-
1
-
-
0003508558
-
-
AES, National Institute of Standards and Technology, US Department of Commerce, FIPS 197
-
AES (2001). Advanced Encryption Standard. National Institute of Standards and Technology, US Department of Commerce, FIPS 197.
-
(2001)
Advanced Encryption Standard
-
-
-
2
-
-
0003914522
-
-
Technical Report CMU/SEI-99TR-028, Carnagie Mellon, Software Engineering Institute
-
Allen, J., Christie, A., Fithen, W., McHugh, J., Pickel, J., and Stoner, E. (2000). State of the Practice of Intrusion Detection Technologies. Technical Report CMU/SEI-99TR-028, Carnagie Mellon, Software Engineering Institute.
-
(2000)
State of the Practice of Intrusion Detection Technologies
-
-
Allen, J.1
Christie, A.2
Fithen, W.3
McHugh, J.4
Pickel, J.5
Stoner, E.6
-
3
-
-
84947584994
-
Application-Integrated Data Collection for Security Monitoring
-
In Lee, W., Mé, L., and Wespi, A., editors, Lecture Notes in Computer Science,. Springer
-
Almgren, M. and Lindqvist, U. (2001). Application-Integrated Data Collection for Security Monitoring. In Lee, W., Mé, L., and Wespi, A., editors, Recent Advances in Intrusion Detection (RAID), Lecture Notes in Computer Science, pages 22-36. Springer.
-
(2001)
Recent Advances in Intrusion Detection (RAID)
, pp. 22-36
-
-
Almgren, M.1
Lindqvist, U.2
-
5
-
-
0033281215
-
The Base-Rate Fallacy and Its Implications for the Difficulty of Intrusion Detection
-
Axelsson, S. (1999). The Base-Rate Fallacy and Its Implications for the Difficulty of Intrusion Detection. In ACM Conference on Computer and Communications Security, pages 1-7.
-
(1999)
ACM Conference on Computer and Communications Security
, pp. 1-7
-
-
Axelsson, S.1
-
6
-
-
0038223829
-
-
Technical Report NIST SP 800-31, National Institute of Standards and Technology
-
Bace, R. and Mell, P. (2001). Intrusion Detection Systems. Technical Report NIST SP 800-31, National Institute of Standards and Technology.
-
(2001)
Intrusion Detection Systems
-
-
Bace, R.1
Mell, P.2
-
7
-
-
84955580290
-
An Architecture for Intrusion Detection using Autonomous Agents
-
Balasubramaniyan, J. S., Garcia-Fernandez, J. O., Isacoff, D., Spafford, E., and Zamboni, D. (1998). An Architecture for Intrusion Detection using Autonomous Agents. In 14th Annual Computer Security Applications Conference (ACSAC).
-
(1998)
14th Annual Computer Security Applications Conference (ACSAC)
-
-
Balasubramaniyan, J.S.1
Garcia-Fernandez, J.O.2
Isacoff, D.3
Spafford, E.4
Zamboni, D.5
-
8
-
-
84882646494
-
Using Specification-Based Intrusion Detection for Automated Response
-
Balepin, I., Maltsev, S., Rowe, J., and Levitt, K. (2004). Using Specification-Based Intrusion Detection for Automated Response. In Recent Advances in Intrusion Detection (RAID).
-
(2004)
Recent Advances in Intrusion Detection (RAID)
-
-
Balepin, I.1
Maltsev, S.2
Rowe, J.3
Levitt, K.4
-
10
-
-
33748605277
-
Computer Security-An End State?
-
Bellovin, S. M. (2001). Computer Security-An End State? Communications of the ACM, 44(3):131-132.
-
(2001)
Communications of the ACM
, vol.44
, Issue.3
, pp. 131-132
-
-
Bellovin, S.M.1
-
12
-
-
84882586503
-
-
Bugtraq
-
Bugtraq (2004). Security mailing list. http://www.securityfocus.com.
-
(2004)
Security mailing list
-
-
-
13
-
-
0034503965
-
Achieving scalability and expressiveness in an internet-scale event notification service
-
In, Portland OR, USA
-
Carzaniga, A., Rosenblum, D., and Wolf, A. (2000). Achieving scalability and expressiveness in an internet-scale event notification service. In ACM Symposium on Principles of Distributed Computing, pages 219-227, Portland OR, USA.
