-
1
-
-
84860927616
-
-
CERT
-
CERT. CERT/CC advisories. http://www.cert.org/advisories/.
-
CERT/CC advisories
-
-
-
4
-
-
3543096392
-
Fast portscan detection using sequential hypothesis testing
-
(May)
-
JUNG, J., PAXSON, V., BERGER, A. W., AND BALAKRISHNAN, H. Fast portscan detection using sequential hypothesis testing. In Proceedings of the IEEE Symposium on Security and Privacy (May 2004).
-
(2004)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
JUNG, J.1
PAXSON, V.2
BERGER, A. W.3
BALAKRISHNAN, H.4
-
7
-
-
85084163246
-
Autograph: Toward automated, distributed worm signature detection
-
(August)
-
KIM, H., AND KARP, B. Autograph: Toward automated, distributed worm signature detection. In Proceedings of 13th USENIX Security Symposium (August 2004).
-
(2004)
Proceedings of 13th USENIX Security Symposium
-
-
KIM, H.1
KARP, B.2
-
8
-
-
8344261545
-
Packetscore: Statistical-based overload control against distributed denial-ofservice attacks
-
(March)
-
KIM, Y., LAU, W., CHUAH, M., AND CHAO, H. Packetscore: Statistical-based overload control against distributed denial-ofservice attacks. In Proceedings of the IEEE INFOCOM (March 2004).
-
(2004)
Proceedings of the IEEE INFOCOM
-
-
KIM, Y.1
LAU, W.2
CHUAH, M.3
CHAO, H.4
-
9
-
-
0036093229
-
Toward cost-sensitive modeling for intrusion detection and response
-
LEE, W., FAN, W., MILLER, M., STOLFO, S., AND ZADOK, E. Toward cost-sensitive modeling for intrusion detection and response. Journal of Computer Security 10, 1,2 (2002).
-
(2002)
Journal of Computer Security
, vol.10
, Issue.1
, pp. 2
-
-
LEE, W.1
FAN, W.2
MILLER, M.3
STOLFO, S.4
ZADOK, E.5
-
11
-
-
14944369649
-
Characteristics of Internet background radiation
-
(October)
-
PANG, R., YEGNESWARAN, V., BARFORD, P., PAXSON, V., AND PETERSON, L. Characteristics of Internet background radiation. In Proceedings of the Internet Measurement Conference (IMC) (October 2004).
-
(2004)
Proceedings of the Internet Measurement Conference (IMC)
-
-
PANG, R.1
YEGNESWARAN, V.2
BARFORD, P.3
PAXSON, V.4
PETERSON, L.5
-
12
-
-
0001647024
-
Practical network support for IP traceback
-
(August)
-
SAVAGE, S.,WETHERALL, D., KARLIN, A., AND ANDERSON, T. Practical network support for IP traceback. In Proceedings of ACM SIGCOMM (August 2001).
-
(2001)
Proceedings of ACM SIGCOMM
-
-
SAVAGE, S.1
WETHERALL, D.2
KARLIN, A.3
ANDERSON, T.4
-
13
-
-
84991765629
-
Automated worm fingerprinting
-
(December)
-
SINGH, S., ESTAN, C., VARGHESE, G., AND SAVAGE, S. Automated worm fingerprinting. In Proceedings of the 6th ACM/USENIX Symposium on Operating System Design and Implementation (OSDI) (December 2004).
-
(2004)
Proceedings of the 6th ACM/USENIX Symposium on Operating System Design and Implementation (OSDI)
-
-
SINGH, S.1
ESTAN, C.2
VARGHESE, G.3
SAVAGE, S.4
-
14
-
-
14844308379
-
Containment of scanning worms in enterprise networks
-
STANIFORD, S. Containment of scanning worms in enterprise networks. Journal of Computer Security (2003).
-
(2003)
Journal of Computer Security
-
-
STANIFORD, S.1
|