-
1
-
-
13244299564
-
-
RFC 3748; June
-
Aboba B, Blunk L, Vollbrecht J, Carlson J, Levkowetz H. Extensible authentication protocol (EAP), RFC 3748; June 2004.
-
(2004)
Extensible authentication protocol (EAP)
-
-
Aboba, B.1
Blunk, L.2
Vollbrecht, J.3
Carlson, J.4
Levkowetz, H.5
-
2
-
-
3042825073
-
IP traceback: a new denial-of- service deterrent
-
Aljifri H. IP traceback: a new denial-of- service deterrent. IEEE Security and Privacy (June 2003) 24-31
-
(2003)
IEEE Security and Privacy
, pp. 24-31
-
-
Aljifri, H.1
-
3
-
-
85158156788
-
-
Barford P, Crovella M. Generating representative web workloads for network and server performance evaluation. In: Proceedings of ACM SIGMETRICS, July 1998, p. 151-60.
-
Barford P, Crovella M. Generating representative web workloads for network and server performance evaluation. In: Proceedings of ACM SIGMETRICS, July 1998, p. 151-60.
-
-
-
-
5
-
-
85158079328
-
-
CERT Coordination Center
-
CERT Coordination Center. Advisories; 2007.
-
(2007)
Advisories
-
-
-
6
-
-
0036871268
-
Internet infrastructure security: a taxonomy
-
Chakrabarti A., and Manimaran G. Internet infrastructure security: a taxonomy. IEEE Network 16 6 (November 2002) 13-21
-
(2002)
IEEE Network
, vol.16
, Issue.6
, pp. 13-21
-
-
Chakrabarti, A.1
Manimaran, G.2
-
7
-
-
85158119442
-
-
ContentGuard, Inc. eXtensible rights markup language, XrML 2.0; 2001.
-
ContentGuard, Inc. eXtensible rights markup language, XrML 2.0; 2001.
-
-
-
-
8
-
-
0001939946
-
Heavy-tailed probability distributions in the world wide web
-
Chapman & Hall, New York [chapter 1]
-
Crovella M., Taqqu M., and Bestavros A. Heavy-tailed probability distributions in the world wide web. A practical guide to heavy tails (1998), Chapman & Hall, New York 3-26 [chapter 1]
-
(1998)
A practical guide to heavy tails
, pp. 3-26
-
-
Crovella, M.1
Taqqu, M.2
Bestavros, A.3
-
10
-
-
34547566649
-
High-speed dynamic packet filtering
-
Deri L. High-speed dynamic packet filtering. Journal of Network and System Management 15 3 (June 2007) 401-415
-
(2007)
Journal of Network and System Management
, vol.15
, Issue.3
, pp. 401-415
-
-
Deri, L.1
-
11
-
-
33847743856
-
Hybrid intrusion detection with weighted signature generation over anomalous internet episodes
-
Hwang K., Cai M., Chen Y., and Qin M. Hybrid intrusion detection with weighted signature generation over anomalous internet episodes. IEEE Transactions on Dependable and Secure Computing 4 1 (January-March 2007) 41-55
-
(2007)
IEEE Transactions on Dependable and Secure Computing
, vol.4
, Issue.1
, pp. 41-55
-
-
Hwang, K.1
Cai, M.2
Chen, Y.3
Qin, M.4
-
13
-
-
33749028591
-
-
Available online
-
Intrusense Packit. Network injection and capture. Available online: http://www.intrusense.com/software/packit.
-
Network injection and capture
-
-
-
15
-
-
84924375780
-
Botz-4-Sale: Surviving organized DDoS attacks that mimic flash crowds
-
Boston, MA; May
-
Kandula S, Katabi D, Jacob M, Berger A. Botz-4-Sale: surviving organized DDoS attacks that mimic flash crowds. In: Second symposium on networked systems design and implementation (NSDI), Boston, MA; May 2005.
-
(2005)
Second symposium on networked systems design and implementation (NSDI)
-
-
Kandula, S.1
Katabi, D.2
Jacob, M.3
Berger, A.4
-
16
-
-
33847303101
-
Blinc: Multilevel traffic classification in the dark
-
Philadelphia, USA, August
-
Karagiannis T, Papagiannaki K, Faloutsos M. Blinc: multilevel traffic classification in the dark. In: SIGCOMM'05, Philadelphia, USA, August 2005, vol. 35, no. 4, p. 229-40.
-
(2005)
SIGCOMM'05
, vol.35
, Issue.4
, pp. 229-240
-
-
Karagiannis, T.1
Papagiannaki, K.2
Faloutsos, M.3
-
17
-
-
8344261545
-
PacketScore: Statistics-based overload control against distributed denial of service attacks
-
Kim Y, Lau WC, Chuah MC, Chao HJ. PacketScore: statistics-based overload control against distributed denial of service attacks. In: Proceedings of INFOCOM; 2004.