-
(2000)
ACM Symposium on Principles of Distributed Computing
, pp. 219-227
-
-
Carzaniga, A.1
Rosenblum, D.2
Wolf, A.3
-
14
-
-
84882676832
-
-
CERT
-
CERT (2003). CERT Statistics 2003. http://www.cert.org/stats/cert_stats.html.
-
(2003)
CERT Statistics 2003
-
-
-
15
-
-
0003437009
-
-
Addison-Wesley, Reading, Massachusetts, USA
-
Cheswick, W. and Bellovin, S. (1994). Firewalls and Internet Security. Addison-Wesley, Reading, Massachusetts, USA.
-
(1994)
Firewalls and Internet Security
-
-
Cheswick, W.1
Bellovin, S.2
-
17
-
-
0003676114
-
-
Addison-Wesley, Harlow, England, 2nd edition
-
Coulouris, G., Dollimore, J., and Kindberg, T. (1996). Distributed Systems-Concepts and Design. Addison-Wesley, Harlow, England, 2nd edition.
-
(1996)
Distributed Systems-Concepts and Design
-
-
Coulouris, G.1
Dollimore, J.2
Kindberg, T.3
-
19
-
-
84867339043
-
Alert Correlation in a Cooperative Intrusion Detection Framework
-
In, Oakland, CA
-
Cuppens, F. and Miege, A. (2002). Alert Correlation in a Cooperative Intrusion Detection Framework. In IEEE Symposium on Security and Privacy, Oakland, CA.
-
(2002)
IEEE Symposium on Security and Privacy
-
-
Cuppens, F.1
Miege, A.2
-
22
-
-
0033293396
-
Towards a taxonomy of intrusion-detection systems
-
Dacier, M., Debar, H., and Wespi, A. (1999). Towards a taxonomy of intrusion-detection systems. Computer Networks, 31 (8):805-822.
-
(1999)
Computer Networks
, vol.31
, Issue.8
, pp. 805-822
-
-
Dacier, M.1
Debar, H.2
Wespi, A.3
-
24
-
-
0003508568
-
-
DES, National Bureau of Standards, US Department of Commerce, FIPS 46-3
-
DES (1977). Data Encryption Standard. National Bureau of Standards, US Department of Commerce, FIPS 46-3.
-
(1977)
Data Encryption Standard
-
-
-
26
-
-
0036090387
-
STATL: An Attack Language for Statebased Intrusion Detection
-
Eckmann, ST., Vigna, G., and Kemmerer, R.A. (2002). STATL: An Attack Language for Statebased Intrusion Detection. Journal of Computer Security, 10(1/2):71-104.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.1-2
, pp. 71-104
-
-
Eckmann, S.T.1
Vigna, G.2
Kemmerer, R.A.3
-
29
-
-
85019678573
-
Detecting Anomalous and Unknown Intrusions Against Programs
-
In Akers, D., editors,. IEEE Computer Society
-
Ghosh, A. K., Wanken, J., and Charron, F. (1998). Detecting Anomalous and Unknown Intrusions Against Programs. In Akers, D., editor, Annual Computer Security Applications Conference (ACSAC), pages 259-267. IEEE Computer Society.
-
(1998)
Annual Computer Security Applications Conference (ACSAC)
, pp. 259-267
-
-
Ghosh, A.K.1
Wanken, J.2
Charron, F.3
-
30
-
-
3042821266
-
Validation of Sensor Alert Correlators
-
Haines, J., Ryder, D.K., Tinnel, L., and Taylor, S. (2003). Validation of Sensor Alert Correlators. IEEE Security & Privacy Magazine, 1(1):46-56.
-
(2003)
IEEE Security & Privacy Magazine
, vol.1
, Issue.1
, pp. 46-56
-
-
Haines, J.1
Ryder, D.K.2
Tinnel, L.3
Taylor, S.4
-
31
-
-
85084160972
-
Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics
-
Handley, M., Paxson, V., and Kreibich, C. (2001). Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics. In 10th USENIX Security Symposium.
