-
3
-
-
0036042175
-
Models and issues in data stream systems
-
Madison, Wisconsin, USA, ACM SIGMOD June
-
Babcock, B., Babu, S., Datar, M., Motwani, R., and Widom, J.: Models and issues in data stream systems. In Symposium on Principles of Database Systems, Madison, Wisconsin, USA, ACM SIGMOD (June 2002)
-
(2002)
Symposium on Principles of Database Systems
-
-
Babcock, B.1
Babu, S.2
Datar, M.3
Motwani, R.4
Widom, J.5
-
7
-
-
0242624600
-
Met: An experimental system for malicious email tracking
-
Virginia Beach, VA Sep
-
Bhattacharyya, M., Hershkop, S., Eskin, E., and Stolfo, S.J.: Met: An experimental system for malicious email tracking. In Proceedings of the 2002 New Security Paradigms Workshop (NSPW-2002), Virginia Beach, VA (Sep 2002)
-
(2002)
Proceedings of the 2002 New Security Paradigms Workshop (NSPW-2002)
-
-
Bhattacharyya, M.1
Hershkop, S.2
Eskin, E.3
Stolfo, S.J.4
-
8
-
-
0014814325
-
Space/time tradeoffs in in hash coding with allowable errors
-
Bloom, B.: Space/time tradeoffs in in hash coding with allowable errors. In CACM (1970) 422-426
-
(1970)
CACM
, pp. 422-426
-
-
Bloom, B.1
-
9
-
-
8344278926
-
Network applications of bloom filters: A survey
-
Urbana-Champaign, Illinois, USA October
-
Broder, A. and Mitzenmatcher, M.: Network applications of bloom filters: A survey. In Annual Allerton Conference on Communication, Control, and Computing, Urbana-Champaign, Illinois, USA (October 2002)
-
(2002)
Annual Allerton Conference on Communication, Control, and Computing
-
-
Broder, A.1
Mitzenmatcher, M.2
-
10
-
-
0002624024
-
Tracing anonymous packets to their approximate source
-
Dec
-
Burch, H. and Cheswick, B.: Tracing anonymous packets to their approximate source. In Proc. USENIX LISA (Dec 2000)
-
(2000)
Proc. USENIX LISA
-
-
Burch, H.1
Cheswick, B.2
-
11
-
-
84968735289
-
Maintaining stream statistics over sliding windows
-
Datar, M., Gionis, A., Indyk, P., and Motwani, R.: Maintaining stream statistics over sliding windows. In ACM Symposium on Discrete Algorithms (2001) 635-644
-
(2001)
ACM Symposium on Discrete Algorithms
, pp. 635-644
-
-
Datar, M.1
Gionis, A.2
Indyk, P.3
Motwani, R.4
-
15
-
-
35248839062
-
-
Netintercept. Feb
-
Sanstorm Enterprises. Netintercept. http://www.sandstorm.com/products/netintercept/ (Feb 2003)
-
(2003)
-
-
-
18
-
-
0005308437
-
Surfing wavelets on streams: One pass summaries for approximate aggregate queries
-
VLDB
-
Gilbert, K., Kotidis, Y., Muthukrishnan, S., and Strauss, M.: Surfing wavelets on streams: one pass summaries for approximate aggregate queries. In Proc. ACM Conf. Very Large Databases. VLDB (2001)
-
(2001)
Proc. ACM Conf. Very Large Databases
-
-
Gilbert, K.1
Kotidis, Y.2
Muthukrishnan, S.3
Strauss, M.4
-
24
-
-
84950242640
-
On design and evaluation of "intention-driven" ICMP traceback
-
Oct
-
Mankin, A., Massey, D., Wu, C.L., Wu, S.F., and Zhang, L.: On design and evaluation of "intention-driven" ICMP traceback. In Proc. IEEE International Conference on Computer Communications and Networks (Oct 2001)
-
(2001)
Proc. IEEE International Conference on Computer Communications and Networks
-
-
Mankin, A.1
Massey, D.2
Wu, C.L.3
Wu, S.F.4
Zhang, L.5
-
28
-
-
1842445579
-
Query processing, resource management, and approximation in a data stream management system
-
Jan
-
Motwani, R., Widom, J., Arasu, A., Babcock, B., Babu, S., Datar, M., Manku, G., Olston, C., Rosenstein, J., and Varma, R.: Query processing, resource management, and approximation in a data stream management system. In Proc. of the 2003 Conference on Innovative Data Systems Research (CIDR) (Jan 2003)
