-
1
-
-
34247339603
-
-
IEEE Std 802.11. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. Technical report, IEEE, Jul. 1997.
-
IEEE Std 802.11. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. Technical report, IEEE, Jul. 1997.
-
-
-
-
2
-
-
34247399039
-
-
S.M. Bellovin, Marcus Leech, and Tom Taylor. ICMP
-
S.M. Bellovin, Marcus Leech, and Tom Taylor. ICMP
-
-
-
-
3
-
-
34247376834
-
-
Traceback Messages. Technical report, Internet Draft, IETF, Mar. 2001.
-
Traceback Messages. Technical report, Internet Draft, IETF, Mar. 2001.
-
-
-
-
4
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
Jul
-
B.H. Bloom. Space/time trade-offs in hash coding with allowable errors. Communications of ACM, 13(7):422-426, Jul. 1970.
-
(1970)
Communications of ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.H.1
-
6
-
-
84962278506
-
Design and Implementation of A Real-Time Decentralized Source Identification System for Untrusted IP Packets
-
Jan
-
H.Y. Chang, P. Chen, A. Hayatnagarkar, R. Narayan, P. Sheth, N. Vo, C. L. Wu, S.F. Wu, L. Zhang, X. Zhang, F. Gong, F. Jou, C. Sargor, and X. Wu. Design and Implementation of A Real-Time Decentralized Source Identification System for Untrusted IP Packets. In Proceedings of the DARPA Information Survivability Conference and Exposition, Jan. 2000.
-
(2000)
Proceedings of the DARPA Information Survivability Conference and Exposition
-
-
Chang, H.Y.1
Chen, P.2
Hayatnagarkar, A.3
Narayan, R.4
Sheth, P.5
Vo, N.6
Wu, C.L.7
Wu, S.F.8
Zhang, L.9
Zhang, X.10
Gong, F.11
Jou, F.12
Sargor, C.13
Wu, X.14
-
7
-
-
84962214242
-
DECIDUOUS: Decentralized Source Identification for Network-Based Intrusions
-
H.Y. Chang, R. Narayan, C. Sargor, F. Jou, S.F. Wu, B.M. Vetter, F. Gong, X. Wang, M. Brown, and J.J. Yuill. DECIDUOUS: Decentralized Source Identification for Network-Based Intrusions. In Proceeding of 6th IFIP/IEEE International Symposium on Integrated Network Management, pages 702-714, 1999.
-
(1999)
Proceeding of 6th IFIP/IEEE International Symposium on Integrated Network Management
, pp. 702-714
-
-
Chang, H.Y.1
Narayan, R.2
Sargor, C.3
Jou, F.4
Wu, S.F.5
Vetter, B.M.6
Gong, F.7
Wang, X.8
Brown, M.9
Yuill, J.J.10
-
8
-
-
34247325925
-
-
Inc
-
Inc. CrossBow Technology, http://www.xbow.com, 2005.
-
(2005)
CrossBow Technology
-
-
-
10
-
-
0034448864
-
Using Router Stamping to Identify the Source of IP Packets
-
Athens, Greece, Nov
-
T.W. Doeppner, P. N. Klein, and A. Koyfman. Using Router Stamping to Identify the Source of IP Packets. In 7th ACM Conference on Computer and Communications Security, pages 184-189, Athens, Greece, Nov. 2000.
-
(2000)
7th ACM Conference on Computer and Communications Security
, pp. 184-189
-
-
Doeppner, T.W.1
Klein, P.N.2
Koyfman, A.3
-
14
-
-
3543118019
-
Space-code bloom filter for efficient traffic flow measurement
-
Miami Beach, FL
-
A. Kumar, J. Xu, E.L. Li, and J. Wang. Space-code bloom filter for efficient traffic flow measurement. In Proceedings of the 3rd ACM SIGCOMM conference on Internet measurement, pages 167-172, Miami Beach, FL, 2003.
-
(2003)
Proceedings of the 3rd ACM SIGCOMM conference on Internet measurement
, pp. 167-172
-
-
Kumar, A.1
Xu, J.2
Li, E.L.3
Wang, J.4
-
15
-
-
3543126644
-
Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation
-
Berkeley, CA, May
-
J. Li, M. Sung, J. Xu, and L. Li. Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation. In IEEE Symposium on Security and Privacy, Berkeley, CA, May 2004.
-
(2004)
IEEE Symposium on Security and Privacy
-
-
Li, J.1
Sung, M.2
Xu, J.3
Li, L.4
-
16
-
-
84950242640
-
On Design and Evaluation of Intention-Driven ICMP Traceback
-
A. Mankin, D. Massey, C. Wu, S. F. Wu, and L. Zhang. On Design and Evaluation of Intention-Driven ICMP Traceback. In Proceedings of IEEE International Conference on Computer Communications and Networks (ICSN), 2001.
-
(2001)
Proceedings of IEEE International Conference on Computer Communications and Networks (ICSN)
-
-
Mankin, A.1
Massey, D.2
Wu, C.3
Wu, S.F.4
Zhang, L.5
-
18
-
-
0034776786
-
On the Effectiveness of Probabilistic Packet Marking for IP Traceback
-
K. Park and H. Lee. On the Effectiveness of Probabilistic Packet Marking for IP Traceback. In Proceedings of SIGCOMM, pages 15-26, 2001.
-
(2001)
Proceedings of SIGCOMM
, pp. 15-26
-
-
Park, K.1
Lee, H.2
-
19
-
-
0036349210
-
Probabilistic Location and Routing
-
S.C. Rhea and J. Kubiatowicz. Probabilistic Location and Routing. In INFOCOM, 2002.
-
(2002)
INFOCOM
-
-
Rhea, S.C.1
Kubiatowicz, J.2
-
22
-
-
84964474589
-
Hardware Support for a Hash-Based IP Traceback
-
Jun
-
L.A. Sanchez, W.C. Milliken, A.C. Snoeren, F. Tchakountio, C.E. Jones, S.T. Kent, C. Partridge, and W.T. Strayer. Hardware Support for a Hash-Based IP Traceback. In Proceedings of DARPA Information Survivability Conference and Exposition, Jun. 2001.
-
(2001)
Proceedings of DARPA Information Survivability Conference and Exposition
-
-
Sanchez, L.A.1
Milliken, W.C.2
Snoeren, A.C.3
Tchakountio, F.4
Jones, C.E.5
Kent, S.T.6
Partridge, C.7
Strayer, W.T.8
-
24
-
-
0034775309
-
Hash-based IP Traceback
-
A.C. Snoeren, C. Partridge, L.A. Sanchez, C.E. Jones, F. Tchakountio, S.T. Kent, and W.T. Strayer. Hash-based IP Traceback. In Proceedings of ACM Conference on Applications, Technologies, Architectures and Protocols for Computer Communication (SIGCOMM), pages 3-14, 2001.
-
(2001)
Proceedings of ACM Conference on Applications, Technologies, Architectures and Protocols for Computer Communication (SIGCOMM)
, pp. 3-14
-
-
Snoeren, A.C.1
Partridge, C.2
Sanchez, L.A.3
Jones, C.E.4
Tchakountio, F.5
Kent, S.T.6
Strayer, W.T.7
-
31
-
-
2442556704
-
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
-
X. Wang and D.S. Reeves. Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays. In ACM Conference on Computer and Communications Security, pages 20-29, 2003.
-
(2003)
ACM Conference on Computer and Communications Security
, pp. 20-29
-
-
Wang, X.1
Reeves, D.S.2
|