-
1
-
-
33745802064
-
Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds
-
Sophia Antipolis, French Riviera, France, Sep
-
A. Blum, D. Song, and S. Venkataraman, "Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds," in Proc. Recent Advance in Intrusion Detection (RAID), Sophia Antipolis, French Riviera, France, Sep. 2004.
-
(2004)
Proc. Recent Advance in Intrusion Detection (RAID)
-
-
Blum, A.1
Song, D.2
Venkataraman, S.3
-
2
-
-
36849050729
-
Combating Attacks Against Encrypted Protocols
-
Glasgow, Scotland, Jun
-
Z. M. Fadiullah, T. Taleb, N. Ansari, K. Hashimoto, Y. Miyake, Y. Nemoto, and N. Kato, "Combating Attacks Against Encrypted Protocols," in Proc. ICC 2007, Glasgow, Scotland, Jun. 2007.
-
(2007)
Proc. ICC 2007
-
-
Fadiullah, Z.M.1
Taleb, T.2
Ansari, N.3
Hashimoto, K.4
Miyake, Y.5
Nemoto, Y.6
Kato, N.7
-
3
-
-
0034997397
-
Advanced and Authenticated Marking Schemes for IP Traceback
-
Anchorage, Alaska, USA, Apr
-
D. Song and A. Perrig, "Advanced and Authenticated Marking Schemes for IP Traceback," in Proc. IEEE INFOCOM, Anchorage, Alaska, USA, Apr. 2001.
-
(2001)
Proc. IEEE INFOCOM
-
-
Song, D.1
Perrig, A.2
-
4
-
-
0035010963
-
On the Effectiveness of Probabilistic Packet Marking for IP Traceback under Denial of Service Attack
-
Anchorage, Alaska, USA, Apr
-
W. Lee and K. Park, "On the Effectiveness of Probabilistic Packet Marking for IP Traceback under Denial of Service Attack," in Proc. IEEE INFOCOM, Anchorage, Alaska, USA, Apr. 2001.
-
(2001)
Proc. IEEE INFOCOM
-
-
Lee, W.1
Park, K.2
-
6
-
-
20344392671
-
Tracing Cyber Attacks from the Practical Perspective
-
May
-
Z. Gao and N. Ansari, "Tracing Cyber Attacks from the Practical Perspective," IEEE Commun. Mag., Vol. 43, No. 5, May 2005, pp. 123-131.
-
(2005)
IEEE Commun. Mag
, vol.43
, Issue.5
, pp. 123-131
-
-
Gao, Z.1
Ansari, N.2
-
7
-
-
0001647024
-
Practical Network Support for IP Traceback
-
Stockholm, Sweden, Sep
-
S. Savage, D. Wetherall, A. R. Karlin, and T. Anderson, "Practical Network Support for IP Traceback," in Proc. SIGCOMM, Stockholm, Sweden, Sep. 2000.
-
(2000)
Proc. SIGCOMM
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.R.3
Anderson, T.4
-
9
-
-
3042802739
-
Tracing the Source of Network Attack: A Technical, Legal and Societal Problem
-
New York, USA, Jun
-
S. C. Lee and C. Shields, "Tracing the Source of Network Attack: A Technical, Legal and Societal Problem," in Proc. 2001 IEEE Workshop on Information Assurance and Security, New York, USA, Jun. 2001.
-
(2001)
Proc. 2001 IEEE Workshop on Information Assurance and Security
-
-
Lee, S.C.1
Shields, C.2
-
10
-
-
0034300783
-
Towards trapping wily intruders in the large
-
Oct
-
G. Mansfield, K. Ohta, Y. Takei, N. Kato, and Y. Nemoto, "Towards trapping wily intruders in the large," Computer Networks, Vol. 34, No. 4, Oct. 2000, pp. 659-670.
-
(2000)
Computer Networks
, vol.34
, Issue.4
, pp. 659-670
-
-
Mansfield, G.1
Ohta, K.2
Takei, Y.3
Kato, N.4
Nemoto, Y.5
-
11
-
-
23844533214
-
ProtoMon: Embedded Monitors for Cryptographic Protocol Intrusion Detection and Prevention
-
Jan
-
S. P. Joglekar and S. R. Tate, "ProtoMon: Embedded Monitors for Cryptographic Protocol Intrusion Detection and Prevention," J. Universal Computer Science (JUCS), Vol. 11, No. 1, Jan. 2005, pp. 83-103.
-
(2005)
J. Universal Computer Science (JUCS)
, vol.11
, Issue.1
, pp. 83-103
-
-
Joglekar, S.P.1
Tate, S.R.2
-
13
-
-
33745913964
-
SSL/TLS session-aware user authentication - OR how to effectively thwart the man-in-the-middle
-
Aug
-
R. Oppliger, R. Hauser, and D. Basin, "SSL/TLS session-aware user authentication - OR how to effectively thwart the man-in-the-middle," Computer Communications, Vol. 29, No. 12, Aug. 2006, pp. 2238-2246.
-
(2006)
Computer Communications
, vol.29
, Issue.12
, pp. 2238-2246
-
-
Oppliger, R.1
Hauser, R.2
Basin, D.3
-
14
-
-
36849063095
-
-
Available at CERT, OpenSSL servers contain a buffer overflow during the SSL2 handshake process, CERT Vulnerability Note #102795, Jul. 2002.
-
Available at CERT, "OpenSSL servers contain a buffer overflow during the SSL2 handshake process," CERT Vulnerability Note #102795, Jul. 2002.
-
-
-
-
15
-
-
36849066938
-
-
Available at CERT, OpenSSL servers contain a remotely exploitable buffer overflow vulnerability during the SSL3 handshake process, CERT Vulnerability Note #561275, Jul. 2002.
-
Available at CERT, "OpenSSL servers contain a remotely exploitable buffer overflow vulnerability during the SSL3 handshake process," CERT Vulnerability Note #561275, Jul. 2002.
-
-
-
-
16
-
-
11144320306
-
Tracing DDoS Attacks by Comparing Traffic patterns Based on Quadratic Programming Methods
-
K. Sakaguchi, K. Ohta, Y. Waizumi, N. Kato, and Y. Nemoto, "Tracing DDoS Attacks by Comparing Traffic patterns Based on Quadratic Programming Methods," The Transactions of IEICE B (Japanese Edition), Vol. J85-B, No. 8, 2002, pp. 1295-1303.
-
(2002)
The Transactions of IEICE B (Japanese Edition)
, vol.J85-B
, Issue.8
, pp. 1295-1303
-
-
Sakaguchi, K.1
Ohta, K.2
Waizumi, Y.3
Kato, N.4
Nemoto, Y.5
-
17
-
-
36849061608
-
-
Network Simulator-ns(version 2). http://isl.edu/nsna.rn/ns
-
Network Simulator-ns(version 2). http://isl.edu/nsna.rn/ns
-
-
-
-
18
-
-
36849008121
-
-
Brite, http://www.cs.bu.edu/brite/
-
Brite
-
-
|