-
1
-
-
14944380936
-
The Top Speed of Flash Worms
-
Oct
-
S. Staniford, D. Moore, V. Paxson and N. Weaver, "The Top Speed of Flash Worms," in Proceedings of the ACM Workshop on Rapid Malcode (WORM'04), pp. 33-42, Oct. 2004.
-
(2004)
Proceedings of the ACM Workshop on Rapid Malcode (WORM'04)
, pp. 33-42
-
-
Staniford, S.1
Moore, D.2
Paxson, V.3
Weaver, N.4
-
2
-
-
0242314805
-
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford and N. Weaver "The Spread of the Sapphire/Slammer Worm," http://www.caida.org/ publications/papers/2003/sapphire/sapphire.html.
-
The Spread of the Sapphire/Slammer Worm
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
5
-
-
24344477123
-
Efficient Content-Based Detection of Zero-Day Worms
-
May
-
P. Akritidis, K. Anagnostakis and E. P. Markatos, "Efficient Content-Based Detection of Zero-Day Worms," in Proceedings of the IEEE International Conference on Communications (ICC'05), vol. 2, pp. 837-843, May 2005.
-
(2005)
Proceedings of the IEEE International Conference on Communications (ICC'05)
, vol.2
, pp. 837-843
-
-
Akritidis, P.1
Anagnostakis, K.2
Markatos, E.P.3
-
7
-
-
46449119204
-
-
SNORT Network Intrusion Detection System
-
SNORT Network Intrusion Detection System, www.snort.org.
-
-
-
-
8
-
-
31844441673
-
Advanced Polymorphic Worms: Evading IDS by Blending in with Normal Traffic,
-
Technical Report, Georgia Institute of Technology, Sep
-
O. Kolesnikov and W. Lee, "Advanced Polymorphic Worms: Evading IDS by Blending in with Normal Traffic," Technical Report, Georgia Institute of Technology, Sep. 2005.
-
(2005)
-
-
Kolesnikov, O.1
Lee, W.2
-
9
-
-
33749830235
-
-
C. C. Zou, N. Duffield, D. Towsley and W. Gong, Adaptive Defense Against Various Network Attacks, in IEEE Journal on Selected Areas in Communications, 24, no. 10, pp. 1877-1888, Oct. 2006.
-
C. C. Zou, N. Duffield, D. Towsley and W. Gong, "Adaptive Defense Against Various Network Attacks," in IEEE Journal on Selected Areas in Communications, vol. 24, no. 10, pp. 1877-1888, Oct. 2006.
-
-
-
-
12
-
-
33846572377
-
Multi-pattern Signature Matching for Hardware Network Intrusion Detection Systems
-
Dec
-
H. Song, J. W. Lockwood, "Multi-pattern Signature Matching for Hardware Network Intrusion Detection Systems," in Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM'05), vol. 3, pp. 1686-1690, Dec. 2005.
-
(2005)
Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM'05)
, vol.3
, pp. 1686-1690
-
-
Song, H.1
Lockwood, J.W.2
-
13
-
-
84991765629
-
Automated Worm Fingerprinting
-
Dec
-
S. Singh, C. Estan, G. Varghese and S. Savage, "Automated Worm Fingerprinting," in Proceedings of the ACM Symposium on Operating System Design and Implementation (OSDI'04), pp. 45-60, Dec. 2004.
-
(2004)
Proceedings of the ACM Symposium on Operating System Design and Implementation (OSDI'04)
, pp. 45-60
-
-
Singh, S.1
Estan, C.2
Varghese, G.3
Savage, S.4
-
14
-
-
0348230637
-
Finding Frequent Items in Data Streams
-
Jan
-
M. Charikar, K. Chen and M. Farach-Colton, "Finding Frequent Items in Data Streams," Special Issue on Automata, Languages and Programming, vol. 312 pp. 3-15, Jan. 2004.
-
(2004)
Special Issue on Automata, Languages and Programming
, vol.312
, pp. 3-15
-
-
Charikar, M.1
Chen, K.2
Farach-Colton, M.3
-
15
-
-
0032092365
-
New Sampling-Based Summary Statistics for Improving Approximate Query Answers
-
June
-
P. B. Gibbons and Y Matias, "New Sampling-Based Summary Statistics for Improving Approximate Query Answers," in Proceedings of the ACM SIGMOD'98 Conference, vol. 27, pp. 331-342, June 1998.
-
(1998)
Proceedings of the ACM SIGMOD'98 Conference
, vol.27
, pp. 331-342
-
-
Gibbons, P.B.1
Matias, Y.2
-
16
-
-
85084163246
-
Autograph: Toward Automated, Distributed Worm Signature Detection
-
Aug
-
H. A. Kim and B. Karp, "Autograph: Toward Automated, Distributed Worm Signature Detection," in Proceedings of 13th USENIX Security Symposium, pp. 271-286 , Aug. 2004.
-
(2004)
Proceedings of 13th USENIX Security Symposium
, pp. 271-286
-
-
Kim, H.A.1
Karp, B.2
-
18
-
-
0014814325
-
Space/Time Trade-offs in Hash Coding with Allowable Errors, in
-
July
-
B. Bloom, "Space/Time Trade-offs in Hash Coding with Allowable Errors," in Comm. ACM, vol. 13, no. 7, pp. 422-426, July 1970.
-
(1970)
Comm. ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.1
-
19
-
-
33744912228
-
New Directions in Traffic Measurement and Accounting
-
Aug
-
C. Estan and G. Varghese, "New Directions in Traffic Measurement and Accounting," in Proceedings of the ACM SIGCOMM'02 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, pp. 323-336, Aug. 2002.
-
(2002)
Proceedings of the ACM SIGCOMM'02 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications
, pp. 323-336
-
-
Estan, C.1
Varghese, G.2
-
20
-
-
79251558204
-
Detecting Malicious Network Traffic Using Inverse Distributions of Packet Contents
-
Aug
-
V. Karamcheti, D. Geiger, Z. Kedem and S. Muthukrishnan, "Detecting Malicious Network Traffic Using Inverse Distributions of Packet Contents," in Proceedings of ACM SIGCOMM'05 MineNet Workshop, pp. 165-170, Aug. 2005.
-
(2005)
Proceedings of ACM SIGCOMM'05 MineNet Workshop
, pp. 165-170
-
-
Karamcheti, V.1
Geiger, D.2
Kedem, Z.3
Muthukrishnan, S.4
-
21
-
-
18244369146
-
-
Polynomials, http://www.theory.cs.uvic.ca/cos/gen/poly.html.
-
Polynomials
-
-
|