-
1
-
-
33847129500
-
-
BBN Technologies, 10 Moulton Street, Cambridge, MA 02138, Tech. Rep. BBN REPORT-8384, Dec
-
W. T. Strayer, C. E. Jones, I. Castineyra, J. B. Levin, and R. R. Hain, "An Integrated Architecture for Attack Attribution," BBN Technologies, 10 Moulton Street, Cambridge, MA 02138, Tech. Rep. BBN REPORT-8384, Dec. 2003.
-
(2003)
An Integrated Architecture for Attack Attribution
-
-
Strayer, W.T.1
Jones, C.E.2
Castineyra, I.3
Levin, J.B.4
Hain, R.R.5
-
4
-
-
0005063385
-
-
D. Goldschlag, M. Reed, and P. Syverson, Onion Routing for Anonymous and Private Internet Connections, Communications of the ACM, 42, no. 3, pp. 39-4-1, Feb. 1999.
-
D. Goldschlag, M. Reed, and P. Syverson, "Onion Routing for Anonymous and Private Internet Connections," Communications of the ACM, vol. 42, no. 3, pp. 39-4-1, Feb. 1999.
-
-
-
-
5
-
-
33749461359
-
The Secure Shell (SSH) Protocol Architecture
-
IETF RFC:4251, Jan, Online, Available
-
T. Ylonen, "The Secure Shell (SSH) Protocol Architecture," IETF RFC:4251, Jan. 2006. [Online]. Available: http://www.ietf.org/rfc/rfc4251.txt
-
(2006)
-
-
Ylonen, T.1
-
6
-
-
0033650584
-
Practical Network Support for IP Traceback
-
Sep
-
S. Savage, D. Wetherall, A. R. Karlin, and T. Anderson, "Practical Network Support for IP Traceback," in Proc. of ACM SIGCOMM, Sep. 2000, pp. 295-306.
-
(2000)
Proc. of ACM SIGCOMM
, pp. 295-306
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.R.3
Anderson, T.4
-
7
-
-
0034775309
-
Hash-Based IP Traceback
-
Sep
-
A. C. Snoeren, C. Partridge, L. A. Sanchez, C. E. Jones, F. Tchakountio, B. Schwartz, S. T. Kent, and W. T. Strayer, "Hash-Based IP Traceback," in Proc. of ACM SIGCOMM, Sep. 2001, pp. 3-14.
-
(2001)
Proc. of ACM SIGCOMM
, pp. 3-14
-
-
Snoeren, A.C.1
Partridge, C.2
Sanchez, L.A.3
Jones, C.E.4
Tchakountio, F.5
Schwartz, B.6
Kent, S.T.7
Strayer, W.T.8
-
8
-
-
84958977733
-
Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay
-
Oct
-
D. L. Donoho, A. G. Flesia, U. Shankar, V. Paxson, J. Coit, and S. Staniford, "Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay," in Proc. of the 5th International Symposium on Recent Advances in Intrusion Detection (RAID), Oct. 2002, pp. 17-35.
-
(2002)
Proc. of the 5th International Symposium on Recent Advances in Intrusion Detection (RAID)
, pp. 17-35
-
-
Donoho, D.L.1
Flesia, A.G.2
Shankar, U.3
Paxson, V.4
Coit, J.5
Staniford, S.6
-
10
-
-
35048846490
-
Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds
-
Oct
-
A. Blum, D. X. Song, and S. Venkataraman, "Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds," in Proc. of the 7th International Symposium on Recent Advances in Intrusion Detection (RAID), Oct. 2004, pp. 258-277.
-
(2004)
Proc. of the 7th International Symposium on Recent Advances in Intrusion Detection (RAID)
, pp. 258-277
-
-
Blum, A.1
Song, D.X.2
Venkataraman, S.3
-
12
-
-
33745773302
-
Tracking Anonymous Peer-to-Peer VoIP Calls on the Internet
-
Nov
-
X. Wang, S. Chen, and S. Jajodia, "Tracking Anonymous Peer-to-Peer VoIP Calls on the Internet," in Proc. of the 12th ACM conference on Computer and Communications Security (CCS), Nov. 2005, pp. 81-91.
-
(2005)
Proc. of the 12th ACM conference on Computer and Communications Security (CCS)
, pp. 81-91
-
-
Wang, X.1
Chen, S.2
Jajodia, S.3
-
13
-
-
0003418321
-
Transmission Control Protocol
-
IETF RFC:793, Sep, Online, Available
-
J. Postel, "Transmission Control Protocol," IETF RFC:793, Sep. 1981. [Online], Available: http://www.ietf.org/rfc/rfc793.txt
-
(1981)
-
-
Postel, J.1
-
14
-
-
84904261405
-
Sleepy Watermark Tracing: An Active Network-Based Intrusion Response Framework
-
Jun
-
X. Wang, D. S. Reeves, S. F. Wu, and J. Yuill, "Sleepy Watermark Tracing: An Active Network-Based Intrusion Response Framework," in Proc. of the 16th International Conference on Information Security (IFIP/Sec), Jun. 2001, pp. 369-384.