-
(2003)
Proc. of the 2003 Conference on Innovative Data Systems Research (CIDR)
-
-
Motwani, R.1
Widom, J.2
Arasu, A.3
Babcock, B.4
Babu, S.5
Datar, M.6
Manku, G.7
Olston, C.8
Rosenstein, J.9
Varma, R.10
-
29
-
-
85084164413
-
Bro: A system for detecting network intruders in real-time
-
January
-
Paxson, V.: Bro: A system for detecting network intruders in real-time. 7th Annual USENIX Security Symposium (January 1998)
-
(1998)
7th Annual USENIX Security Symposium
-
-
Paxson, V.1
-
31
-
-
0004145058
-
-
Secure Networks, Inc. January
-
Ptacek, T.H. and Newsham, T.N.: Insertion, evasion, and denial of service: Eluding network intrusion detection. Secure Networks, Inc. (January 1998)
-
(1998)
Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection
-
-
Ptacek, T.H.1
Newsham, T.N.2
-
32
-
-
35248836270
-
Nai goes forensic with infinistream
-
Feb
-
Roberts, P.: Nai goes forensic with infinistream. In InfoWorld, http://www.infoworld.com/article/03/02/10/HNnai_1.html (Feb 2003)
-
(2003)
InfoWorld
-
-
Roberts, P.1
-
33
-
-
0033650584
-
Practical network support for IP traceback
-
Stockholm, Sweden Aug
-
Savage, S., Wetherall, D., Karlin, A., and Anderson, T.: Practical network support for IP traceback. In Proceedings of the 2000 ACM SIGCOMM Conference, Stockholm, Sweden (Aug 2000) 295-306
-
(2000)
Proceedings of the 2000 ACM SIGCOMM Conference
, pp. 295-306
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
34
-
-
35248862288
-
-
Unpublished Manuscript May
-
Shanmugasundaram, K., Memon, N., Savant, A., and Bronnimann, H.: Efficient monitoring and storage of payloads for network forensics. In Unpublished Manuscript (May 2003)
-
(2003)
Efficient Monitoring and Storage of Payloads for Network Forensics
-
-
Shanmugasundaram, K.1
Memon, N.2
Savant, A.3
Bronnimann, H.4
-
35
-
-
24344492645
-
-
Unpublished Manuscript May
-
Shanmugasundaram, K., Memon, N., Savant, A., and Bronnimann, H.: Fornet: A distributed forensics system. In Unpublished Manuscript (May 2003)
-
(2003)
Fornet: A Distributed Forensics System
-
-
Shanmugasundaram, K.1
Memon, N.2
Savant, A.3
Bronnimann, H.4
-
36
-
-
0001887844
-
Hash-based IP traceback
-
San Diego, California, USA August
-
Snoeren, A.C., Partridge, C., Sanchez, L.A., Jones, C.E., Tchakountio, F., Kent, S.T., and Strayer, W.T.: Hash-based IP traceback. In ACM SIGCOMM, San Diego, California, USA (August 2001)
-
(2001)
ACM SIGCOMM
-
-
Snoeren, A.C.1
Partridge, C.2
Sanchez, L.A.3
Jones, C.E.4
Tchakountio, F.5
Kent, S.T.6
Strayer, W.T.7
-
37
-
-
0034997397
-
Advanced and authenticated marking schemes for IP traceback
-
Song, D. and Perrig, A.: Advanced and authenticated marking schemes for IP traceback. In IEEE Infocomm (2001)
-
(2001)
IEEE Infocomm
-
-
Song, D.1
Perrig, A.2
-
38
-
-
0036367386
-
Dynamic multidimensional histograms
-
SIGMOD
-
Thaper, U., Guha, S., Indyk, P., and Koudas, N.: Dynamic multidimensional histograms. In Proc. ACM Int. Symp. on Management of Data. SIGMOD (2002)
-
(2002)
Proc. ACM Int. Symp. on Management of Data
-
-
Thaper, U.1
Guha, S.2
Indyk, P.3
Koudas, N.4
-
40
-
-
33845978973
-
Policies to enhance computer and network forensics
-
United States Military Academy, West Point, NY, IEEE Jun
-
Yasinsac, A. and Manzano, Y.: Policies to enhance computer and network forensics. In Workshop on Information Assurance and Security, United States Military Academy, West Point, NY, IEEE (Jun 2001)
-
(2001)
Workshop on Information Assurance and Security
-
-
Yasinsac, A.1
Manzano, Y.2
|