-
1
-
-
0029232080
-
Holding intruders accountable on the internet
-
Oakland, CA, May
-
S. Staniford-Chen and L. Heberlein, "Holding intruders accountable on the internet," in Proc. IEEE Symp. Security and Privacy, Oakland, CA, May 1995, pp. 39-49.
-
(1995)
Proc. IEEE Symp. Security and Privacy
, pp. 39-49
-
-
Staniford-Chen, S.1
Heberlein, L.2
-
4
-
-
84958977733
-
-
D. Donoho, A. Flesia, U. Shankar, V. Paxson, J. Coit, and S. Staniford, Multiscale stepping-stone detection: Detecting pairs of jittered interactive streams by exploiting maximum tolerable delay, in Proc. 5th Int. Symp. Recent Advances in Intrusion Detection, 2002, pp. 17-35, Lect. Notes Comput. Sci. 2516.
-
D. Donoho, A. Flesia, U. Shankar, V. Paxson, J. Coit, and S. Staniford, "Multiscale stepping-stone detection: Detecting pairs of jittered interactive streams by exploiting maximum tolerable delay," in Proc. 5th Int. Symp. Recent Advances in Intrusion Detection, 2002, pp. 17-35, Lect. Notes Comput. Sci. 2516.
-
-
-
-
5
-
-
44049098027
-
A signal processing perspective to stepping-stone detection
-
presented at the, Princeton, NJ, Mar
-
T. He and L. Tong, "A signal processing perspective to stepping-stone detection," presented at the Conf. Information Sciences and Systems, Princeton, NJ, Mar. 2006.
-
(2006)
Conf. Information Sciences and Systems
-
-
He, T.1
Tong, L.2
-
6
-
-
85116427392
-
Active timing-based correlation of perturbed traffic flows with chaff packets
-
Columbus, OH, Jun
-
P. Peng, P. Ning, D. Reeves, and X. Wang, "Active timing-based correlation of perturbed traffic flows with chaff packets," in Proc. IEEE Int. Conf. Distributed Computing Systems Workshops, Columbus, OH, Jun. 2005, pp. 107-113.
-
(2005)
Proc. IEEE Int. Conf. Distributed Computing Systems Workshops
, pp. 107-113
-
-
Peng, P.1
Ning, P.2
Reeves, D.3
Wang, X.4
-
7
-
-
33745802064
-
Detection of interactive stepping stones: Algorithms and confidence bounds
-
presented at the, France, Sep
-
A. Blum, D. Song, and S. Venkataraman, "Detection of interactive stepping stones: Algorithms and confidence bounds," presented at the Conf. Recent Advance in Intrusion Detection (RAID), Sophia Antipolis, French Riviera, France, Sep. 2004.
-
(2004)
Conf. Recent Advance in Intrusion Detection (RAID), Sophia Antipolis, French Riviera
-
-
Blum, A.1
Song, D.2
Venkataraman, S.3
-
8
-
-
49549106071
-
Stepping stone attack attribution in non-cooperative IP networks
-
presented at the, Phoenix, AZ, Apr
-
L. Zhang, A. Persaud, A. Johson, and Y. Guan, "Stepping stone attack attribution in non-cooperative IP networks," presented at the 25th IEEE Int. Performance Computing and Communications Conf., Phoenix, AZ, Apr. 2006.
-
(2006)
25th IEEE Int. Performance Computing and Communications Conf
-
-
Zhang, L.1
Persaud, A.2
Johson, A.3
Guan, Y.4
-
9
-
-
44049102446
-
Detecting information flows: Improving chaff tolerance by joint detection
-
presented at the, Baltimore, MD, Mar
-
T. He and L. Tong, "Detecting information flows: Improving chaff tolerance by joint detection," presented at the Conf. Information Sciences and Systems, Baltimore, MD, Mar. 2007.
