-
1
-
-
3042617182
-
A quantitative study of firewall configuration errors
-
Jun
-
A. Wool, "A quantitative study of firewall configuration errors," IEEE Computer, vol. 37, no. 6, pp. 62-67, Jun. 2004.
-
(2004)
IEEE Computer
, vol.37
, Issue.6
, pp. 62-67
-
-
Wool, A.1
-
2
-
-
84894553762
-
Detecting BGP configuration faults with static analysis
-
Boston, MA, May, online
-
N. Feamster and H. Balakrishnan, "Detecting BGP configuration faults with static analysis," in Proc. NSDI, Boston, MA, May 2005, online.
-
(2005)
Proc. NSDI
-
-
Feamster, N.1
Balakrishnan, H.2
-
3
-
-
14344266667
-
Understanding BGP misconfiguration
-
Pittsburgh, PA, Aug
-
R. Mahajan, D. Wetherall, and T. Anderson, "Understanding BGP misconfiguration," in Proc. ACM SIGCOMM, Pittsburgh, PA, Aug. 2002, pp. 3-16.
-
(2002)
Proc. ACM SIGCOMM
, pp. 3-16
-
-
Mahajan, R.1
Wetherall, D.2
Anderson, T.3
-
4
-
-
61449114482
-
-
B. J. P. Alin, C. Popescu, and T. Underwood, Anatomy of a leak: AS9121 (or, How we learned to start worrying and hate maximum prefix limits), presented at the NANOG34 Meeting, Seattle, WA, May 2005.
-
B. J. P. Alin, C. Popescu, and T. Underwood, "Anatomy of a leak: AS9121 (or, "How we learned to start worrying and hate maximum prefix limits")," presented at the NANOG34 Meeting, Seattle, WA, May 2005.
-
-
-
-
5
-
-
0035439338
-
IP network configuration for intradomain traffic engineering
-
Sep./Oct
-
A. Feldmann and J. Rexford, "IP network configuration for intradomain traffic engineering," IEEE Network, vol. 15, no. 5, pp. 46-57, Sep./Oct. 2001.
-
(2001)
IEEE Network
, vol.15
, Issue.5
, pp. 46-57
-
-
Feldmann, A.1
Rexford, J.2
-
6
-
-
33751065316
-
The cutting EDGE of IP router configuration
-
presented at the, Cambridge, MA, Nov
-
D. Caldwell, A. Gilbert, J. Gottlieb, A. Greenberg, G. Hjalmtysson, and J. Rexford, "The cutting EDGE of IP router configuration," presented at the ACM SIGCOMM HotNets-II Workshop, Cambridge, MA, Nov. 2003.
-
(2003)
ACM SIGCOMM HotNets-II Workshop
-
-
Caldwell, D.1
Gilbert, A.2
Gottlieb, J.3
Greenberg, A.4
Hjalmtysson, G.5
Rexford, J.6
-
7
-
-
34248329456
-
-
Online, Available
-
The Router Audit Tool (RAT). [Online]. Available: http:// www.cisecurity.org/bench cisco.html
-
The Router Audit Tool (RAT)
-
-
-
8
-
-
29244491977
-
Bayesian detection of router configuration anomalies
-
presented at the, Philadelphia, PA, Aug
-
K. El-Arini and K. Killourhy, "Bayesian detection of router configuration anomalies," presented at the ACM SIGCOMM Workshop on Mining Network Data (MineNet'05), Philadelphia, PA, Aug. 2005.
-
(2005)
ACM SIGCOMM Workshop on Mining Network Data (MineNet'05)
-
-
El-Arini, K.1
Killourhy, K.2
-
9
-
-
21844460043
-
Routing design in operational networks: A look from the inside
-
Portland, OR, Aug
-
D. Maltz, G. Xie, J. Zhan, H. Zhang, G. Hjalmtysson, and A. Greenberg, "Routing design in operational networks: A look from the inside," in Proc. ACM SIGCOMM, Portland, OR, Aug. 2004, pp. 27-40.
