-
8
-
-
84885679117
-
Vigilante: End-To-End Containment of Internet Worms
-
Dec
-
th ACM Symposium on Operating Systems Principles (SOSP 2005), pages 133-147, Dec. 2005.
-
(2005)
th ACM Symposium on Operating Systems Principles (SOSP 2005)
, pp. 133-147
-
-
Costa, M.1
Crowcroft, J.2
Castro, M.3
Rowstron, A.4
Zhou, L.5
Zhang, L.6
Barham, P.7
-
9
-
-
1442288535
-
Automatic Detection and Repair of Errors In Data Structures
-
Oct
-
th Annual ACM SIGPLAN Conference on Object-Oriented Programing, Systems, Languages, and Applications (OOPSLA 2003), pages 78-95, Oct. 2003.
-
(2003)
th Annual ACM SIGPLAN Conference on Object-Oriented Programing, Systems, Languages, and Applications (OOPSLA 2003)
, pp. 78-95
-
-
Demsky, B.1
Rinard, M.2
-
15
-
-
0025557712
-
-
B. P. Miller, L. Fredriksen, and B. So. An Empirical Study of the Reliability of UNIX Utilities. Communications of the ACM, 33(12):32-44, Dec. 1990.
-
B. P. Miller, L. Fredriksen, and B. So. An Empirical Study of the Reliability of UNIX Utilities. Communications of the ACM, 33(12):32-44, Dec. 1990.
-
-
-
-
17
-
-
67650803052
-
Snort 2.0 Protocol Flow Analyzer. Sourcefire White Paper
-
Apr
-
M. Norton and D. Roelker. Snort 2.0 Protocol Flow Analyzer. Sourcefire White Paper, Apr. 2004.
-
(2004)
-
-
Norton, M.1
Roelker, D.2
-
18
-
-
84869537275
-
-
National Vulnerability Database, April 2006
-
National Vulnerability Database. http://nvd.nist.gov/ statistics.cfm, April 2006.
-
-
-
-
21
-
-
0033295259
-
Bro: A System For Detecting Network Intruders In Real-Time
-
Dec
-
V. Paxson. Bro: A System For Detecting Network Intruders In Real-Time. Computer Networks, 31(23-24):2435-2463, Dec. 1999.
-
(1999)
Computer Networks
, vol.31
, Issue.23-24
, pp. 2435-2463
-
-
Paxson, V.1
-
24
-
-
67249139196
-
Acceptability-Oriented Computing
-
Oct
-
th Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA 2003), pages 221-239, Oct. 2003.
-
(2003)
th Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA 2003)
, pp. 221-239
-
-
Rinard, M.1
-
25
-
-
84906487819
-
-
th Symposium on Operating Systems Design and Implementation (OSDI 2004), pages 303-316, Dec. 2004.
-
th Symposium on Operating Systems Design and Implementation (OSDI 2004), pages 303-316, Dec. 2004.
-
-
-
-
27
-
-
84906497159
-
Building A Reactive Immune System For Software Services
-
Apr
-
S. Sidiroglou, M. E. Locasto, S. W. Boyd, and A. D. Keromytis. Building A Reactive Immune System For Software Services. In Proceedings of the 2005 USENIX Annual Technical Conference (USENIX 2005), pages 149-161, Apr. 2005.
-
(2005)
Proceedings of the 2005 USENIX Annual Technical Conference (USENIX 2005)
, pp. 149-161
-
-
Sidiroglou, S.1
Locasto, M.E.2
Boyd, S.W.3
Keromytis, A.D.4
-
31
-
-
34548043748
-
Sweeper: A Lightweight End-To-End System For Defending Against Fast Worms
-
Mar
-
nd European Conference on Computer Systems (EuroSys 2007), pages 115-128, Mar. 2007.
-
(2007)
nd European Conference on Computer Systems (EuroSys 2007)
, pp. 115-128
-
-
Tucek, J.1
Newsome, J.2
Lu, S.3
Huang, C.4
Xanthos, S.5
Brumley, D.6
Zhou, Y.7
Song, D.8
-
32
-
-
21844456680
-
Shield: Vulnerability-Driven Network Filters For Preventing Known Vulnerability Exploits
-
Aug
-
H. J. Wang, C. Guo, D. R. Simon, and A. Zugenmaier. Shield: Vulnerability-Driven Network Filters For Preventing Known Vulnerability Exploits. In Proceedings of the 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM 2004), pages 193-204, Aug. 2004.
-
(2004)
Proceedings of the 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM 2004)
, pp. 193-204
-
-
Wang, H.J.1
Guo, C.2
Simon, D.R.3
Zugenmaier, A.4
|