-
(2007)
Conf. Information Sciences and Systems
-
-
He, T.1
Tong, L.2
-
10
-
-
49549085794
-
Detection of information flows
-
accepted for publication
-
T. He and L. Tong, "Detection of information flows," IEEE Trans. Inf. Theory, 2008, accepted for publication.
-
(2008)
IEEE Trans. Inf. Theory
-
-
He, T.1
Tong, L.2
-
11
-
-
0032182895
-
Statistical inference under multiterminal data compression
-
Oct
-
T. S. Han and S. Amari, "Statistical inference under multiterminal data compression," IEEE Trans. Inf. Theory, vol. 44, no. 6, pp. 2300-2324, Oct. 1998.
-
(1998)
IEEE Trans. Inf. Theory
, vol.44
, Issue.6
, pp. 2300-2324
-
-
Han, T.S.1
Amari, S.2
-
12
-
-
0022757289
-
Hypothesis testing with communication constraints
-
Jul
-
R. Ahlswede and I. Csiszar, "Hypothesis testing with communication constraints," IEEE Trans. Inf. Theory, vol. IT-32, no. 4, pp. 533-542, Jul. 1986.
-
(1986)
IEEE Trans. Inf. Theory
, vol.IT-32
, Issue.4
, pp. 533-542
-
-
Ahlswede, R.1
Csiszar, I.2
-
14
-
-
34247844336
-
Detecting encrypted stepping-stone connections
-
May
-
T. He and L. Tong, "Detecting encrypted stepping-stone connections," IEEE Trans. Signal Process., vol. 55, no. 5, pp. 1612-1623, May 2007.
-
(2007)
IEEE Trans. Signal Process
, vol.55
, Issue.5
, pp. 1612-1623
-
-
He, T.1
Tong, L.2
-
15
-
-
51849116073
-
A distributed scheme for detection of information flows in chaff
-
presented at the, Information Sciences and Systems, Princeton, NJ, Mar
-
A. Agaskar, T. He, and L. Tong, "A distributed scheme for detection of information flows in chaff," presented at the 42nd Conf. Information Sciences and Systems, Princeton, NJ, Mar. 2008.
-
(2008)
42nd Conf
-
-
Agaskar, A.1
He, T.2
Tong, L.3
-
16
-
-
0029323403
-
Wide-area traffic: The failure of poisson modeling
-
Jun
-
V. Paxson and S. Floyd, "Wide-area traffic: The failure of poisson modeling," IEEE/ACM Trans. Netw., vol. 3, no. 3, pp. 226-244, Jun. 1995.
-
(1995)
IEEE/ACM Trans. Netw
, vol.3
, Issue.3
, pp. 226-244
-
-
Paxson, V.1
Floyd, S.2
-
17
-
-
3242794048
-
-
Feb, Tinbergen Inst. Discussion Papers 99-012/4, Tinbergen Inst
-
H. P. Boswijk, A. Lucas, and N. Taylor, "A comparison of parametric, semi-nonparametric, adaptive, and nonparametric cointegration tests," Feb. 1999, Tinbergen Inst. Discussion Papers 99-012/4, Tinbergen Inst..
-
(1999)
A comparison of parametric, semi-nonparametric, adaptive, and nonparametric cointegration tests
-
-
Boswijk, H.P.1
Lucas, A.2
Taylor, N.3
-
18
-
-
0016036648
-
Information rates and data-compression schemes for poisson processes
-
Mar
-
I. Rubin, "Information rates and data-compression schemes for poisson processes," IEEE Trans. Inf. Theory, vol. 20, no. 2, pp. 200-210, Mar. 1974.
-
(1974)
IEEE Trans. Inf. Theory
, vol.20
, Issue.2
, pp. 200-210
-
-
Rubin, I.1
-
20
-
-
49549112545
-
-
N. Kingsbury, Approximation formulae for the Gaussian error integral Q(x) Tech. Rep. m11067, Jun. 2005. [Online]. Available: http://cnx.org/content/ m11067/latest/., Connexions.
-
N. Kingsbury, Approximation formulae for the Gaussian error integral Q(x) Tech. Rep. m11067, Jun. 2005. [Online]. Available: http://cnx.org/content/ m11067/latest/., Connexions.
-
-
-
|