-
1
-
-
3543096392
-
Fast Portscan Detection Using Sequential Hypothesis Testing
-
J. Jung, V. Paxson, A. W. Berger, and H. Balakrishnan, "Fast Portscan Detection Using Sequential Hypothesis Testing," in Proc. of IEEE Symposium on Security and Privacy, 2004.
-
(2004)
Proc. of IEEE Symposium on Security and Privacy
-
-
Jung, J.1
Paxson, V.2
Berger, A.W.3
Balakrishnan, H.4
-
2
-
-
0042474173
-
Internet Quarantine: Requirements for Containing Self-Propagating Code
-
D. Moore, C. Shannon, G. Voelker, and S. Savage, "Internet Quarantine: Requirements for Containing Self-Propagating Code," in Proc. of IEEE INFOCOM, 2003.
-
(2003)
Proc. of IEEE INFOCOM
-
-
Moore, D.1
Shannon, C.2
Voelker, G.3
Savage, S.4
-
4
-
-
46149097984
-
-
Alliance
-
"Fingerprint Sharing Alliance," http://www.arbor.net/ fingerprint-sharing-alliance.php.
-
Fingerprint Sharing
-
-
-
5
-
-
27544495684
-
Worm Origin Identification Using Random Moonwalks
-
Y. Xie, V. Sekar, D. Maltz, M. K. Reiter, and H. Zhang, "Worm Origin Identification Using Random Moonwalks," in Proc. of IEEE Symposium on Security and Privacy, 2005.
-
(2005)
Proc. of IEEE Symposium on Security and Privacy
-
-
Xie, Y.1
Sekar, V.2
Maltz, D.3
Reiter, M.K.4
Zhang, H.5
-
8
-
-
18744391788
-
Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay
-
D. L. Donoho, A. G. Flesia, U. Shankar, V. Paxson, J. Coit, and S. Staniford-Chen, "Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay," in Proc. of The 5th International Symposium on Recent Advances in Intrusion Detection (RAID), 2002.
-
(2002)
Proc. of The 5th International Symposium on Recent Advances in Intrusion Detection (RAID)
-
-
Donoho, D.L.1
Flesia, A.G.2
Shankar, U.3
Paxson, V.4
Coit, J.5
Staniford-Chen, S.6
-
9
-
-
0001647024
-
Practical Network Support for IP Traceback
-
S. Savage, D. Wetherall, A. Karlin, and T. Anderson, "Practical Network Support for IP Traceback," in Proc. of ACM SIGCOMM, 2000.
-
(2000)
Proc. of ACM SIGCOMM
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
11
-
-
0001887844
-
Hash-Based IP Traceback
-
A. C. Snoeren, C. Partridge, L. A. Sanchez, C. E. Jones, F. Tchakountio, S. T. Kent, and W. T. Strayer, "Hash-Based IP Traceback," in Proc. of ACM SIGCOMM, 2001.
-
(2001)
Proc. of ACM SIGCOMM
-
-
Snoeren, A.C.1
Partridge, C.2
Sanchez, L.A.3
Jones, C.E.4
Tchakountio, F.5
Kent, S.T.6
Strayer, W.T.7
-
15
-
-
0034826231
-
Spectral Analysis of Data
-
Y. Azar, A. Fiat, A. Karlin, F. McSherry, and J. Saia, "Spectral Analysis of Data," in ACM Symposium on Theory of Computing, 2001.
-
(2001)
ACM Symposium on Theory of Computing
-
-
Azar, Y.1
Fiat, A.2
Karlin, A.3
McSherry, F.4
Saia, J.5
-
17
-
-
4544363839
-
Towards an Accurate AS-Level Traceroute Tool
-
Z. Mao, J. Rexford, J. Wang, and R. Katz, "Towards an Accurate AS-Level Traceroute Tool," in Proc. of ACM SIGCOMM, 2003.
-
(2003)
Proc. of ACM SIGCOMM
-
-
Mao, Z.1
Rexford, J.2
Wang, J.3
Katz, R.4
-
18
-
-
46149099008
-
-
The Route Views Project
-
"The Route Views Project," http://www.routeviews.org.
-
-
-
-
19
-
-
46149097756
-
Forensic Analysis for Epidemic Attacks in Federated Networks
-
CyLab, Carnegie Mellon University, Tech. Rep. CMU-CyLab-06-014
-
Y. Xie, V. Sekar, M. Reiter, and H. Zhang, "Forensic Analysis for Epidemic Attacks in Federated Networks," CyLab, Carnegie Mellon University, Tech. Rep. CMU-CyLab-06-014, 2006.
-
(2006)
-
-
Xie, Y.1
Sekar, V.2
Reiter, M.3
Zhang, H.4
|