-
1
-
-
48749108827
-
-
Baecher P, Koetter M, Holz T, Dornseif M, Freiling F. The nepenthes platform: an efficient approach to collect malware. In: Proceedings of the 9th international symposium on recent advances in intrusion detection (RAID); September 2006.
-
Baecher P, Koetter M, Holz T, Dornseif M, Freiling F. The nepenthes platform: an efficient approach to collect malware. In: Proceedings of the 9th international symposium on recent advances in intrusion detection (RAID); September 2006.
-
-
-
-
2
-
-
0002590155
-
The maximum clique problem
-
Kluwer Academic Publishers, Boston, MA
-
Bomze I., Budinich M., Pardalos P., and Pelillo M. The maximum clique problem. Handbook of combinatorial optimization vol. 4 (1999), Kluwer Academic Publishers, Boston, MA
-
(1999)
Handbook of combinatorial optimization
, vol.4
-
-
Bomze, I.1
Budinich, M.2
Pardalos, P.3
Pelillo, M.4
-
3
-
-
84990895509
-
-
Chen B, Yegneswaran V, Barford P, Ramakrishnan R. Toward a query language for network attack data. In: Second IEEE workshop on networks meets databases (NetDB '06); April 2006.
-
Chen B, Yegneswaran V, Barford P, Ramakrishnan R. Toward a query language for network attack data. In: Second IEEE workshop on networks meets databases (NetDB '06); April 2006.
-
-
-
-
4
-
-
48749085252
-
-
Chen Z, Gao L, Kwiat K. Modeling the spread of active worms; 2003.
-
Chen Z, Gao L, Kwiat K. Modeling the spread of active worms; 2003.
-
-
-
-
5
-
-
42149173109
-
Using uncleanliness to predict future botnet addresses
-
ACM, New York, NY, USA
-
Collins M.P., Shimeall T.J., Faber S., Janies J., Weaver R., De Shon M., et al. Using uncleanliness to predict future botnet addresses. IMC '07: Proceedings of the seventh ACM SIGCOMM conference on Internet measurement (2007), ACM, New York, NY, USA 93-104
-
(2007)
IMC '07: Proceedings of the seventh ACM SIGCOMM conference on Internet measurement
, pp. 93-104
-
-
Collins, M.P.1
Shimeall, T.J.2
Faber, S.3
Janies, J.4
Weaver, R.5
De Shon, M.6
-
6
-
-
48749092162
-
-
Dagon D, Zou C, Lee W. Modeling botnet propagation using time zones. In: Proceedings of the 13th annual network and distributed system security symposium (NDSS'06); February 2006.
-
Dagon D, Zou C, Lee W. Modeling botnet propagation using time zones. In: Proceedings of the 13th annual network and distributed system security symposium (NDSS'06); February 2006.
-
-
-
-
7
-
-
0036080361
-
Adaptive quality-based clustering of gene expression profiles
-
De Smet F., Mathys J., Marchal K., Thijs G., De Moor B., and Moreau Y. Adaptive quality-based clustering of gene expression profiles. Journal of Bioinformatics 18 (2002) 735-746
-
(2002)
Journal of Bioinformatics
, vol.18
, pp. 735-746
-
-
De Smet, F.1
Mathys, J.2
Marchal, K.3
Thijs, G.4
De Moor, B.5
Moreau, Y.6
-
8
-
-
48749084721
-
-
DShield. Available from: .
-
DShield. Available from: .
-
-
-
-
9
-
-
48749093505
-
-
Internet motion sensor. Available from: .
-
Internet motion sensor. Available from: .
-
-
-
-
10
-
-
0014856267
-
An analysis of some graph theoretical cluster techniques
-
Gary Augustson J., and Minker J. An analysis of some graph theoretical cluster techniques. Journal of the ACM 17 4 (1970) 571-588
-
(1970)
Journal of the ACM
, vol.17
, Issue.4
, pp. 571-588
-
-
Gary Augustson, J.1
Minker, J.2
-
11
-
-
48749091387
-
-
Jain AK, Dubes RC. Algorithms for clustering data. Prentice-Hall advanced reference series; 1988.
-
Jain AK, Dubes RC. Algorithms for clustering data. Prentice-Hall advanced reference series; 1988.
-
-
-
-
14
-
-
33947150487
-
-
Li X, Bian F, Zhang H, Diot C, Govindan R, Hong W, et al. Advanced indexing techniques for wide-area network monitoring. In: First IEEE international workshop on networking meets databases (NetDB); 2005.
-
Li X, Bian F, Zhang H, Diot C, Govindan R, Hong W, et al. Advanced indexing techniques for wide-area network monitoring. In: First IEEE international workshop on networking meets databases (NetDB); 2005.
-
-
-
-
15
-
-
33745781710
-
-
Lin J, Keogh E, Lonardi S, Chiu B. A symbolic representation of time series, with implications for streaming algorithms. In: Proceedings of the eighth ACM SIGMOD workshop on research issues in data mining and knowledge discovery, California, USA; 2003.
