-
1
-
-
42149134786
-
A brief history of scanning
-
San Diego, California, USA, Oct
-
M. Allman, V. Paxson, and J. Terrell, "A brief history of scanning," Proceedings of Internet Measurement Conference (IMC07), pp. 77-82, San Diego, California, USA, Oct. 2007.
-
(2007)
Proceedings of Internet Measurement Conference (IMC07)
, pp. 77-82
-
-
Allman, M.1
Paxson, V.2
Terrell, J.3
-
3
-
-
33750309882
-
An analysis of the Skype peer-to-peer internet telephony protocol
-
Barcelona, Spain, Apr.
-
S. A. Baset and H. Schulzrinne, "An analysis of the Skype peer-to-peer internet telephony protocol," Proceedings of INFOCOM'06, pp. 1-11, Barcelona, Spain, Apr. 2006.
-
(2006)
Proceedings of INFOCOM'06
, pp. 1-11
-
-
Baset, S.A.1
Schulzrinne, H.2
-
4
-
-
0036088611
-
Analysis of distributed intrusion detection systems using Bayesian methods
-
Apr.
-
D. J. Burroughs, L. F. Wilson, and G. V. Cybenko, "Analysis of distributed intrusion detection systems using Bayesian methods," Proceedings of IEEE International Performance Computing and Communication Conference, pp. 329-334, Apr. 2002.
-
(2002)
Proceedings of IEEE International Performance Computing and Communication Conference
, pp. 329-334
-
-
Burroughs, D.J.1
Wilson, L.F.2
Cybenko, G.V.3
-
5
-
-
84875308045
-
-
DARWIN home page.
-
DARWIN home page. http://userver.ftw.at/~ricciato/darwin
-
-
-
-
9
-
-
34547284915
-
Scan detection on very large networks using logistic regression modeling
-
C. Gates, J. J. McNutt, J. B. Kadane, and M. I. Kellner, "Scan detection on very large networks using logistic regression modeling,' Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC'06), pp. 402-408, 2006.
-
(2006)
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC'06)
, pp. 402-408
-
-
Gates, C.1
McNutt, J.J.2
Kadane, J.B.3
Kellner, M.I.4
-
10
-
-
84878701863
-
Detecting anomalies in network traffic using maximum entropy estimation
-
Berkeley, CA, Oct
-
Y. Gu, A. McCallum, and D. Towsley, "Detecting anomalies in network traffic using maximum entropy estimation," Proceedings of the Internet Measurement Conference (IMC'05), pp. 345-350, Berkeley, CA, Oct. 2005.
-
(2005)
Proceedings of the Internet Measurement Conference (IMC'05)
, pp. 345-350
-
-
Gu, Y.1
McCallum, A.2
Towsley, D.3
-
11
-
-
3543096392
-
Fast portscan detection using sequential hypothesis testing
-
May
-
J. Jung, V. Paxson, A. W. Berger, and H. Balakrishnan, "Fast portscan detection using sequential hypothesis testing," Proceedings of the IEEE Symposium on Security and Privacy, pp. 211-225, May 2004.
-
(2004)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 211-225
-
-
Jung, J.1
Paxson, V.2
Berger, A.W.3
Balakrishnan, H.4
-
13
-
-
33847290520
-
Mining anomalies using traffic feature distributions
-
Philadelphia, USA, July
-
A. Lakhina, M. Crovella, and C. Diot, "Mining anomalies using traffic feature distributions," Proceedings of SIGCOMM' 05, pp. 217-228, Philadelphia, USA, July 2005.
-
(2005)
Proceedings of SIGCOMM' 05
, pp. 217-228
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
15
-
-
33846251940
-
SweetBait: Zero-hour worm detection and containment using lowand high-interaction honeypots
-
Apr.
-
G. Portokalidis and H. Bos, "SweetBait: Zero-hour worm detection and containment using lowand high-interaction honeypots, Computer Networks, vol. 51, no. 5, pp. 1256-1274, Apr. 2007.
-
(2007)
Computer Networks
, vol.51
, Issue.5
, pp. 1256-1274
-
-
Portokalidis, G.1
Bos, H.2
-
16
-
-
33646894468
-
Unwanted traffic in 3G networks
-
Apr.