-
(2001)
10th USENIX Security Symposium
-
-
Handley, M.1
Paxson, V.2
Kreibich, C.3
-
32
-
-
0027668428
-
Statistical Foundations of Audit Trail Analysis for the Detection of Computer Misuse
-
Helman, P. and Liepins, G. (1993). Statistical Foundations of Audit Trail Analysis for the Detection of Computer Misuse. IEEE Transactions on Software Engineering, 19(9):886-901.
-
(1993)
IEEE Transactions on Software Engineering
, vol.19
, Issue.9
, pp. 886-901
-
-
Helman, P.1
Liepins, G.2
-
33
-
-
0032313923
-
Intrusion Detection Using Sequences of System Calls
-
Hofmeyr, S. A., Forrest, S., and Somayaji, A. (1998). Intrusion Detection Using Sequences of System Calls. Journal of Computer Security, 6(3):151-180.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.3
, pp. 151-180
-
-
Hofmeyr, S.A.1
Forrest, S.2
Somayaji, A.3
-
34
-
-
0029267472
-
State Transition Analysis: A Rule-Based Intrusion Detection System
-
Ilgun, K., Kemmerer, R. A., and Porras, P. A. (1995). State Transition Analysis: A Rule-Based Intrusion Detection System. IEEE Transactions on Software Engineering, 21(3).
-
(1995)
IEEE Transactions on Software Engineering
, vol.21
, Issue.3
-
-
Ilgun, K.1
Kemmerer, R.A.2
Porras, P.A.3
-
35
-
-
84882714215
-
-
IPSec, Protocol
-
IPSec (2004). IP Sec. Protocol, http://www.ietf.org/html.charters/ipsec-charter. html.
-
(2004)
IP Sec
-
-
-
36
-
-
0003648294
-
-
Kahn, C., Porras, P. A., Staniford-Chen, S., and Tung, B. (1998). A Common Intrusion Detection Framework. http://gost.isi.edu/cidf/papers/cidf-jcs.ps.
-
(1998)
A Common Intrusion Detection Framework
-
-
Kahn, C.1
Porras, P.A.2
Staniford-Chen, S.3
Tung, B.4
-
38
-
-
0037002475
-
Intrusion Detection: A Brief History and Overview
-
Kemmerer, R. A. and Vigna, G. (2002). Intrusion Detection: A Brief History and Overview. IEEE Computer, 35(4):27-30.
-
(2002)
IEEE Computer
, vol.35
, Issue.4
, pp. 27-30
-
-
Kemmerer, R.A.1
Vigna, G.2
-
39
-
-
0030677523
-
Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-based Approach
-
Ko, C., Ruschitzka, M., and Levitt, K. (1997). Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-based Approach. In IEEE Symposium on Security and Privacy, pages 175-187.
-
(1997)
IEEE Symposium on Security and Privacy
, pp. 175-187
-
-
Ko, C.1
Ruschitzka, M.2
Levitt, K.3
-
42
-
-
0036088115
-
Stateful Intrusion Detection for High-Speed Networks
-
Kruegel, C., Valeur, F., Vigna, G., and Kemmerer, R. A. (2002). Stateful Intrusion Detection for High-Speed Networks. In IEEE Symposium on Security and Privacy, pages 285-294.
-
(2002)
IEEE Symposium on Security and Privacy
, pp. 285-294
-
-
Kruegel, C.1
Valeur, F.2
Vigna, G.3
Kemmerer, R.A.4
-
44
-
-
0017996760
-
Time, Clocks and the Ordering of Events in a Distributed System
-
Lamport, L. (1978). Time, Clocks and the Ordering of Events in a Distributed System. Communications of the ACM, 21(7):558-65.
-
(1978)
Communications of the ACM
, vol.21
, Issue.7
, pp. 558-565
-
-
Lamport, L.1
-
45
-
-
0028514027
-
A Taxonomy of Computer Program Security Flaws
-
Landwehr, C. E., Bull, A. R., McDermott, J. P., and Choi, W. S. (1994). A Taxonomy of Computer Program Security Flaws. ACM Computing Surveys (CSUR), 26(3):211-254.
