-
2
-
-
35148813319
-
-
Ann Harrison. Cyberassaults hit Buy.com, eBay, CNN, and Amazon.com. Computerworld, February 9, 2000 http://www.computerworld.com/news/2000/story/0, 11280,43010,00.html.
-
Ann Harrison. Cyberassaults hit Buy.com, eBay, CNN, and Amazon.com. Computerworld, February 9, 2000 http://www.computerworld.com/news/2000/story/0, 11280,43010,00.html.
-
-
-
-
3
-
-
33847123551
-
Experiences With DETER: A Testbed for Security Research
-
March
-
T. Benzel, R. Braden, D. Kim, C. Neuman, A. Joseph, K. Sklower, R. Ostrenga, and S. Schwab. Experiences With DETER: A Testbed for Security Research. In 2nd IEEE Conference on Testbeds and Research Infrastructure for the Development of Networks and Communities (TridentCom 2006), March 2006.
-
(2006)
2nd IEEE Conference on Testbeds and Research Infrastructure for the Development of Networks and Communities (TridentCom 2006)
-
-
Benzel, T.1
Braden, R.2
Kim, D.3
Neuman, C.4
Joseph, A.5
Sklower, K.6
Ostrenga, R.7
Schwab, S.8
-
4
-
-
35148826273
-
-
BindView Corporation, November, Available at
-
BindView Corporation. The Naptha Dos Vulnerabilty, November 2000. Available at http://www.bindview.com/Support/RAZOR/Advisories/2000/adv_NAPTHA. cfm.
-
(2000)
The Naptha Dos Vulnerabilty
-
-
-
8
-
-
0034478521
-
On inferring autonomous system relationships in the Internet
-
November
-
L. Gao. On inferring autonomous system relationships in the Internet. In Proc. IEEE Global Internet Symposium, November 2000.
-
(2000)
Proc. IEEE Global Internet Symposium
-
-
Gao, L.1
-
10
-
-
0029780013
-
How to Model an Internetwork
-
March
-
E. Zegura, K. Calvert, and S. Bhattacharjee. How to Model an Internetwork. In Proc. of IEEE INFOCOM, volume 2, pages 594-602, March 1996.
-
(1996)
Proc. of IEEE INFOCOM
, vol.2
, pp. 594-602
-
-
Zegura, E.1
Calvert, K.2
Bhattacharjee, S.3
-
11
-
-
0037840705
-
Network topology generators: Degree-based vs. structural
-
H. Tangmunarunkit, R. Govindan, S. Jamin, S. Shenker, and W. Willinger. Network topology generators: Degree-based vs. structural. In Proceedings of ACM SIGCOMM, 2002.
-
(2002)
Proceedings of ACM SIGCOMM
-
-
Tangmunarunkit, H.1
Govindan, R.2
Jamin, S.3
Shenker, S.4
Willinger, W.5
-
14
-
-
19544387793
-
A measurement study of available bandwidth estimation tools
-
October
-
J. Strauss, D. Katabi, and F. Kaashoek. A measurement study of available bandwidth estimation tools. In Proceedings of ACMIMC, October 2003.
-
(2003)
Proceedings of ACMIMC
-
-
Strauss, J.1
Katabi, D.2
Kaashoek, F.3
-
16
-
-
35148888435
-
-
Websiteoptimization.com. The Bandwidth Report. http://www.websiteoptimization.com/bw/.
-
Websiteoptimization.com. The Bandwidth Report. http://www.websiteoptimization.com/bw/.
-
-
-
-
19
-
-
35148889609
-
-
Nortel Networks. QoS Performance requirements for UMTS. The 3rd Generation Partnership Project (3GPP). http://www.3gpp.org/ftp/tsg_sa/WG1_Serv/ TSGS1_03-HCourt/Docs/Docs/s1-99362.pdf.
-
Nortel Networks. QoS Performance requirements for UMTS. The 3rd Generation Partnership Project (3GPP). http://www.3gpp.org/ftp/tsg_sa/WG1_Serv/ TSGS1_03-HCourt/Docs/Docs/s1-99362.pdf.
-
-
-
-
20
-
-
35148817690
-
-
Project 2061, On-Line
-
Project 2061. Benchmarks On-Line. http://www.project2061.org/ publications/bsl/online/bolintro.htm.
-
Benchmarks
-
-
-
21
-
-
0011133379
-
-
Standard Performance Evaluation Corporation
-
Standard Performance Evaluation Corporation. SPEC Web Page. http://www.spec.org.
-
SPEC Web Page
-
-
-
22
-
-
35148817259
-
-
Transaction Processing Performance Council
-
Transaction Processing Performance Council. TPC Web Page. http://www.tpc.org/.
-
TPC Web Page
-
-
-
24
-
-
35148887437
-
-
The Center for Internet Security
-
The Center for Internet Security. CIS Standards Web Page, http://www.cisecurity.org/.