-
(2004)
Proceedings of INFOCOM
-
-
Kim, Y.1
Lau, W.C.2
Chuah, M.C.3
Chao, H.J.4
-
20
-
-
85158123980
-
-
Mirkovic J, Prier G, Reiher P. Attacking DDoS at the source. In: Proceedings of 10th IEEE international conference on network protocols, November 2002, pp. 312-21.
-
Mirkovic J, Prier G, Reiher P. Attacking DDoS at the source. In: Proceedings of 10th IEEE international conference on network protocols, November 2002, pp. 312-21.
-
-
-
-
24
-
-
85158113972
-
-
OASIS. Assertions and protocols for the OASIS security assertion markup language (SAML) V2.0; March 2005.
-
OASIS. Assertions and protocols for the OASIS security assertion markup language (SAML) V2.0; March 2005.
-
-
-
-
25
-
-
85158083183
-
-
OASIS. eXtensible access control markup language (XACML) version 2.0; February 2005
-
OASIS. eXtensible access control markup language (XACML) version 2.0; February 2005.
-
-
-
-
26
-
-
85158115712
-
-
Oasis. XACML v3.0 administrative policy, working draft; December 2005.
-
Oasis. XACML v3.0 administrative policy, working draft; December 2005.
-
-
-
-
28
-
-
84942253601
-
Cossack: Coordinated suppression of simultaneous attacks
-
Papadopoulos C, Lindell R, Mehringer J, Hussain A, Govindan R. Cossack: coordinated suppression of simultaneous attacks. In: Proceedings of DISCEX III; 2003, p. 2-13.
-
(2003)
Proceedings of DISCEX
, vol.3
, pp. 2-13
-
-
Papadopoulos, C.1
Lindell, R.2
Mehringer, J.3
Hussain, A.4
Govindan, R.5
-
29
-
-
85158133476
-
-
PCAP Public Repository. Available online
-
PCAP Public Repository. Available online: http://wwwnrg.ee.lbl.gov.
-
-
-
-
30
-
-
34147099073
-
Survey of network-based defense mechanisms countering the DoS and DDoS problems
-
Peng T., Leckie C., and Ramamohanarao K. Survey of network-based defense mechanisms countering the DoS and DDoS problems. ACM Computing Surveys 39 1 (April 2007)
-
(2007)
ACM Computing Surveys
, vol.39
, Issue.1
-
-
Peng, T.1
Leckie, C.2
Ramamohanarao, K.3
-
32
-
-
38049136694
-
Packet capture in 10-Gigabit ethernet environments using contemporary commodity hardware
-
p. 207-17
-
Schneider F., Wallerich J., and Feldmann A. Packet capture in 10-Gigabit ethernet environments using contemporary commodity hardware. Lecture notes in computer science vol. 4427 (2007) p. 207-17
-
(2007)
Lecture notes in computer science
, vol.4427
-
-
Schneider, F.1
Wallerich, J.2
Feldmann, A.3
-
35
-
-
85158076206
-
-
Shannon C, Moore D, Aben E. The CAIDA backscatter 2004-2005, IDA's Network Telescope. Available online: http://www.caida.org/data/passive/backscatter_2004_2005_dataset.xml.
-
Shannon C, Moore D, Aben E. The CAIDA backscatter 2004-2005, IDA's Network Telescope. Available online: http://www.caida.org/data/passive/backscatter_2004_2005_dataset.xml.
-
-
-
-
36
-
-
35148882671
-
Network intrusion detection through adaptive sub-eigenspace modeling in multiagent systems
-
Shyu M.-L., Quirino T., Xie Z., Chen S.-C., and Chang L. Network intrusion detection through adaptive sub-eigenspace modeling in multiagent systems. ACM Transactions on Autonomous and Adaptive Systems 2 (September 2007)
-
(2007)
ACM Transactions on Autonomous and Adaptive Systems
, vol.2
-
-
Shyu, M.-L.1
Quirino, T.2
Xie, Z.3
Chen, S.-C.4
Chang, L.5
-
40
-
-
33750711125
-
Profiling internet backbone traffic: Behavior models and applications
-
Philadelphia, USA, August
-
Xu K, Zhang Z-L, Bhattacharyya S. Profiling internet backbone traffic: behavior models and applications. In: SIGCOMM'05, Philadelphia, USA, August 2005, p. 169-80.
-
(2005)
SIGCOMM'05
, pp. 169-180
-
-
Xu, K.1
Zhang, Z.-L.2
Bhattacharyya, S.3
-
42
-
-
33845409757
-
A distributed agent-based approach to intrusion detection using the lightweight PCC anomaly detection classifier
-
Xie Z, Quirino T, Shyu M-L, Chen S-C, Chang L. A distributed agent-based approach to intrusion detection using the lightweight PCC anomaly detection classifier. In: Proceedings of the IEEE international conference on sensor networks, ubiquitous, and trustworthy computing; 2006.
-
(2006)
Proceedings of the IEEE international conference on sensor networks, ubiquitous, and trustworthy computing
-
-
Xie, Z.1
Quirino, T.2
Shyu, M.-L.3
Chen, S.-C.4
Chang, L.5
|