-
1
-
-
1642478961
-
Modeling and simulation of telecommunication networks for control and management
-
Baras, J.: Modeling and simulation of telecommunication networks for control and management. In: Proc. Winter Simulation Conf. (2003)
-
(2003)
Proc. Winter Simulation Conf
-
-
Baras, J.1
-
2
-
-
33847123551
-
Experience with DETER: A testbed for security research
-
Benzel, T., Braden, R., Kim, D., Neuman, C., Joseph, A.D., Sklower, K.: Experience with DETER: A testbed for security research. In: Proc. Int. Conf. on Testbeds & Research Infrastructures for the DEvelopment of NeTworks & COMmunities (TRIDENTCOM 2006) (2006)
-
(2006)
Proc. Int. Conf. on Testbeds & Research Infrastructures for the DEvelopment of NeTworks & COMmunities (TRIDENTCOM
-
-
Benzel, T.1
Braden, R.2
Kim, D.3
Neuman, C.4
Joseph, A.D.5
Sklower, K.6
-
3
-
-
38149001587
-
-
Bernstein, D.: SYN cookies (2003), http://cr.yp.to/syncookies.html
-
Bernstein, D.: SYN cookies (2003), http://cr.yp.to/syncookies.html
-
-
-
-
4
-
-
0038257912
-
Internet traffic tends toward Poisson and independent as the load increases
-
Denison, D, Hansen, M, Holmes, C, Mallick, B, Yu, B, eds, Nonlinear estimation and Classification, Springer, Heidelberg
-
Cao, J., Cleveland, W., Lin, D., Sun, D.: Internet traffic tends toward Poisson and independent as the load increases. In: Denison, D., Hansen, M., Holmes, C., Mallick, B., Yu, B. (eds.) Nonlinear estimation and Classification. LNCS, vol. 171, pp. 83-110. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.171
, pp. 83-110
-
-
Cao, J.1
Cleveland, W.2
Lin, D.3
Sun, D.4
-
5
-
-
0036967463
-
Use of spectral analysis in defense against DoS attacks
-
IEEE Computer Society Press, Los Alamitos
-
Cheng, C.-M., Kung, H., Tan, K.-S.: Use of spectral analysis in defense against DoS attacks. In: Proc. IEEE Global Telecommunications Conf (GLOBECOM), pp. 2143-2148. IEEE Computer Society Press, Los Alamitos (2002)
-
(2002)
Proc. IEEE Global Telecommunications Conf (GLOBECOM)
, pp. 2143-2148
-
-
Cheng, C.-M.1
Kung, H.2
Tan, K.-S.3
-
6
-
-
38149100981
-
-
Dierks, T, Rescorla, E, The transport layer security (TLS) protocol. Version 1.1. RFC 4346 April 2006
-
Dierks, T., Rescorla, E.: The transport layer security (TLS) protocol. Version 1.1. RFC 4346 (April 2006), http://tools.ietf.org/html/rfc4346
-
-
-
-
7
-
-
25644445353
-
Design and implementation of network puzzles
-
IEEE Computer Society Press, Los Alamitos
-
Feng, W., Kaiser, E., Luu, A.: Design and implementation of network puzzles. In: Proc. Annual Joint Conf. of IEEE Computer and Communications Societies (INFOCOM), vol. 4, pp. 2372-2382. IEEE Computer Society Press, Los Alamitos (2005)
-
(2005)
Proc. Annual Joint Conf. of IEEE Computer and Communications Societies (INFOCOM)
, vol.4
, pp. 2372-2382
-
-
Feng, W.1
Kaiser, E.2
Luu, A.3
-
9
-
-
0003415244
-
-
RFC 2616 June
-
Fielding, R., Gettys, J., Mogul, J., Frystyk, H., Masinter, L., Leach, P., Berners-Lee, T.: Hypertext transfer protocol - HTTP/1.1. RFC 2616 (June 1999), http://tools.ietf.org/html/rfc2616#section-8
-
(1999)
Hypertext transfer protocol - HTTP/1.1
-
-
Fielding, R.1
Gettys, J.2
Mogul, J.3
Frystyk, H.4
Masinter, L.5
Leach, P.6
Berners-Lee, T.7
-
11
-
-
21644438395
-
An efficient hidden Markov model training scheme for anomaly intrusion detection of server applications based on system calls
-
IEEE Computer Society Press, Los Alamitos
-
Hoang, X., Hu, J.: An efficient hidden Markov model training scheme for anomaly intrusion detection of server applications based on system calls. In: Proc. IEEE Int. Conf. on Networks (ICON), vol. 2, pp. 470-474. IEEE Computer Society Press, Los Alamitos (2004)
-
(2004)
Proc. IEEE Int. Conf. on Networks (ICON)
, vol.2
, pp. 470-474
-
-
Hoang, X.1
Hu, J.2
-
14
-
-
17744363857
-
On the robustness of soft state protocols
-
IEEE Computer Society Press, Los Alamitos
-
Lui, J.C., Misra, V., Rubenstein, D.: On the robustness of soft state protocols. In: Proc. IEEE Int. Conf. on Network Protocols (ICNP), pp. 50-60. IEEE Computer Society Press, Los Alamitos (2004)
-
(2004)
Proc. IEEE Int. Conf. on Network Protocols (ICNP)
, pp. 50-60
-
-
Lui, J.C.1
Misra, V.2
Rubenstein, D.3
-
15
-
-
0036926468
-
Modeling and quantification of security attributes of software systems
-
Madan, B., Goseva-Popstojanova, K., Vaidyanathan, K., Trivedi, K.: Modeling and quantification of security attributes of software systems. In: Proc. Int. Conf. on Dependable Systems and Networks (DSN), pp. 505-514 (2002)
