-
1
-
-
8644229619
-
The Art of Port Scanning
-
Sept
-
Fydor, "The Art of Port Scanning," Phrack Magazine, vol. 7, Sept. 1997.
-
(1997)
Phrack Magazine
, vol.7
-
-
Fydor1
-
2
-
-
84860027646
-
Nessus Security Scanner
-
"Nessus Security Scanner." http://www.nessus.org.
-
-
-
-
3
-
-
34247265577
-
-
The Subterrain Security Group
-
The Subterrain Security Group, "Siphon Project," 2000. http://siphon.datanerds.net.
-
(2000)
Siphon Project
-
-
-
4
-
-
34247243728
-
the new pOf: 2.0.5
-
M. Zalewski, "the new pOf: 2.0.5," 2004. http://icamtuf. coredump.es/p0f.shtml.
-
(2004)
-
-
Zalewski, M.1
-
6
-
-
34247276673
-
Passive Vulnerability Scanning
-
tech. rep, Tenable Network Security, Aug
-
R. Gula, R. Deraison, and T. Hayton, "Passive Vulnerability Scanning," tech. rep., Tenable Network Security, Aug. 2003. http://www.tenablesecurity.com/images/pdfs/passive_scanning_tenable.pdf.
-
(2003)
-
-
Gula, R.1
Deraison, R.2
Hayton, T.3
-
7
-
-
34247254444
-
-
Sourcefire, "RNA Sensor," 2004. http://www.sourcefire.com/ products/rna.html.
-
(2004)
RNA Sensor
-
-
Sourcefire1
-
8
-
-
0028491368
-
Empirically-Derived Analytic Models of Wide Area TCP Connections
-
V. Paxson, "Empirically-Derived Analytic Models of Wide Area TCP Connections," IEEE/ACM Transactions on Networking, vol. 2, no. 4, pp. 216-336, 1994.
-
(1994)
IEEE/ACM Transactions on Networking
, vol.2
, Issue.4
, pp. 216-336
-
-
Paxson, V.1
-
9
-
-
2442537008
-
Analyzing Peer-to-Peer Traffic Across Large Networks
-
S. Sen and J. Wang, "Analyzing Peer-to-Peer Traffic Across Large Networks," IEEE/ACM Transactions on Networking, vol. 12, no. 2, pp. 219-232, 2004.
-
(2004)
IEEE/ACM Transactions on Networking
, vol.12
, Issue.2
, pp. 219-232
-
-
Sen, S.1
Wang, J.2
-
10
-
-
34247189190
-
Ntop: Beyond Ping and Traceroute
-
99, Oct
-
L. Deri and S. Suin, "Ntop: Beyond Ping and Traceroute," Proceedings of DSOM '99, Oct. 1999.
-
(1999)
Proceedings of DSOM
-
-
Deri, L.1
Suin, S.2
-
12
-
-
84984898291
-
Passive Operating System Identification From TCP/IP Packet Headers
-
R. Lippmann, D. Fried, K. Piwowarski, and W. Streilein, "Passive Operating System Identification From TCP/IP Packet Headers," Workshop on Data Mining for Computer Security, 2004.
-
(2004)
Workshop on Data Mining for Computer Security
-
-
Lippmann, R.1
Fried, D.2
Piwowarski, K.3
Streilein, W.4
-
13
-
-
34247248379
-
Comparative Analysis of Active and Passive Mapping Techniques In an Internet-based Local Area Network,
-
Master's thesis, Air Force Institute of Technology, Sept
-
J. Kuntzelman, "Comparative Analysis of Active and Passive Mapping Techniques In an Internet-based Local Area Network," Master's thesis, Air Force Institute of Technology, Sept. 2004.
-
(2004)
-
-
Kuntzelman, J.1
-
16
-
-
34247259617
-
-
The SANS Institute
-
The SANS Institute, "Survival Time History." http://isc.sans.org/survivalhistory.php.
-
Survival Time History
-
-
|