-
CIS Standards Web Page
-
-
-
25
-
-
35148863801
-
-
CERT. CERT UNIX Security Checklist v2.0. http://www.cert.org/tech-tips/ usc20.full.html.
-
CERT. CERT UNIX Security Checklist v2.0. http://www.cert.org/tech-tips/ usc20.full.html.
-
-
-
-
26
-
-
70349284946
-
-
Microsoft Corporation
-
Microsoft Corporation. Security Tools. http://www.microsoft.com/technet/ security/tools/default.mspx.
-
Security Tools
-
-
-
27
-
-
35148877021
-
-
SANS, Internet Security Vulnerabilities
-
SANS. The SANS Top 20 Internet Security Vulnerabilities, http://www.sans.org/top20/.
-
The SANS Top
, vol.20
-
-
-
28
-
-
0030146698
-
Service architecture for ATM: From applications to scheduling
-
May/June
-
M. W. Garrett. Service architecture for ATM: from applications to scheduling. IEEE Network, 10(3):6-14, May/June 1996.
-
(1996)
IEEE Network
, vol.10
, Issue.3
, pp. 6-14
-
-
Garrett, M.W.1
-
32
-
-
35148899100
-
-
The ATM Forum. The ATM Forum Traffic Management Specification Version 4.0. ftp://ftp.atmforum.com/pub/approved-specs/aftm-0056.000.ps, April 1996.
-
The ATM Forum. The ATM Forum Traffic Management Specification Version 4.0. ftp://ftp.atmforum.com/pub/approved-specs/aftm-0056.000.ps, April 1996.
-
-
-
-
35
-
-
0036349136
-
On distinguishing between Internet power law topology generators
-
June
-
T. Bu and D. Towsley. On distinguishing between Internet power law topology generators. In Proc. of IEEE INFOCOM, June 2002.
-
(2002)
Proc. of IEEE INFOCOM
-
-
Bu, T.1
Towsley, D.2
-
36
-
-
0036346132
-
The Origin of Power Laws in Internet Topologies Revisited
-
June
-
Q. Chen, H. Chang, R. Govindan, S. Jamin, S. Shenker, and W. Willinger. The Origin of Power Laws in Internet Topologies Revisited. In Proc. of IEEE INFOCOM, June 2002.
-
(2002)
Proc. of IEEE INFOCOM
-
-
Chen, Q.1
Chang, H.2
Govindan, R.3
Jamin, S.4
Shenker, S.5
Willinger, W.6
-
37
-
-
84947912246
-
Small-world Characteristics of Internet Topologies and Multicast Scaling
-
S. Jin and A. Bestavros. Small-world Characteristics of Internet Topologies and Multicast Scaling. In Proc. of IEEE/ACM MASCOTS, 2003.
-
(2003)
Proc. of IEEE/ACM MASCOTS
-
-
Jin, S.1
Bestavros, A.2
-
38
-
-
0038562798
-
Inet-3.0: Internet Topology Generator
-
Technical Report UM-CSE-TR-456-02, Univ. of Michigan
-
J. Winick and S. Jamin. Inet-3.0: Internet Topology Generator. Technical Report UM-CSE-TR-456-02, Univ. of Michigan, 2002.
-
(2002)
-
-
Winick, J.1
Jamin, S.2
-
39
-
-
11244340239
-
Collective Dynamics of Small-world Networks
-
D. Watts and S. Strogatz. Collective Dynamics of Small-world Networks. Nature, 363:202-204, 1998.
-
(1998)
Nature
, vol.363
, pp. 202-204
-
-
Watts, D.1
Strogatz, S.2
-
40
-
-
0038483826
-
Emergence of Scaling in Random Networks
-
A. Barabasi and R. Albert. Emergence of Scaling in Random Networks. Science, 286:509-512, 1999.
-
(1999)
Science
, vol.286
, pp. 509-512
-
-
Barabasi, A.1
Albert, R.2
-
41
-
-
35148884536
-
The internet AS-level topology: Three data sources and one definitive metric
-
Technical report, University of California, San Deigo, 2005. Short version appears in ACM CCR, January 2006
-
P. Mahadevan, D. Krioukov, M. Fomenkov, B. Huffaker, X. Dimitropoulos, K. Claffy, and A. Vahdat. The internet AS-level topology: Three data sources and one definitive metric. Technical report, University of California, San Deigo, 2005. Short version appears in ACM CCR, January 2006.
-
-
-
Mahadevan, P.1
Krioukov, D.2
Fomenkov, M.3
Huffaker, B.4
Dimitropoulos, X.5
Claffy, K.6
Vahdat, A.7
-
45
-
-
70449495604
-
-
ICSI Center for Internet Research
-
ICSI Center for Internet Research. Traffic Generators for Internet Traffic. http://www.icir.org/models/trafficgenerators.html.
-
Traffic Generators for Internet Traffic
-
-
|