-
1
-
-
69649094907
-
Full Packet Capture and Offline Analysis on 1 and 10 Gb/s Networks
-
Tech. Rep. HPL-2006-156, HP Labs, 2006
-
ANDERSON, E., AND ARLITT, M. Full Packet Capture and Offline Analysis on 1 and 10 Gb/s Networks. Tech. Rep. HPL-2006-156, HP Labs, 2006.
-
-
-
ANDERSON, E.1
ARLITT, M.2
-
2
-
-
0036916125
-
Cryptographic Wiretapping at 100 Megabits
-
ANTONELLI, C., CO, K., M FIELDS, AND HONEYMAN, P. Cryptographic Wiretapping at 100 Megabits. In SPIE 16th Int. Symp. on Aerospace Defense Sensing, Simulation, and Controls. (2002).
-
(2002)
SPIE 16th Int. Symp. on Aerospace Defense Sensing, Simulation, and Controls
-
-
ANTONELLI, C.1
CO, K.2
FIELDS, M.3
HONEYMAN, P.4
-
3
-
-
80051948268
-
Remembrance of Streams Past: Overload-sensitive Management of Archived Streams
-
CHANDRASEKARAN, S., AND FRANKLIN, M. Remembrance of Streams Past: Overload-sensitive Management of Archived Streams. In Proc. Very Large Data Bases (2004).
-
(2004)
Proc. Very Large Data Bases
-
-
CHANDRASEKARAN, S.1
FRANKLIN, M.2
-
6
-
-
84868933886
-
-
CoMo. http://como.sourceforge.net.
-
CoMo
-
-
-
7
-
-
34248347916
-
Resource-aware Multi-format Network Security Data Storage
-
COOKE, E., MYRICK, A., RUSEK, D., AND JAHANIAN, F. Resource-aware Multi-format Network Security Data Storage. In Proc. SIGCOMM LSAD workshop (2006).
-
(2006)
Proc. SIGCOMM LSAD workshop
-
-
COOKE, E.1
MYRICK, A.2
RUSEK, D.3
JAHANIAN, F.4
-
8
-
-
65249179384
-
-
CRANOR, C., JOHNSON, T., AND SPATSCHECK, O. Gigascope: A Stream Database for Network Applications. In Proc. SIGMOD (2003).
-
CRANOR, C., JOHNSON, T., AND SPATSCHECK, O. Gigascope: A Stream Database for Network Applications. In Proc. SIGMOD (2003).
-
-
-
-
10
-
-
14844312929
-
Operational Experiences with High-Volume Network Intrusion Detection
-
DREGER, H., FELDMANN, A., PAXSON, V., AND SOMMER, R. Operational Experiences with High-Volume Network Intrusion Detection. In Proc. 11th ACM Conf. on Comp. and Comm. Security (2004).
-
(2004)
Proc. 11th ACM Conf. on Comp. and Comm. Security
-
-
DREGER, H.1
FELDMANN, A.2
PAXSON, V.3
SOMMER, R.4
-
11
-
-
84978401615
-
ReVirt: Enabling Intrusion Analysis through Virtual-Machine Logging and Replay
-
DUNLAP, G. W., KING, S. T., CINAR, S., BASRAI, M. A., AND CHEN, P. M. ReVirt: Enabling Intrusion Analysis through Virtual-Machine Logging and Replay. In Proc. Symp. on Operating Systems Design and Implementation (2002).
-
(2002)
Proc. Symp. on Operating Systems Design and Implementation
-
-
DUNLAP, G.W.1
KING, S.T.2
CINAR, S.3
BASRAI, M.A.4
CHEN, P.M.5
-
12
-
-
65249164757
-
-
ENDACE MEASUREMENT SYSTEMS. http://www.endace.com/, 2008.
-
ENDACE MEASUREMENT SYSTEMS. http://www.endace.com/, 2008.
-
-
-
-
13
-
-
67650317025
-
-
GONZALEZ, J. M., PAXSON, V., AND WEAVER, N. Shunting: A Hardware/Software Architecture for Flexible, High-performance Network Intrusion Prevention. In Proc. 14th ACM Conf. on Comp, and Comm. Security (2007).
-
GONZALEZ, J. M., PAXSON, V., AND WEAVER, N. Shunting: A Hardware/Software Architecture for Flexible, High-performance Network Intrusion Prevention. In Proc. 14th ACM Conf. on Comp, and Comm. Security (2007).
