-
1
-
-
0141650540
-
Analyzing peer-to-peer traffic across large networks
-
Marseilles, France, Nov
-
S. Sen and J. Wang. "Analyzing peer-to-peer traffic across large networks," 2002 ACM SIGCOMM Internet Measurement Workshop, Marseilles, France, Nov. 2002.
-
(2002)
2002 ACM SIGCOMM Internet Measurement Workshop
-
-
Sen, S.1
Wang, J.2
-
2
-
-
21644443485
-
Measurement, modeling, and analysis of a peer-to-peer Filesharing workload
-
October
-
K. P. Gummadi, R. J. Dunn, S. Saroiu, S. D. Gribble, H. M. Levy, and J. Zahorjan. "Measurement, modeling, and analysis of a peer-to-peer Filesharing workload," 19th ACM Symposium on Operating Systems Principles (SOSP-19), October 2003.
-
(2003)
19th ACM Symposium on Operating Systems Principles (SOSP-19)
-
-
Gummadi, K.P.1
Dunn, R.J.2
Saroiu, S.3
Gribble, S.D.4
Levy, H.M.5
Zahorjan, J.6
-
3
-
-
19944406146
-
Accurate, Scalable In-Network Identification of P2P Traffic Using Application Signatures
-
Subhabrata Sen, Oliver Spatscheck, Dongmei Wang. "Accurate, Scalable In-Network Identification of P2P Traffic Using Application Signatures," WWW 2004 Conference.
-
WWW 2004 Conference
-
-
Sen, S.1
Spatscheck, O.2
Wang, D.3
-
4
-
-
85084163246
-
Autograph: Toward automated, distributed worm signature detection
-
H. Kim, B. Karp. "Autograph: Toward automated, distributed worm signature detection," 13th Usenix Security Symposium, 2004.
-
(2004)
13th Usenix Security Symposium
-
-
Kim, H.1
Karp, B.2
-
6
-
-
14844309952
-
The EarlyBird System for Real-time Detection of Unknown Worms
-
CS2003-0761, August
-
Sumeet Singh, Cristian Estan, George Varghese and Stefan Savage. "The EarlyBird System for Real-time Detection of Unknown Worms", UCSD Tech Report CS2003-0761, August 2003.
-
(2003)
UCSD Tech Report
-
-
Singh, S.1
Estan, C.2
Varghese, G.3
Savage, S.4
-
7
-
-
51849115537
-
Comparison of Three Sliding-Window Based Worm Signature Generation Schemes,
-
Technical Report LU-CSE-05-025
-
W. Scheirer, M. Chuah. "Comparison of Three Sliding-Window Based Worm Signature Generation Schemes," Technical Report LU-CSE-05-025.
-
-
-
Scheirer, W.1
Chuah, M.2
-
9
-
-
33947661442
-
A Hybrid Approach for Accurate Application Traffic Identification
-
Vancouver, April
-
Young J. Won, Byung-Chul Park, Hong-Taek Ju, Myung-Sup Kim, and James W. Hong. "A Hybrid Approach for Accurate Application Traffic Identification," IEEE/IFIP E2EMON Workshop, Vancouver, April 2006, pp. 1-8.
-
(2006)
IEEE/IFIP E2EMON Workshop
, pp. 1-8
-
-
Won, Y.J.1
Park, B.-C.2
Ju, H.-T.3
Kim, M.-S.4
Hong, J.W.5
-
10
-
-
51849123744
-
-
Winpcap. http://www.winpcap.org/.
-
Winpcap
-
-
-
11
-
-
0004116989
-
-
2nd Edition, MIT Press
-
Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, and Clifford Stein, Introduction to Algorithms, 2nd Edition, MIT Press, 2001.
-
(2001)
Introduction to Algorithms
-
-
Cormen, T.H.1
Leiserson, C.E.2
Rivest, R.L.3
Stein, C.4
-
12
-
-
33751056900
-
Towards Automatic Generation of Vulnerability Signatures
-
May
-
David Brumley, James Newsome, Dawn Song, Hao Wang, and Somesh Jha. "Towards Automatic Generation of Vulnerability Signatures," IEEE Symposium on Security and Privacy, May 2006.
-
(2006)
IEEE Symposium on Security and Privacy
-
-
Brumley, D.1
Newsome, J.2
Song, D.3
Wang, H.4
Jha, S.5
-
14
-
-
27544444280
-
Dynamic Taint Analysis: Automatic Detection, Analysis, and Signature Generation of Exploit Attacks on Commodity Software
-
Feb
-
James Newsome and Dawn Song. "Dynamic Taint Analysis: Automatic Detection, Analysis, and Signature Generation of Exploit Attacks on Commodity Software," Network and Distributed Systems Security Symposium, Feb 2005.
-
(2005)
Network and Distributed Systems Security Symposium
-
-
Newsome, J.1
Song, D.2
-
15
-
-
34748815708
-
Analysis and Signature of Skype VoIP Session Traffic,
-
NGNI-SKYPE-06b, Berlin, Germany, July
-
Sven Ehlert and Sandrine Petgang, "Analysis and Signature of Skype VoIP Session Traffic," Franunhofer FOKUS Technical Report NGNI-SKYPE-06b, Berlin, Germany, July, 2006.
-
(2006)
Franunhofer FOKUS Technical Report
-
-
Ehlert, S.1
Petgang, S.2
-
16
-
-
38049121051
-
-
Laurent Bernaille and Renata Teixeira, Early Recognition of Encrypted Applications, PAM 2007, Louvain-la-neuve, Belgium, April 5-6, 2007, pp. 165-175.
-
Laurent Bernaille and Renata Teixeira, "Early Recognition of Encrypted Applications," PAM 2007, Louvain-la-neuve, Belgium, April 5-6, 2007, pp. 165-175.
-
-
-
|