-
1
-
-
51849089852
-
-
Processor
-
Intel Corporation. Intel Pentium 4 Processor, http://www.intel.com/ products/processor/pentium4/index.htm.
-
Intel Pentium
, vol.4
-
-
-
2
-
-
51849109174
-
-
Intel Corporation. The Intel Core Duo Processor
-
Intel Corporation. The Intel Core Duo Processor.
-
-
-
-
3
-
-
51849101757
-
-
Advanced Micro Devices. AMD Athlon 64 X2 Dual Core Processor, http://www.amd.com/us-en/processors/productinformation/0,30_118_9485_13041,00. html.
-
Advanced Micro Devices. AMD Athlon 64 X2 Dual Core Processor, http://www.amd.com/us-en/processors/productinformation/0,30_118_9485_13041,00. html.
-
-
-
-
4
-
-
70449121907
-
Robust TCP Stream Reassembly in the Presence of Adversaries
-
August
-
Sarang Dharmapurikar and Vern Paxson. Robust TCP Stream Reassembly in the Presence of Adversaries. In USENIX Security Symposium, August 2005.
-
(2005)
USENIX Security Symposium
-
-
Dharmapurikar, S.1
Paxson, V.2
-
5
-
-
85077692116
-
Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection
-
Holger Dreger, Anja Feldmann, Michael Mai, Vern Paxson, and Robin Sommer. Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection. In USENIX Security Symposium, 2006.
-
(2006)
USENIX Security Symposium
-
-
Dreger, H.1
Feldmann, A.2
Mai, M.3
Paxson, V.4
Sommer, R.5
-
6
-
-
85088734467
-
A behavioral approach to worm, detection
-
D. Ellis, J. Aiken, K. Attwood, and S. Tenaglia. A behavioral approach to worm, detection. In Workshop on Rapid Malcode, 2003.
-
(2003)
Workshop on Rapid Malcode
-
-
Ellis, D.1
Aiken, J.2
Attwood, K.3
Tenaglia, S.4
-
7
-
-
54949143059
-
The HTX-Board: A Rapid Prototyping Station
-
H. Froning, M. Nussle, D. Slogsnat, H. Litz, and U Bruning. The HTX-Board: A Rapid Prototyping Station. In 3rd annual FPGAWorld Conference, 2006.
-
(2006)
3rd annual FPGAWorld Conference
-
-
Froning, H.1
Nussle, M.2
Slogsnat, D.3
Litz, H.4
Bruning, U.5
-
8
-
-
85084160972
-
Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics
-
Mark Handley, Vern Paxson, and Christian Kreibich. Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics. In Proceedings of the 10th USENIX Security Symposium, 2001.
-
(2001)
Proceedings of the 10th USENIX Security Symposium
-
-
Handley, M.1
Paxson, V.2
Kreibich, C.3
-
12
-
-
33645793950
-
Implementation of a Content-Scanning Module for an Internet Firewall
-
Napa, CA, USA, April
-
James Moscola, John Lockwood, Ronald Loui, and Michael Pachos. Implementation of a Content-Scanning Module for an Internet Firewall. In Proceedings of IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM), pages 31-38, Napa, CA, USA, April 2003.
-
(2003)
Proceedings of IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM)
, pp. 31-38
-
-
Moscola, J.1
Lockwood, J.2
Loui, R.3
Pachos, M.4
-
13
-
-
85091893445
-
Rethinking hardware support for network analysis and intrusion prevention
-
August
-
V. Paxson, K. Asanovic, S. Dharmapurikar, J. Lockwood, R. Pang, R. Sommer, and N. Weaver. Rethinking hardware support for network analysis and intrusion prevention. In Proceedings of the USENIX Hot Security Workshop, August 2006.
-
(2006)
Proceedings of the USENIX Hot Security Workshop
-
-
Paxson, V.1
Asanovic, K.2
Dharmapurikar, S.3
Lockwood, J.4
Pang, R.5
Sommer, R.6
Weaver, N.7
-
14
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
Vern Paxson. Bro: a system for detecting network intruders in real-time. Computer Networks, 31(23-24):2435-2463, 1999.
-
(1999)
Computer Networks
, vol.31
, Issue.23-24
, pp. 2435-2463
-
-
Paxson, V.1
-
15
-
-
51849163026
-
-
Thomas H. Ptacek and Timothy N. Newsham. Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection. Technical report, Secure Networks, Inc., January 1998.
-
Thomas H. Ptacek and Timothy N. Newsham. Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection. Technical report, Secure Networks, Inc., January 1998.
-
-
-
-
21
-
-
8344251916
-
Deterministic memory-efficient string matching algorithms for intrusion detection
-
Hong Kong, China, March
-
Nathan Tuck, Timothy Sherwood, Brad Calder, and George Varghese. Deterministic memory-efficient string matching algorithms for intrusion detection. In IEEE Infocom, Hong Kong, China, March 2004.
-
(2004)
IEEE Infocom
-
-
Tuck, N.1
Sherwood, T.2
Calder, B.3
Varghese, G.4
|