-
(2001)
Proc. of the 16th International Conference on Information Security (IFIP/Sec)
, pp. 369-384
-
-
Wang, X.1
Reeves, D.S.2
Wu, S.F.3
Yuill, J.4
-
16
-
-
84957003012
-
Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones
-
Oct
-
X. Wang, D. S. Reeves, and S. F. Wu, "Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones," in Proc. of the 7th European Symposium on Research in Computer Security (ESORICS), Oct. 2002, pp. 244-263.
-
(2002)
Proc. of the 7th European Symposium on Research in Computer Security (ESORICS)
, pp. 244-263
-
-
Wang, X.1
Reeves, D.S.2
Wu, S.F.3
-
17
-
-
34548334122
-
-
Iowa State University, Tech. Rep. TR-2005-02-1, Feb
-
L. Zhang, A. Persaud, A. Johnson, and Y. Guan, "Stepping Stone Attack Attribution in Non-Cooperative IP Networks," Iowa State University, Tech. Rep. TR-2005-02-1, Feb. 2005.
-
(2005)
Stepping Stone Attack Attribution in Non-Cooperative IP Networks
-
-
Zhang, L.1
Persaud, A.2
Johnson, A.3
Guan, Y.4
-
18
-
-
85116427392
-
Active Timing-Based Correlation of Perturbed Traffic Flows with Chaff Packets
-
Jun
-
P. Peng, P. Ning, D. S. Reeve, and X. Wang, "Active Timing-Based Correlation of Perturbed Traffic Flows with Chaff Packets," in Proc. of the 2nd International Workshop on Security in Distributed Computing Systems (SDCS), Jun. 2005, pp. 107-113.
-
(2005)
Proc. of the 2nd International Workshop on Security in Distributed Computing Systems (SDCS)
, pp. 107-113
-
-
Peng, P.1
Ning, P.2
Reeve, D.S.3
Wang, X.4
-
19
-
-
4544285485
-
Techniques and Applications of Digital Watermarking and Content Protection
-
Boston: Artech House
-
M. Arnold, M. Schmucker, and S. D. Wolthusen, Techniques and Applications of Digital Watermarking and Content Protection, ser. Computer Security. Boston: Artech House, 2003.
-
(2003)
ser. Computer Security
-
-
Arnold, M.1
Schmucker, M.2
Wolthusen, S.D.3
-
20
-
-
0035333687
-
Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding
-
May
-
B. Chen and G. W. Wornell, "Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding," IEEE Transaction on Information Theory, vol. 47, no. 4, pp. 1423-1443, May 2001.
-
(2001)
IEEE Transaction on Information Theory
, vol.47
, Issue.4
, pp. 1423-1443
-
-
Chen, B.1
Wornell, G.W.2
-
21
-
-
0030384775
-
Techniques for Data Hiding
-
W. Bender, D. Gruhl, N. Morimoto, and A. Lu, "Techniques for Data Hiding," IBM Systems Journal, vol. 35, no. 3 & 4, pp. 313-336, 1996.
-
(1996)
IBM Systems Journal
, vol.35
, Issue.3 4
, pp. 313-336
-
-
Bender, W.1
Gruhl, D.2
Morimoto, N.3
Lu, A.4
-
22
-
-
0347029289
-
Copy Protection for Multimedia Data based on Labeling Techniques
-
Enschede, The Netherlands, May
-
G. Langelaar, J. van der Lubbe, and J. Biemond, "Copy Protection for Multimedia Data based on Labeling Techniques," in Proc. of the 17th Symposium on Information Theory in the Benelux, Enschede, The Netherlands, May 1996, pp. 33-39.
-
(1996)
Proc. of the 17th Symposium on Information Theory in the Benelux
, pp. 33-39
-
-
Langelaar, G.1
van der Lubbe, J.2
Biemond, J.3
-
23
-
-
0029323403
-
Wide-Area Traffic: The Failure of Poisson Modeling
-
Jun
-
V. Paxson and S. Floyd, "Wide-Area Traffic: The Failure of Poisson Modeling," IEEE/ACM Transactions on Networking, vol. 3, no. 3, pp. 226-244, Jun. 1995.
-
(1995)
IEEE/ACM Transactions on Networking
, vol.3
, Issue.3
, pp. 226-244
-
-
Paxson, V.1
Floyd, S.2
-
26
-
-
33751040560
-
On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques
-
May
-
P. Peng, P. Ning, and D. S. Reeves, "On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques," in Proc. of the 2006 IEEE Symposium on Security and Privacy (SaP), May 2006, pp. 334-349.
-
(2006)
Proc. of the 2006 IEEE Symposium on Security and Privacy (SaP)
, pp. 334-349
-
-
Peng, P.1
Ning, P.2
Reeves, D.S.3
-
27
-
-
84874820018
-
-
Online, Available
-
Netfilter iptables. [Online]. Available: http://www.netfilter.org
-
Netfilter iptables
-
-
|