-
3
-
-
84958977733
-
Multiscale stepping-stone detection: Detecting pairs of jittered interactive streams by exploiting maximum tolerable delay
-
D. Donoho, A. Flesia, U. Shankar, V. Paxson, J. Coit, and S. Staniford, "Multiscale stepping-stone detection: Detecting pairs of jittered interactive streams by exploiting maximum tolerable delay," in 5th International Symposium on Recent Advances in Intrusion Detection, Lecture Notes in Computer Science 2516, 2002.
-
(2002)
5th International Symposium on Recent Advances in Intrusion Detection, Lecture Notes in Computer Science
, vol.2516
-
-
Donoho, D.1
Flesia, A.2
Shankar, U.3
Paxson, V.4
Coit, J.5
Staniford, S.6
-
4
-
-
2442556704
-
Robust correlation of encrypted attack traffic through stepping stones by manipulation of inter-packet delays
-
X. Wang and D. Reeves, "Robust correlation of encrypted attack traffic through stepping stones by manipulation of inter-packet delays," in Proc. of the 2003 ACM Conference on Computer and Communications Security, pp. 20-29, 2003.
-
(2003)
Proc. of the 2003 ACM Conference on Computer and Communications Security
, pp. 20-29
-
-
Wang, X.1
Reeves, D.2
-
5
-
-
33745802064
-
Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds
-
Sophia Antipolis, French Riviera, France, September
-
A. Blum, D. Song, and S. Venkataraman, "Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds," in Conference of Recent Advance in Intrusion Detection (RAID), (Sophia Antipolis, French Riviera, France), September 2004.
-
(2004)
Conference of Recent Advance in Intrusion Detection (RAID)
-
-
Blum, A.1
Song, D.2
Venkataraman, S.3
-
6
-
-
85116427392
-
Active Timing-Based Correlation of Perturbed Traffic Flows with Chaff Packets
-
Columbus, OH, pp, June
-
P. Peng, P. Ning, D. Reeves, and X. Wang, "Active Timing-Based Correlation of Perturbed Traffic Flows with Chaff Packets," in Proc. 25th IEEE International Conference on Distributed Computing Systems Workshops, (Columbus, OH), pp. 107-113, June 2005.
-
(2005)
Proc. 25th IEEE International Conference on Distributed Computing Systems Workshops
, pp. 107-113
-
-
Peng, P.1
Ning, P.2
Reeves, D.3
Wang, X.4
-
7
-
-
50249171389
-
Stepping Stone Attack Attribution in Non-cooperative IP Networks
-
Phoenix, AZ, April
-
L. Zhang, A. Persaud, A. Johson, and Y. Guan, "Stepping Stone Attack Attribution in Non-cooperative IP Networks," in Proc. of the 25th IEEE International Performance Computing and Communications Conference (IPCCC 2006), (Phoenix, AZ), April 2006.
-
(2006)
Proc. of the 25th IEEE International Performance Computing and Communications Conference (IPCCC 2006)
-
-
Zhang, L.1
Persaud, A.2
Johson, A.3
Guan, Y.4
-
8
-
-
44049102446
-
Detecting Information Flows: Improving Chaff Tolerance by Joint Detection
-
Baltimore, MD, March
-
T. He and L. Tong, "Detecting Information Flows: Improving Chaff Tolerance by Joint Detection," in Proc. 2007 Conference on Information Sciences and Systems, (Baltimore, MD), March 2007.
-
(2007)
Proc. 2007 Conference on Information Sciences and Systems
-
-
He, T.1
Tong, L.2
-
9
-
-
0032182895
-
Statistical inference under multiterminal data compression
-
Oct
-
T. S. Han and S. Amari, "Statistical inference under multiterminal data compression," IEEE Trans. Inform. Theory, vol. 44, pp. 2300-2324, Oct. 1998.
-
(1998)
IEEE Trans. Inform. Theory
, vol.44
, pp. 2300-2324
-
-
Han, T.S.1
Amari, S.2
-
10
-
-
0016036648
-
Information Rates and Data-Compression Schemes for Pois-son Processes
-
March
-
I. Rubin, "Information Rates and Data-Compression Schemes for Pois-son Processes," IEEE Transactions on Information Theory, vol. 20, pp. 200-210, March 1974.
-
(1974)
IEEE Transactions on Information Theory
, vol.20
, pp. 200-210
-
-
Rubin, I.1
-
11
-
-
0029706861
-
The Exponential Distribution in Information Theory
-
S. Verdú, "The Exponential Distribution in Information Theory," Problems of Information Transmission, vol. 32, no. 1, pp. 86-95, 1996.
-
(1996)
Problems of Information Transmission
, vol.32
, Issue.1
, pp. 86-95
-
-
Verdú, S.1
-
13
-
-
50249147432
-
Distributed Detection of Information Flows,
-
Tech. Rep. ACSP-TR-04-07-01, April
-
T. He and L. Tong, "Distributed Detection of Information Flows," Tech. Rep. ACSP-TR-04-07-01, Cornell University, April 2007. http://acsp.ece.Cornell.edu/pubR.html.
-
(2007)
-
-
He, T.1
Tong, L.2
-
15
-
-
34748869766
-
Approximation formulae for the Gaussian error integral Q(x),
-
1067, Connexions, June 2005
-
N. Kingsbury, "Approximation formulae for the Gaussian error integral Q(x)," Tech. Rep. ml 1067, Connexions, June 2005. http://cnx.org/content/m11067/latest/.
-
Tech. Rep. ml
-
-
Kingsbury, N.1
|