-
2
-
-
0742276097
-
Inside the Slammer Worm
-
D. Moore, V. Paxson, and S. Savage, "Inside the Slammer Worm," IEEE Magazine of Security and Privacy, vol. 1, no. 4, pp. 33-39, 2003.
-
(2003)
IEEE Magazine of Security and Privacy
, vol.1
, Issue.4
, pp. 33-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
-
3
-
-
70350085665
-
-
W32/MyDoom.B Virus, http://www.us-cert.gov/cas/techalerts/ TA04-028A.html, 2008.
-
(2008)
W32/MyDoom.B Virus
-
-
-
4
-
-
11144272176
-
A Taxonomy of DDOS Attack and DDOS Defense Mechanisms
-
J. Mirkovic and P. Reiher, "A Taxonomy of DDOS Attack and DDOS Defense Mechanisms," ACM SIGCOMM Computer Comm. Rev., vol. 34, no. 2, pp. 39-54, 2004.
-
(2004)
ACM SIGCOMM Computer Comm. Rev
, vol.34
, Issue.2
, pp. 39-54
-
-
Mirkovic, J.1
Reiher, P.2
-
5
-
-
70350080767
-
-
Internet Security News, http://www.landfield.com/isn/mail-archive/2001/ Feb/0037.html, 2008.
-
(2008)
Internet Security News
-
-
-
6
-
-
70350083523
-
-
Internet Storm Center, SANS
-
Internet Storm Center, SANS, http://isc.sans.org/, 2008.
-
(2008)
-
-
-
12
-
-
70350063419
-
myNetWatchman
-
"myNetWatchman," myNetWatchman Project, http:// www.mynetwatchman.com, 2008.
-
(2008)
myNetWatchman Project
-
-
-
13
-
-
30644463214
-
-
Honeynet Project, http:// project.honeynet.org/papers/honeynet
-
L. Spitzner, Know Your Enemy: Honeynets. Honeynet Project, http:// project.honeynet.org/papers/honeynet, 2008.
-
(2008)
Know Your Enemy: Honeynets
-
-
Spitzner, L.1
-
16
-
-
34548755641
-
DSSS-Based Flow Marking Technique for Invisible Traceback
-
May
-
W. Yu, X. Fu, S. Graham, D. Xuan, and W. Zhao, "DSSS-Based Flow Marking Technique for Invisible Traceback," Proc. IEEE Symp. Security and Privacy (S&P '07), May 2007.
-
(2007)
Proc. IEEE Symp. Security and Privacy (S&P '07)
-
-
Yu, W.1
Fu, X.2
Graham, S.3
Xuan, D.4
Zhao, W.5
-
17
-
-
27544467640
-
Toward a Framework for Internet Forensic Analysis
-
Nov
-
V. Sekar, Y. Xie, D. Maltz, M. Reiter, and H. Zhang, "Toward a Framework for Internet Forensic Analysis," Proc. Third Workshop Hot Topics in Networks (HotNets-III '04), Nov. 2004.
-
(2004)
Proc. Third Workshop Hot Topics in Networks (HotNets-III '04)
-
-
Sekar, V.1
Xie, Y.2
Maltz, D.3
Reiter, M.4
Zhang, H.5
-
20
-
-
70350063416
-
An Interactive Training System for Morse Code Users
-
Aug
-
L.Y. Chuang, C.H. Yang, C.H. Yang, and S.L. Lin, "An Interactive Training System for Morse Code Users," Proc. Sixth IASTED Int'l Conf. Internet and Multimedia Systems and Applications, Aug. 2002.
-
(2002)
Proc. Sixth IASTED Int'l Conf. Internet and Multimedia Systems and Applications
-
-
Chuang, L.Y.1
Yang, C.H.2
Yang, C.H.3
Lin, S.L.4
-
23
-
-
0020128340
-
Theory of Spread-Spectrum Communication - Tutorial
-
R.K. Pickholtz, D.L. Schilling, and L.B. Milstein, "Theory of Spread-Spectrum Communication - Tutorial," IEEE Trans. Comm., vol. 30, no. 5, pp. 855-884, 1982.