-
(1994)
ACM Computing Surveys (CSUR)
, vol.26
, Issue.3
, pp. 211-254
-
-
Landwehr, C.E.1
Bull, A.R.2
McDermott, J.P.3
Choi, W.S.4
-
47
-
-
0032630098
-
Detecting Computer and Network Misuse Through the Production-Based Expert System Toolset (P-BEST)
-
In, Oakland, California. IEEE Computer Society Press, Los Alamitos, California
-
Lindqvist, U. and Porras, P. A. (1999). Detecting Computer and Network Misuse Through the Production-Based Expert System Toolset (P-BEST). In IEEE Symposium on Security and Privacy, pages 146-161, Oakland, California. IEEE Computer Society Press, Los Alamitos, California.
-
(1999)
IEEE Symposium on Security and Privacy
, pp. 146-161
-
-
Lindqvist, U.1
Porras, P.A.2
-
51
-
-
0033890508
-
Transport and Application Protocol Scrubbing
-
Malan, G. R., Watson, D., Jahanian, F., and Howell, P. (2000). Transport and Application Protocol Scrubbing. In INFOCOM(3), pages 1381-1390.
-
(2000)
INFOCOM(3)
, pp. 1381-1390
-
-
Malan, G.R.1
Watson, D.2
Jahanian, F.3
Howell, P.4
-
52
-
-
85019691440
-
Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory
-
McHugh, J. (2000). Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory. ACM Transactions on Information and System Security (TISSEC), 3(4):262-294.
-
(2000)
ACM Transactions on Information and System Security (TISSEC)
, vol.3
, Issue.4
, pp. 262-294
-
-
McHugh, J.1
-
53
-
-
0003993827
-
-
MIT Lincoln Laboratory
-
MIT Lincoln Laboratory (2000). DARPA Intrusion Detection Evaluation. http://www.ll. mit.edu/IST/ideval/.
-
(2000)
DARPA Intrusion Detection Evaluation
-
-
-
54
-
-
0242314805
-
-
Moore, D., Paxson, V., Savage, S., Shannon, C., Staniford, S., and Weaver, N. (2003). The Spread of the Sapphire/Slammmer Worm. http://www.cs.berkeley.edu/-nweaver/sapphire/.
-
(2003)
The Spread of the Sapphire/Slammmer Worm
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
55
-
-
77956988169
-
M2D2: A Formal Data Model for IDS Alert Correlation
-
In, Zurich, Switzerland
-
Morin, B., Me, L., Debar, H., and Ducasse, M. (2002). M2D2: A Formal Data Model for IDS Alert Correlation. In Recent Advances in Intrusion Detection (RAID), pages 115-137, Zurich, Switzerland.
-
(2002)
Recent Advances in Intrusion Detection (RAID)
, pp. 115-137
-
-
Morin, B.1
Me, L.2
Debar, H.3
Ducasse, M.4
-
56
-
-
84903593793
-
An Experience Developing an IDS Stimulator for the Black-Box Testing of Network Intrusion Detection Systems
-
In, Las Vegas, Nevada
-
Mutz, D., Vigna, G., and Kemmerer, R. A. (2003). An Experience Developing an IDS Stimulator for the Black-Box Testing of Network Intrusion Detection Systems. In Annual Computer Security Applications Conference (ACSAC), Las Vegas, Nevada.
-
(2003)
Annual Computer Security Applications Conference (ACSAC)
-
-
Mutz, D.1
Vigna, G.2
Kemmerer, R.A.3
-
57
-
-
85095970245
-
Experience with EMERALD to Date
-
In, Santa Clara, California
-
Neumann, P. G. and Porras, P. A. (1999). Experience with EMERALD to Date. In First USENIX Workshop on Intrusion Detection and Network Monitoring, pages 73-80, Santa Clara, California.
-
(1999)
First USENIX Workshop on Intrusion Detection and Network Monitoring
, pp. 73-80
-
-
Neumann, P.G.1
Porras, P.A.2
-
58
-
-
0038011185
-
Constructing Attack Scenarios through Correlation of Intrusion Alerts
-
In, Washington, D. C
-
Ning, P., Cui, Y., and Reeves, D.S. (2002). Constructing Attack Scenarios through Correlation of Intrusion Alerts. In ACM Conference on Computer and Communications Security (CCS), pages 245-254, Washington, D.C.