-
(2002)
Proc. Int. Conf. on Dependable Systems and Networks (DSN)
, pp. 505-514
-
-
Madan, B.1
Goseva-Popstojanova, K.2
Vaidyanathan, K.3
Trivedi, K.4
-
16
-
-
0032664157
-
A formal framework and evaluation method for network denial of service
-
IEEE Computer Society Press, Los Alamitos
-
Meadows, C.: A formal framework and evaluation method for network denial of service. In: Proc. IEEE Computer Security Foundations Work, IEEE Computer Society Press, Los Alamitos (1999)
-
(1999)
Proc. IEEE Computer Security Foundations Work
-
-
Meadows, C.1
-
17
-
-
0035075103
-
A cost-based framework for analysis of denial of service networks
-
Meadows, C.: A cost-based framework for analysis of denial of service networks. Journal of Computer Security 9(1/2), 143-164 (2001)
-
(2001)
Journal of Computer Security
, vol.9
, Issue.1-2
, pp. 143-164
-
-
Meadows, C.1
-
18
-
-
79959572592
-
-
Microsoft Corporation
-
Microsoft Corporation. Security considerations for network attacks, http://www.microsoft.com/technet/security/topics/networksecurity/secdeny.mspx
-
Security considerations for network attacks
-
-
-
19
-
-
29244475815
-
-
Prentice-Hall, Englewood Cliffs
-
Mirkovic, J., Dietrich, S., Dittrich, D., Reiher, P.: Internet Denial of Service: Attack and Defense Mechanisms. Prentice-Hall, Englewood Cliffs (2004)
-
(2004)
Internet Denial of Service: Attack and Defense Mechanisms
-
-
Mirkovic, J.1
Dietrich, S.2
Dittrich, D.3
Reiher, P.4
-
20
-
-
11144272176
-
A taxonomy of DDoS attack and DDoS defense mechar nisms
-
Mirkovic, J., Reiher, P.: A taxonomy of DDoS attack and DDoS defense mechar nisms. SIGCOMM Comput. Commun. Rev. 34(2), 39-53 (2004)
-
(2004)
SIGCOMM Comput. Commun. Rev
, vol.34
, Issue.2
, pp. 39-53
-
-
Mirkovic, J.1
Reiher, P.2
-
21
-
-
34547470656
-
Measuring denial of service
-
QoP, pp, ACM Press, New York
-
Mirkovic, J., Reiher, P., Fahmy, S., Thomas, R., Hussain, A., Schwab, S., Ko, C: Measuring denial of service. In: Proc. ACM Work, on Quality of Protection (QoP), pp. 53-58. ACM Press, New York (2006)
-
(2006)
Proc. ACM Work, on Quality of Protection
, pp. 53-58
-
-
Mirkovic, J.1
Reiher, P.2
Fahmy, S.3
Thomas, R.4
Hussain, A.5
Schwab, S.6
Ko, C.7
-
22
-
-
17644427757
-
Alliance formation for DDoS defense. In: Proc. New Security Paradigms Work (NSPW)
-
Mirkovic, J., Robinson, M., Reiher, P.: Alliance formation for DDoS defense. In: Proc. New Security Paradigms Work (NSPW), pp. 11-18. ACM SIGSAC (2003)
-
(2003)
ACM SIGSAC
, pp. 11-18
-
-
Mirkovic, J.1
Robinson, M.2
Reiher, P.3
-
23
-
-
0037159153
-
A compound model for TCP connection arrivals for LAN and WAN applications
-
Nuzman, C., Saniee, I., Sweldens, W., Weiss, A.: A compound model for TCP connection arrivals for LAN and WAN applications. Comput. Networks 40(3), 319-337 (2002)
-
(2002)
Comput. Networks
, vol.40
, Issue.3
, pp. 319-337
-
-
Nuzman, C.1
Saniee, I.2
Sweldens, W.3
Weiss, A.4
-
25
-
-
38149132429
-
DefCOM: Defensive cooperative overlay mesh
-
Robinson, M., Mirkovic, J., Michel, S., Schnaider, M., Reiher, P.: DefCOM: defensive cooperative overlay mesh. In: Proc. DARPA Information Survivability Conf. and Exposition, vol. 2, pp. 101-102 (2003)
-
(2003)
Proc. DARPA Information Survivability Conf. and Exposition
, vol.2
, pp. 101-102
-
-
Robinson, M.1
Mirkovic, J.2
Michel, S.3
Schnaider, M.4
Reiher, P.5
-
26
-
-
26444521351
-
The RTT distribution of TCP flows in the Internet and its impact on TCP-based flow control
-
Technical report, Cooperative Association for Internet Data Analysis CAIDA, February
-
Shakkottai, S., Srikant, R., Brownlee, N., Broido, A., Claffy, K.: The RTT distribution of TCP flows in the Internet and its impact on TCP-based flow control. Technical report, Cooperative Association for Internet Data Analysis (CAIDA) (February 2004)
-
(2004)
-
-
Shakkottai, S.1
Srikant, R.2
Brownlee, N.3
Broido, A.4
Claffy, K.5
-
27
-
-
15944398256
-
IP-traceback based attacker tracking: A probabilistic technique for detecting Internet attacks using the concept of hidden markov models
-
IEEE Computer Society Press, Los Alamitos
-
Varanasi, R., Phoha, V., Joshi, S.: IP-traceback based attacker tracking: A probabilistic technique for detecting Internet attacks using the concept of hidden markov models. In: Proc. IEEE Information Assurance Work, IEEE Computer Society Press, Los Alamitos (2004)
-
(2004)
Proc. IEEE Information Assurance Work
-
-
Varanasi, R.1
Phoha, V.2
Joshi, S.3
|