-
(1982)
IEEE Trans. Comm
, vol.30
, Issue.5
, pp. 855-884
-
-
Pickholtz, R.K.1
Schilling, D.L.2
Milstein, L.B.3
-
24
-
-
0032073935
-
Spreading Codes Generator for Wireless CDMA Network
-
E.J. Crusellers, M. Soriano, and J.L. Melus, "Spreading Codes Generator for Wireless CDMA Network," Int'l J. Wireless Personal Comm., vol. 7, no. 1, 1998.
-
(1998)
Int'l J. Wireless Personal Comm
, vol.7
, Issue.1
-
-
Crusellers, E.J.1
Soriano, M.2
Melus, J.L.3
-
26
-
-
70350076812
-
-
Nova Engineering, Linear Feedback Register Shift, http:// www.sss-mag.com/pdf/lfsr.pdf, 2008.
-
Nova Engineering, Linear Feedback Register Shift, http:// www.sss-mag.com/pdf/lfsr.pdf, 2008.
-
-
-
-
27
-
-
33749864044
-
New Streaming Algorithms for Superspreader Detection
-
Feb
-
S. Venkataraman, D. Song, P. Gibbons, and A. Blum, "New Streaming Algorithms for Superspreader Detection," Proc. 12th IEEE Network and Distributed Systems Security Symp. (NDSS '05), Feb. 2005.
-
(2005)
Proc. 12th IEEE Network and Distributed Systems Security Symp. (NDSS '05)
-
-
Venkataraman, S.1
Song, D.2
Gibbons, P.3
Blum, A.4
-
29
-
-
70350065461
-
-
Cryptanalysis, http://en.wikipedia.org/wiki/Cryptanalysis, 2008.
-
(2008)
Cryptanalysis
-
-
-
30
-
-
27744442107
-
-
John Wiley & Sons
-
R.L. Allen and D.W. Mills, Signal Analysis: Time, Frequency, Scale, and Structure. John Wiley & Sons, 2004.
-
(2004)
Signal Analysis: Time, Frequency, Scale, and Structure
-
-
Allen, R.L.1
Mills, D.W.2
-
31
-
-
27944485356
-
On Flow Marking Attacks in Wireless Anonymous Communication Networks
-
Mar
-
X. Fu, Y. Zhu, B. Graham, R. Bettati, and W. Zhao, "On Flow Marking Attacks in Wireless Anonymous Communication Networks," Proc. 24th Int'l Conf. Distributed Computing Systems (ICDCS '04), Mar. 2004.
-
(2004)
Proc. 24th Int'l Conf. Distributed Computing Systems (ICDCS '04)
-
-
Fu, X.1
Zhu, Y.2
Graham, B.3
Bettati, R.4
Zhao, W.5
-
34
-
-
34247555884
-
Privacy-Preserving Data-Mining Systems
-
Apr
-
N. Zhang and W. Zhao, "Privacy-Preserving Data-Mining Systems," Computer, vol. 40, no. 4, Apr. 2007.
-
(2007)
Computer
, vol.40
, Issue.4
-
-
Zhang, N.1
Zhao, W.2
-
36
-
-
53349100033
-
On Localization Attacks to Internet Threat Monitors: An Information-Theoretic Framework
-
June
-
W. Yu, N. Zhang, X. Fu, R. Bettati, and W. Zhao, "On Localization Attacks to Internet Threat Monitors: An Information-Theoretic Framework," Proc. IEEE Int'l Conf. Dependable Systems and Networks (DSN) (Performance and Dependability Symp. - PDS '08), June 2008.
-
(2008)
Proc. IEEE Int'l Conf. Dependable Systems and Networks (DSN) (Performance and Dependability Symp. - PDS '08)
-
-
Yu, W.1
Zhang, N.2
Fu, X.3
Bettati, R.4
Zhao, W.5
-
37
-
-
70350047971
-
-
CAIDA
-
CAIDA, Telescope Analysis, http://www.caida.org/analysis/security/ telescope, 2008.
-
(2008)
Telescope Analysis
-
-
-
53
-
-
74849092532
-
Covert Channels in Privacy-Preserving Identification Systems
-
Nov
-
D. Bailey, D. Boneh, E.-J. Goh, and A. Juels, "Covert Channels in Privacy-Preserving Identification Systems," Proc. ACM Conf. Computer and Comm. Security (CCS '07), Nov. 2007.
-
(2007)
Proc. ACM Conf. Computer and Comm. Security (CCS '07)
-
-
Bailey, D.1
Boneh, D.2
Goh, E.-J.3
Juels, A.4
|