berlin, Springer, Heidelberg
-
Sugauchi, K., Miyazaki, S., Yoshida, K., Nakane, S., Covaci, K., Zhang, T.: Flexible Network Management Using Active Network Framework. In: Covaci S. (ed.) Active networks: Proceedings of 1st international working Conference, IWAN'99, Berlin. LNCS 1653, pp. 241-248. Springer, Heidelberg (1999)
-
(1653)
LNCS
, pp. 241-248
-
-
Sugauchi, K.1
Miyazaki, S.2
Yoshida, K.3
Nakane, S.4
Covaci, K.5
Zhang, T.6
-
15
-
-
0041080781
-
Smart packets: Applying active networks to network management
-
Schwartz, B., Jackson, A., Strayer, W., Zhou, W., Rockwell, D., Partridge, C.: Smart packets: applying active networks to network management. ACM Trans. Comput. Syst. 18(1), 67-88 (2000)
-
(2000)
ACM Trans. Comput. Syst
, vol.18
, Issue.1
, pp. 67-88
-
-
Schwartz, B.1
Jackson, A.2
Strayer, W.3
Zhou, W.4
Rockwell, D.5
Partridge, C.6
-
19
-
-
33947581878
-
-
IETF: Network working group c. kalt request for comments:2810 (2000)
-
IETF: Network working group c. kalt request for comments:2810 (2000)
-
-
-
-
20
-
-
84955557456
-
Hiding routing information
-
Goldschlag, D., Reed, M., Syverson, P.: Hiding routing information. LNCS 1174, 137-150 (1996)
-
(1996)
LNCS
, vol.1174
, pp. 137-150
-
-
Goldschlag, D.1
Reed, M.2
Syverson, P.3
-
21
-
-
35048892939
-
-
Cridlig, V., Festor, O., State, R.: Role-based access control for xml enabled management gateways. In: Sahai A., Wu F. (eds.) DSOM, ser. Lecture Notes in Computer Science, 3278, pp. 183-195. Springer, Heidelberg (2004)
-
Cridlig, V., Festor, O., State, R.: Role-based access control for xml enabled management gateways. In: Sahai A., Wu F. (eds.) DSOM, ser. Lecture Notes in Computer Science, vol. 3278, pp. 183-195. Springer, Heidelberg (2004)
-
-
-
-
22
-
-
33947579788
-
-
Filiol, E.: Computer Viruses: From Theory To Applications.Springer, Heidelberg (2005)
-
Filiol, E.: Computer Viruses: From Theory To Applications.Springer, Heidelberg (2005)
-
-
-
-
24
-
-
33947578501
-
Strong cryptography armoured computer viruses forbidding code analysis: The bradley virus
-
Filiol, E.: Strong cryptography armoured computer viruses forbidding code analysis: the bradley virus. In: EICAR2005 annual conference 14, StJuliens/Valletta-Malta (2005)
-
(2005)
EICAR2005 annual conference 14, StJuliens/Valletta-Malta
-
-
Filiol, E.1
|