-
1
-
-
58049217400
-
-
Advanced Network Architecture Group
-
Advanced Network Architecture Group. ANA Spoofer Project. http://spoofer.csail.mit.edu/.
-
ANA Spoofer Project
-
-
-
5
-
-
58049202821
-
A Taxonomy of Botnets
-
May
-
D. Dagon, G. Gu, C. Zou, J. Grizzard, S. Dwivedi, W. Lee, and R. Lipton. A Taxonomy of Botnets. Unpublished paper, May 2005.
-
(2005)
Unpublished paper
-
-
Dagon, D.1
Gu, G.2
Zou, C.3
Grizzard, J.4
Dwivedi, S.5
Lee, W.6
Lipton, R.7
-
7
-
-
58049195641
-
Accountable Internet Protocol (AIP)
-
D Andersen, H Balakrishnan, N Feamster, T Koponen, D Moon, and S Shenker. Accountable Internet Protocol (AIP) . In Proc. of ACM SIGCOMM, 2008.
-
(2008)
Proc. of ACM SIGCOMM
-
-
Andersen, D.1
Balakrishnan, H.2
Feamster, N.3
Koponen, T.4
Moon, D.5
Shenker, S.6
-
8
-
-
21644442902
-
Improved Online/Offline Signature Schemes
-
A. Shamir and Y.Tauman. Improved Online/Offline Signature Schemes. In CRYPTO, 2001.
-
(2001)
CRYPTO
-
-
Shamir, A.1
Tauman, Y.2
-
9
-
-
38049148364
-
Efficient and Secure Source Authentication with Packet Passports
-
Xin Liu, Xiaowei Yang, David Wetherall, and Thomas Anderson. Efficient and Secure Source Authentication with Packet Passports. In SRUTI, 2006.
-
(2006)
SRUTI
-
-
Liu, X.1
Yang, X.2
Wetherall, D.3
Anderson, T.4
-
10
-
-
36949026321
-
Building an AS-Topology Model
-
Wolfgang Muhlbauer, Anja Feldmann, Olaf Maennel, Matthew Roughan, and Steve Uhlig. Building an AS-Topology Model. In ACM SIGCOMM, 2006.
-
(2006)
ACM SIGCOMM
-
-
Muhlbauer, W.1
Feldmann, A.2
Maennel, O.3
Roughan, M.4
Uhlig, S.5
-
11
-
-
34548370626
-
MIRO: Multi-path Interdomain ROuting
-
W. Xu and J. Rexford. MIRO: Multi-path Interdomain ROuting. In ACM SIGCOMM, 2006.
-
(2006)
ACM SIGCOMM
-
-
Xu, W.1
Rexford, J.2
-
13
-
-
34250699551
-
-
EBay. EBay Feedback Forum. http://pages.ebay.com/services/forum/feedback. html.
-
EBay Feedback Forum
-
-
-
14
-
-
0042349494
-
Managing and Sharing Servers' Reputations in P2P Systems
-
July/August
-
E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, and P. Samarati. Managing and Sharing Servers' Reputations in P2P Systems. In IEEE Transactions on Knowledge and Data Engineering, vol. 15, n.4, July/August 2003, pp. 840-854.
-
(2003)
IEEE Transactions on Knowledge and Data Engineering
, vol.15
, Issue.4
, pp. 840-854
-
-
Damiani, E.1
De Capitani di Vimercati, S.2
Paraboschi, S.3
Samarati, P.4
-
15
-
-
33845203069
-
A trust model of p2p system based on confirmation theory
-
January
-
M. Hou, X. Lu, X. Zhou, and C. Zhan. A trust model of p2p system based on confirmation theory. ACM SIGOPS Operating Systems Review, Volume 39 Issue 1, January 2005.
-
(2005)
ACM SIGOPS Operating Systems Review
, vol.39
, Issue.1
-
-
Hou, M.1
Lu, X.2
Zhou, X.3
Zhan, C.4
-
16
-
-
0038011186
-
A Reputation-based Approach for Choosing Reliable Resources in Peer-to-Peer Networks
-
Washington, DC, USA, November 17-21
-
E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, P. Samarati, and F. Violante. A Reputation-based Approach for Choosing Reliable Resources in Peer-to-Peer Networks. In Proc. of the 9th ACM Conference on Computer and Communications Security, Washington, DC, USA, November 17-21, 2002.
-
(2002)
Proc. of the 9th ACM Conference on Computer and Communications Security
-
-
Damiani, E.1
De Capitani di Vimercati, S.2
Paraboschi, S.3
Samarati, P.4
Violante, F.5
-
18
-
-
36949036429
-
Protecting Connection Setup from Denial-of-Capability Attacks
-
B. Parno, D. Wendland, E. Shi, A. Perrig, B. Maggs, and Y. Hu. Portcullis: Protecting Connection Setup from Denial-of-Capability Attacks. In Proceedings of the ACM SIGCOMM, 2007.
-
(2007)
Proceedings of the ACM SIGCOMM
-
-
Parno, B.1
Wendland, D.2
Shi, E.3
Perrig, A.4
Maggs, B.5
Portcullis, Y.H.6
-
20
-
-
47249136154
-
Engaging Edge Networks in Preventing and Mitigating Undesirable Network Traffic
-
L. Wang, Q. Lu, and D. Luong. Engaging Edge Networks in Preventing and Mitigating Undesirable Network Traffic. In Proc. of NPSec, 2007.
-
(2007)
Proc. of NPSec
-
-
Wang, L.1
Lu, Q.2
Luong, D.3
-
22
-
-
0001083965
-
On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets
-
K. Park and H.Lee. On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets. In Proceedings of SIGCOMM 2001.
-
(2001)
Proceedings of SIGCOMM
-
-
Park, K.1
Lee, H.2
-
23
-
-
0036349004
-
SAVE: Source Address Validity Enforcement Protocol
-
J. Li, J. Mirkovic, M. Wang, P. Reiher, and L. Zhang. SAVE: Source Address Validity Enforcement Protocol. In INFOCOM, 2002.
-
(2002)
INFOCOM
-
-
Li, J.1
Mirkovic, J.2
Wang, M.3
Reiher, P.4
Zhang, L.5
-
24
-
-
39049160574
-
-
Z. Duan, X. Yuan, and J.Chandrashekar. Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates'. Proceedings of INFOCOM'06, April 2006.
-
Z. Duan, X. Yuan, and J.Chandrashekar. Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates'. Proceedings of INFOCOM'06, April 2006.
-
-
-
-
26
-
-
3543059601
-
StackPi: A New Defense Mechanism against IP Spoofing and DDoS Attacks
-
CMU-CS-02-208, February 2003
-
A. Perrig, D. Song, and A. Yaar. StackPi: A New Defense Mechanism against IP Spoofing and DDoS Attacks. Carnegie Mellon University Technical Report, CMU-CS-02-208, February 2003.
-
Carnegie Mellon University Technical Report
-
-
Perrig, A.1
Song, D.2
Yaar, A.3
-
27
-
-
85076121327
-
An Architecture for Developing Behavioral History
-
Mark Allman, Ethan Blanton, and Vern Paxson. An Architecture for Developing Behavioral History. In Proceedings of SRUTI 2005, pp 45-51.
-
(2005)
Proceedings of SRUTI
, pp. 45-51
-
-
Allman, M.1
Blanton, E.2
Paxson, V.3
|