-
(2002)
ACM Conference on Computer and Communications Security (CCS)
, pp. 245-254
-
-
Ning, P.1
Cui, Y.2
Reeves, D.S.3
-
61
-
-
14844302515
-
A High-level Programming Environment for Packet Trace Anonymization and Transformation
-
Pang, R. and Paxson, V. (2003). A High-level Programming Environment for Packet Trace Anonymization and Transformation. In ACM SIGCOMM.
-
(2003)
ACM SIGCOMM
-
-
Pang, R.1
Paxson, V.2
-
63
-
-
0343592105
-
-
Porras, P., Schnackenberg, D., Staniford-Chen, S., Stillman, M., and Wu, F. (1998). The Common Intrusion Detection Framework Architecture. http://www.isi.edu/gost/cidf/drafts/architecture.txt.
-
(1998)
The Common Intrusion Detection Framework Architecture
-
-
Porras, P.1
Schnackenberg, D.2
Staniford-Chen, S.3
Stillman, M.4
Wu, F.5
-
66
-
-
0004145058
-
-
Technical report, Secure Networks, Inc
-
Ptacek, T. H. and Newsham, T. N. (1998). Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection. Technical report, Secure Networks, Inc.
-
(1998)
Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection
-
-
Ptacek, T.H.1
Newsham, T.N.2
-
67
-
-
84882674219
-
Intrusion Detection and Network Forensics
-
In, Denver, Colorado, USA
-
Ranum, M. (2000). Intrusion Detection and Network Forensics. In M1 Tutorial-USENIX Security 2000, Denver, Colorado, USA.
-
(2000)
M1 Tutorial-USENIX Security 2000
-
-
Ranum, M.1
-
68
-
-
84962435308
-
Security holes. Who cares?
-
In Paxson, V., editors, USENIX
-
Rescorla, E. (2003). Security holes. Who cares? In Paxson, V., editor, USENIX Security Symposium, pages 75-90. USENIX.
-
(2003)
USENIX Security Symposium
, pp. 75-90
-
-
Rescorla, E.1
-
69
-
-
0017930809
-
A Method for obtaining Digital Signatures and Public-Key Cryptosystems
-
Rivest, R. L., Shamir, A., and Adleman, L. A. (1978). A Method for obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 21(2): 120-126.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.A.3
-
70
-
-
85090433665
-
Snort-Lightweight Intrusion Detection for Networks
-
In Parter, D., editors,. USENIX
-
Roesch, M. (1999). Snort-Lightweight Intrusion Detection for Networks. In Parter, D., editor, Large Installation System Administraton (LISA), pages 229-238. USENIX.
-
(1999)
Large Installation System Administraton (LISA)
, pp. 229-238
-
-
Roesch, M.1
-
71
-
-
0003855464
-
-
John Wiley & Sons, Inc., New York, USA, 2nd edition
-
Schneier, Bruce (1996). Applied Cryptography. John Wiley & Sons, Inc., New York, USA, 2nd edition.
-
(1996)
Applied Cryptography
-
-
Schneier, B.1
-
73
-
-
0002473030
-
DIDS (Distributed Intrusion Detection System)-Motivation, Architecture and an early Prototype
-
Snapp, S., Brentano, J., Dias, G. V., Goan, T. L., Heberlein, L. T., Ho, C., Levitt, K. N., Mukherjee, B., Smaha, S. E., Grance, T., Teal, D. M., and Mansur, D. (1991). DIDS (Distributed Intrusion Detection System)-Motivation, Architecture and an early Prototype. In 14th National Security Conference, pages 167-176.
-
(1991)
14th National Security Conference
, pp. 167-176
-
-
Snapp, S.1
Brentano, J.2
Dias, G.V.3
Goan, T.L.4
Heberlein, L.T.5
Ho, C.6
Levitt, K.N.7
Mukherjee, B.8
Smaha, S.E.9
Grance, T.10
Teal, D.M.11
Mansur, D.12
-
74
-
-
84882596505
-
-
Snot
-
Snot (2004). A packet generator. http://www.stolenshoes.net/sniph/.