-
-
-
-
15
-
-
84878718671
-
Building a Time Machine for Efficient Recording and Retrieval of High-Volume Network Traffic (Short Paper)
-
KORNEXL, S., PAXSON, V., DREGER, H., FELDMANN, A., AND SOMMER, R. Building a Time Machine for Efficient Recording and Retrieval of High-Volume Network Traffic (Short Paper). In Proc. ACM SIGCOMM IMC (2005).
-
(2005)
Proc. ACM SIGCOMM IMC
-
-
KORNEXL, S.1
PAXSON, V.2
DREGER, H.3
FELDMANN, A.4
SOMMER, R.5
-
17
-
-
0030384024
-
On the Relationship Between File Sizes, Transport Protocols, and Self-similar Network Traffic
-
PARK, K., KIM, G., AND CROVELLA, M. On the Relationship Between File Sizes, Transport Protocols, and Self-similar Network Traffic. In Proc. ICNP '96 (1996).
-
(1996)
Proc. ICNP '96
-
-
PARK, K.1
KIM, G.2
CROVELLA, M.3
-
18
-
-
0033295259
-
-
PAXSON, V. Bro: A System for Detecting Network Intruders in Real-Time. Comp. Networks 31, 23-24 (1999).
-
PAXSON, V. Bro: A System for Detecting Network Intruders in Real-Time. Comp. Networks 31, 23-24 (1999).
-
-
-
-
20
-
-
77952345662
-
Highly Efficient Techniques for Network Forensics
-
PONEC, M., GIURA, P., BRÖNNIMANN, H., AND WEIN, J. Highly Efficient Techniques for Network Forensics. In Proc. 14th ACM Conf. on Comp, and Comm. Security (2007).
-
(2007)
Proc. 14th ACM Conf. on Comp, and Comm. Security
-
-
PONEC, M.1
GIURA, P.2
BRÖNNIMANN, H.3
WEIN, J.4
-
21
-
-
46649089153
-
Enabling Real-Time Querying of Live and Historical Stream Data
-
REISS, F., STOCKINGER, K., WU, K., SHOSHANI, A., AND HELLERSTEIN, J. M. Enabling Real-Time Querying of Live and Historical Stream Data. In Proc. Statistical & Scientific Database Management (2007).
-
(2007)
Proc. Statistical & Scientific Database Management
-
-
REISS, F.1
STOCKINGER, K.2
WU, K.3
SHOSHANI, A.4
HELLERSTEIN, J.M.5
-
23
-
-
84868928777
-
-
SHANMUGASUNDARAM, K., MEMON, N., SAVANT, A., AND BRÖNNIMANN, H. ForNet: A Distributed Forensics Network. In Proc. Workshop on Math. Methods, Models and Architectures for Comp. Networks Security (2003).
-
SHANMUGASUNDARAM, K., MEMON, N., SAVANT, A., AND BRÖNNIMANN, H. ForNet: A Distributed Forensics Network. In Proc. Workshop on Math. Methods, Models and Architectures for Comp. Networks Security (2003).
-
-
-
-
26
-
-
65249090163
-
The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware
-
VALLENTIN, M., SOMMER, R., LEE, J., LERES, C., PAXSON, V., AND TIERNEY, B. The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware. In Proc. 10th Int. Symp. Recent Advances in Intrusion Detection (RAID) (2007).
-
(2007)
Proc. 10th Int. Symp. Recent Advances in Intrusion Detection (RAID)
-
-
VALLENTIN, M.1
SOMMER, R.2
LEE, J.3
LERES, C.4
PAXSON, V.5
TIERNEY, B.6
-
27
-
-
33645753533
-
A Methodology for Studying Persistency Aspects of Internet Flows
-
Apr
-
WALLERICH, J., DREGER, H., FELDMANN, A., KRISHNAMURTHY, B., AND WILLINGER, W. A Methodology for Studying Persistency Aspects of Internet Flows. ACM SIGCOMM CCR 35, 2 (Apr 2005), 23-36.
-
(2005)
ACM SIGCOMM CCR
, vol.35
, Issue.2
, pp. 23-36
-
-
WALLERICH, J.1
DREGER, H.2
FELDMANN, A.3
KRISHNAMURTHY, B.4
WILLINGER, W.5
|