-
1
-
-
33745293149
-
The Use of Information Retrieval Techniques for Intrusion Detection
-
R. Anderson and A. Khattak. The Use of Information Retrieval Techniques for Intrusion Detection. In Proceedings of RAID, September 1998.
-
(1998)
Proceedings of RAID, September
-
-
Anderson, R.1
Khattak, A.2
-
2
-
-
84862470783
-
-
Network Associates. LovGate Virus Summary. http://vil.nai.com/vil/ content/Print100183.htm, 2002.
-
(2002)
LovGate Virus Summary
-
-
-
3
-
-
84862474039
-
-
C. Bullard. Argus Open Project.
-
C. Bullard. Argus Open Project. http://www.qosient.com/argus/.
-
-
-
-
5
-
-
84862474150
-
-
E-eye. Analysis: Sasser Worm. http://www.eeye.com/html/Research/ Advisories/AD20040501.html.
-
Analysis: Sasser Worm.
-
-
-
6
-
-
0141440878
-
New Directions in Traffic Measurement and Accounting
-
Pittsburgh, PA, August
-
C. Estan and G. Varghese. New Directions in Traffic Measurement and Accounting. In Proceedings of ACM SIGCOMM '02, Pittsburgh, PA, August 2002.
-
(2002)
Proceedings of ACM SIGCOMM '02
-
-
Estan, C.1
Varghese, G.2
-
7
-
-
0033901740
-
-
IEEE Network Magazine, Special Issue on Internet Traffic Engineering
-
A. Feldmann, A. Greenberg, C. Lund, N. Reingold, and J. Rexford. NetScope: Traffic Engineering for IP Networks. IEEE Network Magazine, Special Issue on Internet Traffic Engineering, 2000.
-
(2000)
NetScope: Traffic Engineering for IP Networks
-
-
Feldmann, A.1
Greenberg, A.2
Lund, C.3
Reingold, N.4
Rexford, J.5
-
12
-
-
0040291388
-
The click modular router
-
August
-
E. Kohler, R. Morris, B. Chen, J. Jannotti, and F. Kaashoek. The click modular router. ACM Transactions on Computer Systems, August 2000.
-
(2000)
ACM Transactions on Computer Systems
-
-
Kohler, E.1
Morris, R.2
Chen, B.3
Jannotti, J.4
Kaashoek, F.5
-
16
-
-
0242314805
-
The Spread of the Sapphire/Slammer Worm
-
CAIDA
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver. The Spread of the Sapphire/Slammer Worm. Technical report, CAIDA, 2003.
-
(2003)
Technical Report
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
17
-
-
0141762461
-
Code Red A Case Study on the Spread and Victims of an Internet Worm
-
Marseilles, France, November
-
D. Moore, C. Shannon, and K. Claffy. Code Red: A Case Study on the Spread and Victims of an Internet Worm. In Proceedings of ACM SIGCOMM Internet Measurement Workshop, Marseilles, France, November 2002.
-
(2002)
Proceedings of ACM SIGCOMM Internet Measurement Workshop
-
-
Moore, D.1
Shannon, C.2
Claffy, K.3
-
22
-
-
84862475026
-
-
D. Plonka. Flawed Routers Flood University of Wisconsin Internet Time Server
-
D. Plonka. Flawed Routers Flood University of Wisconsin Internet Time Server. http://www.cs.wisc.edu/plonka/netgear-sntp.
-
-
-
-
27
-
-
85084162258
-
How to Own the Internet in Your Spare Time
-
San Francisco, CA, August
-
S. Staniford, V. Paxson, and N. Weaver. How to Own the Internet in Your Spare Time. In Proceedings of the 11th USENIX Security Symposium, San Francisco, CA, August 2002.
-
(2002)
Proceedings of the 11th USENIX Security Symposium
-
-
Staniford, S.1
Paxson, V.2
Weaver, N.3
-
29
-
-
84862475027
-
-
The Honeynet Project
-
The Honeynet Project, http://project.honeynet.org.
-
-
-
-
30
-
-
84862481359
-
-
Trend Micro. WORM_RBOT.CC. http://uk.trendmicro-europe.com/enterprise/ security-info/ve.detail.php?Vname=WORM.RBOT.CC.
-
WORM_RBOT.CC.
-
-
Micro, T.1
-
31
-
-
85137546697
-
Global Intrusion Detection in the DOMINO Overlay System
-
San Diego, CA
-
V. Yegneswaran, P. Barford, and S. Jha. Global Intrusion Detection in the DOMINO Overlay System. In Proceedings of NDSS, San Diego, CA, 2004.
-
(2004)
Proceedings of NDSS
-
-
Yegneswaran, V.1
Barford, P.2
Jha, S.3
-
33
-
-
3543060790
-
Internet Intrusions: Global Characteristics and Prevalence
-
San Diego, CA, June
-
V. Yegneswaran, P. Barford, and J. Ullrich. Internet Intrusions: Global Characteristics and Prevalence. In Proceedings of ACM SIGMETRICS, San Diego, CA, June 2003.
-
(2003)
Proceedings of ACM SIGMETRICS
-
-
Yegneswaran, V.1
Barford, P.2
Ullrich, J.3
|