-
F. Ricciato, "Unwanted traffic in 3G networks," ACM Computer Communication Review, vol. 36, no. 2, pp. 53-56, Apr. 2006
-
(2006)
ACM Computer Communication Review
, vol.36
, Issue.2
, pp. 53-56
-
-
Ricciato, F.1
-
17
-
-
33845951462
-
On the impact of unwanted traffic onto a 3G network
-
Privacy and Trust in Pervasive and Ubiquitous Computing (SecPeru'06), Lyon, France, June
-
F. Ricciato, P. Svoboda, E. Hasenleithner, and W. Fleischer, "On the impact of unwanted traffic onto a 3G network," Proceedings of 2nd International workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPeru'06), pp. 49-56, Lyon, France, June 2006.
-
(2006)
Proceedings of 2nd International work-shop on Security
, pp. 49-56
-
-
Ricciato, F.1
Svoboda, P.2
Hasenleithner, E.3
Fleischer, W.4
-
18
-
-
35048831757
-
Fast detection of scanning worm infections
-
French Riviera, France, Sep.
-
S. E. Schechter, J. Jung, and A. W. Berger, "Fast detection of scanning worm infections," Proceedings of the 7th International Symposium on Recent Advances in Intrusion Detection, pp. 59-81, French Riviera, France, Sep. 2004.
-
(2004)
Proceedings of the 7th International Symposium on Recent Advances in Intrusion Detection
, pp. 59-81
-
-
Schechter, S.E.1
Jung, J.2
Berger, A.W.3
-
19
-
-
33745474966
-
Scan detection: A data mining approach
-
Apr
-
G. Simon, H. Xiong, E. Eilertson, and V. Kumar, "Scan detection: A data mining approach," Proceedings of 2006 SIAM conference on Data Mining, pp. 118-129, Apr. 2006.
-
(2006)
Proceedings of 2006 SIAM conference on Data Mining
, pp. 118-129
-
-
Simon, G.1
Xiong, H.2
Eilertson, E.3
Kumar, V.4
-
20
-
-
84991765629
-
Automated worm fingerprinting
-
San Francisco, CA, Dec
-
S. Singh, C. Estan, G. Varghese, and S. Savage, "Automated worm fingerprinting", Proceedings of the 6th Conference on Symposium on Operating Systems Design & Implementation, pp. 45-60, San Francisco, CA, Dec. 2004.
-
(2004)
Proceedings of the 6th Conference on Symposium on Operating Systems Design & Implementation
, pp. 45-60
-
-
Singh, S.1
Estan, C.2
Varghese, G.3
Savage, S.4
-
21
-
-
84875300083
-
-
SNORT homepage
-
SNORT homepage. http://www.snort.org
-
-
-
-
22
-
-
33751053025
-
Connectionless port scan detection on the backbone
-
Pheonix, AZ. Apr.
-
A. Sridharan, T. Ye, and S. Bhattacharyya, "Connectionless port scan detection on the backbone," Proceedings of Malware workshop, held in conjunction with IPCCC, pp. 567-576, Pheonix, AZ. Apr. 2006.
-
(2006)
Proceedings of Malware workshop, held in conjunction with IPCCC
, pp. 567-576
-
-
Sridharan, A.1
Ye, T.2
Bhattacharyya, S.3
-
23
-
-
84860603040
-
Implementing and testing a virus throttle
-
Washington D.C., USA, Aug.
-
J. Twycross, and M. M. Williamson, "Implementing and testing a virus throttle", Proceedings of USENIX Security Symposium, pp. 285-294, Washington D.C., USA, Aug. 2003.
-
(2003)
Proceedings of USENIX Security Symposium
, pp. 285-294
-
-
Twycross, J.1
Williamson, M.M.2
-
24
-
-
33846625241
-
Honeynets: A tool for counterintelligence in online security
-
Jan.
-
D. Watson, "Honeynets: A tool for counterintelligence in online security," Network Security, vol. 2007, no. 1, pp. 4-8, Jan. 2007.
-
(2007)
Network Security
, vol.2007
, Issue.1
, pp. 4-8
-
-
Watson, D.1
-
25
-
-
31344437563
-
Securing a wireless world
-
Feb
-
H. Yang, F. Ricciato, S. Lu, and L. Zhang, "Securing a wireless world," Proceedings of the IEEE Special Issue on Cryptography and Security Issues, vol. 94, no. 2, Feb. 2006.
-
(2006)
Proceedings of the IEEE Special Issue on Cryptography and Security Issues
, vol.94
, Issue.2
-
-
Yang, H.1
Ricciato, F.2
Lu, S.3
Zhang, L.4
|