-
Lin J, Keogh E, Lonardi S, Chiu B. A symbolic representation of time series, with implications for streaming algorithms. In: Proceedings of the eighth ACM SIGMOD workshop on research issues in data mining and knowledge discovery, California, USA; 2003.
-
-
-
-
16
-
-
26444582427
-
-
McHugh J. Sets, bags, and rock and roll: analyzing large data sets of network data. In: ESORICS; 2004. p. 407-22.
-
McHugh J. Sets, bags, and rock and roll: analyzing large data sets of network data. In: ESORICS; 2004. p. 407-22.
-
-
-
-
17
-
-
48749121607
-
-
Moore D, Shannon C, Voelker GM, Savage S. Network telescopes: technical report. CAIDA; April 2004.
-
Moore D, Shannon C, Voelker GM, Savage S. Network telescopes: technical report. CAIDA; April 2004.
-
-
-
-
19
-
-
0041939837
-
-
Pavan M, Pelillo M. A new graph-theoretic approach to clustering and segmentation. In: Proceedings of the IEEE conference on computer vision and pattern recognition; 2003.
-
Pavan M, Pelillo M. A new graph-theoretic approach to clustering and segmentation. In: Proceedings of the IEEE conference on computer vision and pattern recognition; 2003.
-
-
-
-
20
-
-
85084163190
-
-
Provos N. A virtual honeypot framework. In: Proceedings of the 13th USENIX security symposium; 2004.
-
Provos N. A virtual honeypot framework. In: Proceedings of the 13th USENIX security symposium; 2004.
-
-
-
-
21
-
-
48749095072
-
-
Pouget F, Dacier M. Honeypot-based forensics. In: AusCERT2004, Brisbane, Australia; 23rd-27th May 2004.
-
Pouget F, Dacier M. Honeypot-based forensics. In: AusCERT2004, Brisbane, Australia; 23rd-27th May 2004.
-
-
-
-
22
-
-
48749114837
-
Internet attack knowledge discovery via clusters and cliques of attack traces
-
Pouget F., Dacier M., Zimmerman J., Clark A., and Mohay G. Internet attack knowledge discovery via clusters and cliques of attack traces. Journal of Information Assurance and Security 1 1 (March 2006)
-
(2006)
Journal of Information Assurance and Security
, vol.1
, Issue.1
-
-
Pouget, F.1
Dacier, M.2
Zimmerman, J.3
Clark, A.4
Mohay, G.5
-
23
-
-
48749110463
-
-
Pouget F, Urvoy Keller G, Dacier M. Time signatures to detect multi-headed stealthy attack tools. In: 18th annual FIRST conference, June 25-30, 2006, Baltimore, USA; June 2006b.
-
Pouget F, Urvoy Keller G, Dacier M. Time signatures to detect multi-headed stealthy attack tools. In: 18th annual FIRST conference, June 25-30, 2006, Baltimore, USA; June 2006b.
-
-
-
-
24
-
-
48749107025
-
-
Riordan J, Zamboni D, Duponchel Y. Building and deploying billy goat, a worm-detection system. In: Proceedings of the 18th annual FIRST conference; 2006.
-
Riordan J, Zamboni D, Duponchel Y. Building and deploying billy goat, a worm-detection system. In: Proceedings of the 18th annual FIRST conference; 2006.
-
-
-
-
25
-
-
48749104640
-
-
Sophos threat analysis. W32/allaple-b. Available from: .
-
Sophos threat analysis. W32/allaple-b. Available from: .
-
-
-
-
26
-
-
48749086888
-
-
Team Cymru. Darknet project. Available from: .
-
Team Cymru. Darknet project. Available from: .
-
-
-
-
27
-
-
48749105686
-
-
The Leurre.com project. Available from: .
-
The Leurre.com project. Available from: .
-
-
-
-
28
-
-
48749103906
-
-
Werner T. Honeytrap. Available from: .
-
Werner T. Honeytrap. Available from: .
-
-
-
-
29
-
-
38049095637
-
-
Xinshun X, Jun M, Jingsheng L. An improved ant colony optimization for the maximum clique problem. In: Third international conference on natural computation (ICNC 2007), vol. IV; 2007. p. 766-70.
-
Xinshun X, Jun M, Jingsheng L. An improved ant colony optimization for the maximum clique problem. In: Third international conference on natural computation (ICNC 2007), vol. IV; 2007. p. 766-70.
-
-
-
-
30
-
-
48749104843
-
-
Yegneswaran V, Barford P, Paxson V. Using honeynets for internet situational awareness. In: Fourth ACM SIGCOMM workshop on hot topics in networking (Hotnets IV); 2005.
-
Yegneswaran V, Barford P, Paxson V. Using honeynets for internet situational awareness. In: Fourth ACM SIGCOMM workshop on hot topics in networking (Hotnets IV); 2005.
-
-
-
|