-
1
-
-
70349714146
-
-
Cisco Systems, White Paper, Understanding acl on catalyst 6500 series switches, www.cisco.com/en/US/products/hw/switches/ps708/products- white-paper09186a00800c9470.shtml.
-
Cisco Systems, White Paper, "Understanding acl on catalyst 6500 series switches," www.cisco.com/en/US/products/hw/switches/ps708/products- white-paper09186a00800c9470.shtml.
-
-
-
-
2
-
-
70349698644
-
-
Cisco Systems, White Paper, Protecting your core: Infrastructure protection access control lists, http://www.cisco.com/en/US/tech/tk648/ tk361/technologies-white-paper09186a00801a1a55.shtml.
-
Cisco Systems, White Paper, "Protecting your core: Infrastructure protection access control lists," http://www.cisco.com/en/US/tech/tk648/ tk361/technologies-white-paper09186a00801a1a55.shtml.
-
-
-
-
3
-
-
70349720279
-
-
Dshield http://www.dshield.org/
-
Dshield
-
-
-
6
-
-
70349701848
-
Technical Report arXiv:cs.NI/0811.3828
-
Nov
-
F. Soldo, A. Markopoulou, K. Argyraki, "Optimal Filtering of Malicious IP Sources", Technical Report arXiv:cs.NI/0811.3828, Nov. 2008
-
(2008)
-
-
Soldo, F.1
Markopoulou, A.2
Argyraki, K.3
-
7
-
-
85013625593
-
Computational complexity of approximation algorithms for combinatorial problems
-
Mathematical Foundations of Computer Science, Springer
-
G.V. Gens and E.V. Levner, "Computational complexity of approximation algorithms for combinatorial problems", in Mathematical Foundations of Computer Science, LNCS, vol. 74, pp. 292-300, Springer 1979.
-
(1979)
LNCS
, vol.74
, pp. 292-300
-
-
Gens, G.V.1
Levner, E.V.2
-
9
-
-
51349126234
-
Spatial-Temporal Characteristics of Internet Malicious Sources
-
April
-
Z. Chen, C. Ji, P. Barford, "Spatial-Temporal Characteristics of Internet Malicious Sources," in IEEE INFOCOM (Mini-Conf.), April 2008.
-
(2008)
IEEE INFOCOM (Mini-Conf.)
-
-
Chen, Z.1
Ji, C.2
Barford, P.3
-
10
-
-
33947198115
-
Observed structure of addresses in IP traffic
-
Dec
-
E. Kohler, J. Li, V. Paxson, and S. Shenker, "Observed structure of addresses in IP traffic," IEEE/ACM ToN 14(6), pp. 1207-1218, Dec. 2006.
-
(2006)
IEEE/ACM ToN
, vol.14
, Issue.6
, pp. 1207-1218
-
-
Kohler, E.1
Li, J.2
Paxson, V.3
Shenker, S.4
-
12
-
-
66249102841
-
To Filter or to Authorize: Network-Layer DoS Defense Against Multimillion-node Botnets
-
Seattle, Aug
-
X. Liu, X. Yang, Y. Lu, "To Filter or to Authorize: Network-Layer DoS Defense Against Multimillion-node Botnets," in ACM SIGCOMM 2008, Seattle, Aug. 2008.
-
(2008)
ACM SIGCOMM
-
-
Liu, X.1
Yang, X.2
Lu, Y.3
-
13
-
-
79961236654
-
The Spoofer Project: Inferring the Extent of Internet Source Address Filtering on the Internet
-
R. Beverly, S. Bauer, "The Spoofer Project: Inferring the Extent of Internet Source Address Filtering on the Internet," in SRUTI 2005.
-
(2005)
SRUTI
-
-
Beverly, R.1
Bauer, S.2
-
15
-
-
70349723394
-
Accountable Internet Protocol (AIP)
-
Seattle, Aug
-
D. Andersen, H. Balakrishnan, N. Feamster, T. Koponen, D. Moon, S. Shenker, "Accountable Internet Protocol (AIP)," in ACM SIGCOMM 2008, Seattle, Aug. 2008.
-
(2008)
ACM SIGCOMM
-
-
Andersen, D.1
Balakrishnan, H.2
Feamster, N.3
Koponen, T.4
Moon, D.5
Shenker, S.6
-
17
-
-
50049083120
-
On Filtering of DDoS Attacks Based on Source Address Prefixes
-
Aug
-
G. Pack, J. Yoon, E. Collins, C. Estan, "On Filtering of DDoS Attacks Based on Source Address Prefixes," in Proc. of SecureComm, Aug. 2006.
-
(2006)
Proc. of SecureComm
-
-
Pack, G.1
Yoon, J.2
Collins, E.3
Estan, C.4
-
19
-
-
52949114582
-
Filtering sources of unwanted traffic
-
UCSD, Jan
-
F. Soldo, K. El Defrawy, A. Markopoulou, B. Krishnamurthy, and K. v.d. Merwe, "Filtering sources of unwanted traffic" in Proc. of Inf. Theory and Applications Workshop, UCSD, Jan. 2008.
-
(2008)
Proc. of Inf. Theory and Applications Workshop
-
-
Soldo, F.1
El Defrawy, K.2
Markopoulou, A.3
Krishnamurthy, B.4
Merwe, K.V.D.5
-
20
-
-
0033879594
-
Approximation algorithms for knapsack problems with cardinality constraints
-
A. Caprara, H. Kellerer, U. Pferschy, and D. Pisinger, "Approximation algorithms for knapsack problems with cardinality constraints", European Journal of Operational Research, 123:333-345, 2000
-
(2000)
European Journal of Operational Research
, vol.123
, pp. 333-345
-
-
Caprara, A.1
Kellerer, H.2
Pferschy, U.3
Pisinger, D.4
|