-
(2004)
A packet generator
-
-
-
76
-
-
0000949239
-
GrIDS-A Graph Based Intrusion Detection System For Large Networks
-
Staniford, S., Cheung, S., Crawford, R., Dilger, M., Frank, J., Hoagland, J., Levitt, K., Wee, C., Yip, R., and Zerkle, D. (1996). GrIDS-A Graph Based Intrusion Detection System For Large Networks. In 20th National Information Systems Security Conference, volume 1, pages 361-370.
-
(1996)
20th National Information Systems Security Conference
, vol.1
, pp. 361-370
-
-
Staniford, S.1
Cheung, S.2
Crawford, R.3
Dilger, M.4
Frank, J.5
Hoagland, J.6
Levitt, K.7
Wee, C.8
Yip, R.9
Zerkle, D.10
-
78
-
-
84882638196
-
-
Stick
-
Stick (2004). IDS stress tool, http://www.eurocompton.net/stick/projects8.html.
-
(2004)
IDS stress tool
-
-
-
79
-
-
0006062055
-
-
Sun Microsystems, Inc., 2550 Garcia Ave., Mountain View, CA 94043
-
Sun Microsystems, Inc. (1991). Installing, Administering, and Using the Basic Security Module. 2550 Garcia Ave., Mountain View, CA 94043.
-
(1991)
Installing, Administering, and Using the Basic Security Module
-
-
-
80
-
-
84958984156
-
Undermining an Anomaly-Based Intrusion Detection System Using Common Exploits
-
In Wespi, A., Vigna, G., and Deri, L., editors, Lecture Notes in Computer Science,. Springer
-
Tan, K. M. C., Killourhy, K. S., and Maxion, R. A. (2002). Undermining an Anomaly-Based Intrusion Detection System Using Common Exploits. In Wespi, A., Vigna, G., and Deri, L., editors, Recent Advances in Intrusion Detection (RAID), Lecture Notes in Computer Science, pages 54-73. Springer.
-
(2002)
Recent Advances in Intrusion Detection (RAID)
, pp. 54-73
-
-
Tan, K.M.C.1
Killourhy, K.S.2
Maxion, R.A.3
-
81
-
-
0036085540
-
Why 6? Defining the Operational Limits of Slide, an Anomaly-Based Intrusion Detector
-
Tan, K. M. C. and Maxion, R. A. (2002). Why 6? Defining the Operational Limits of Slide, an Anomaly-Based Intrusion Detector. In IEEE Symposium on Security and Privacy, pages 188-201.
-
(2002)
IEEE Symposium on Security and Privacy
, pp. 188-201
-
-
Tan, K.M.C.1
Maxion, R.A.2
-
82
-
-
0003520264
-
-
Prentice Hall, Englewood Cliffs, New Jersey, USA
-
Tanenbaum, Andrew S. and van Steen, Maarten (2002). Distributed Systems-Principles and Paradigms. Prentice Hall, Englewood Cliffs, New Jersey, USA.
-
(2002)
Distributed Systems-Principles and Paradigms
-
-
Tanenbaum, A.S.1
van Steen, M.2
-
88
-
-
0029756282
-
Cooperating Security Managers: A peer-based intrusion detection system
-
White, Gregory B., Fisch, Eric A., and Pooch, Udo W. (1996). Cooperating Security Managers: A peer-based intrusion detection system. IEEE Network, pages 20-23.
-
(1996)
IEEE Network
, pp. 20-23
-
-
White, G.B.1
Fisch, E.A.2
Pooch, U.W.3
-
89
-
-
0007919024
-
-
x509, The Internet Engineering Task Force
-
x509 (2002). Public-Key Infrastructure X.509. The Internet Engineering Task Force.
-
(2002)
Public-Key Infrastructure X.509
-
-
-
90
-
-
85088760404
-
On the design and performance of prefix preserving IP trace traffic anonymization
-
Xu, J., Fan, J., Ammar, M., and Moon, S. (2002). On the design and performance of prefix preserving IP trace traffic anonymization. In ACM SIGCOMM Internet Measurement Workshop.
-
(2002)
ACM SIGCOMM Internet Measurement Workshop
-
-
Xu, J.1
Fan, J.2
Ammar, M.3
Moon, S.4
|