-
(2004)
Proc. ACM SIGCOMM
, pp. 27-40
-
-
Maltz, D.1
Xie, G.2
Zhan, J.3
Zhang, H.4
Hjalmtysson, G.5
Greenberg, A.6
-
11
-
-
25844500375
-
On static reachability analysis of IP networks
-
Miami, FL, May
-
G. G. Xie, J. Zhan, D. A. Maltz, H. Zhang, A. Greenberg, G. Hjalmtysson, and J. Rexford, "On static reachability analysis of IP networks," in Proc. IEEE INFOCOM, Miami, FL, May 2005, pp. 2170-2183.
-
(2005)
Proc. IEEE INFOCOM
, pp. 2170-2183
-
-
Xie, G.G.1
Zhan, J.2
Maltz, D.A.3
Zhang, H.4
Greenberg, A.5
Hjalmtysson, G.6
Rexford, J.7
-
12
-
-
0027621699
-
Mining association rules between sets of items in large databases
-
Washington, DC, May
-
R. Agrawal, T. Imielinski, and A. Swami, "Mining association rules between sets of items in large databases," in Proc. ACM SIGMOD Int. Conf. Management of Data, Washington, DC, May 1993, pp. 207-216.
-
(1993)
Proc. ACM SIGMOD Int. Conf. Management of Data
, pp. 207-216
-
-
Agrawal, R.1
Imielinski, T.2
Swami, A.3
-
13
-
-
33745299085
-
LCM ver.2: Efficient mining algorithms for frequent/closed/maximal itemsets
-
presented at the, Brighton, U.K, Nov
-
T. Uno, M. Kiyomi, and H. Arimura, "LCM ver.2: Efficient mining algorithms for frequent/closed/maximal itemsets," presented at the IEEE Int. Conf. Data Mining (ICDM'04) Workshop on Frequent Itemset Mining Implementations (FIMI'04), Brighton, U.K., Nov. 2004.
-
(2004)
IEEE Int. Conf. Data Mining (ICDM'04) Workshop on Frequent Itemset Mining Implementations (FIMI'04)
-
-
Uno, T.1
Kiyomi, M.2
Arimura, H.3
-
14
-
-
61449110705
-
-
Common Information Model (CIM) Standards, Distributed Management Task Force, Inc. [Online]. Available: http://www.dmtf.org/standards/cim/
-
Common Information Model (CIM) Standards, Distributed Management Task Force, Inc. [Online]. Available: http://www.dmtf.org/standards/cim/
-
-
-
-
15
-
-
61449242468
-
-
Cisco Netsys Connectivity Service Manager, San Jose, CA [Online, Available
-
Cisco Netsys Connectivity Service Manager. Cisco, San Jose, CA [Online]. Available: www.cisco.com
-
Cisco
-
-
-
16
-
-
0003250778
-
Bugs as inconsistent behavior: A general approach to inferring errors in systems code
-
presented at the, Banff, Canada, Oct
-
D. Engler, D. Y. Chen, and A. Chou, "Bugs as inconsistent behavior: A general approach to inferring errors in systems code," presented at the 18th ACMSymp. Operating Systems Principles (SOSP'01), Banff, Canada, Oct. 2001.
-
(2001)
18th ACMSymp. Operating Systems Principles (SOSP'01)
-
-
Engler, D.1
Chen, D.Y.2
Chou, A.3
-
17
-
-
0033873349
-
Internet traffic engineering by optimizing OSPF weights
-
Tel Aviv, Israel, Mar
-
B. Fortz and M. Thorup, "Internet traffic engineering by optimizing OSPF weights," in Proc. IEEE INFOCOM, Tel Aviv, Israel, Mar. 2000, pp. 519-528.
-
(2000)
Proc. IEEE INFOCOM
, pp. 519-528
-
-
Fortz, B.1
Thorup, M.2
|