-
1
-
-
8344266952
-
An improved data stream summary: The count-min sketch and its applications
-
G. Cormode and S. Muthukrishnan, "An improved data stream summary: The count-min sketch and its applications," J. Algorithms, vol.55, pp. 29-38, 2004.
-
(2004)
J. Algorithms
, vol.55
, pp. 29-38
-
-
Cormode, G.1
Muthukrishnan, S.2
-
2
-
-
84869158135
-
Finding frequent items in data streams
-
London, UK: Springer-Verlag
-
M. Charikar, K. Chen, and M. Farach-Colton, "Finding frequent items in data streams," in ICALP '02: Proceedings of the 29th International Colloquium on Automata, Languages and Programming. London, UK: Springer-Verlag, 2002, pp. 693-703.
-
(2002)
ICALP '02: Proceedings of the 29th International Colloquium on Automata, Languages and Programming
, pp. 693-703
-
-
Charikar, M.1
Chen, K.2
Farach-Colton, M.3
-
3
-
-
2442506466
-
How to summarize the universe: Dynamic maintenance of quantiles
-
A. C. Gilbert, Y. Kotidis, S. Muthukrishnan, and M. J. Strauss, "How to summarize the universe: Dynamic maintenance of quantiles," in In VLDB, 2002, pp. 454-465.
-
(2002)
VLDB
, pp. 454-465
-
-
Gilbert, A.C.1
Kotidis, Y.2
Muthukrishnan, S.3
Strauss, M.J.4
-
4
-
-
84964506507
-
Cooperative intrusion traceback and response architecture (citra)
-
D. Schnackenberg, H. Holliday, R. Smith, K. Djahandari, and D. Sterne, "Cooperative intrusion traceback and response architecture (citra)," in Proceedings of the DARPA Information Survivability Conference and Exposition, 2001.
-
Proceedings of the DARPA Information Survivability Conference and Exposition, 2001
-
-
Schnackenberg, D.1
Holliday, H.2
Smith, R.3
Djahandari, K.4
Sterne, D.5
-
7
-
-
33745802064
-
Detection of interactive stepping stones: Algorithms and confidence bounds
-
A. Blum, D. Song, and S. Venkataraman, "Detection of interactive stepping stones: Algorithms and confidence bounds," in Conference of Recent Advance in Intrusion Detection (RAID), Sophia Antipolis, French Riviera, France, September 2004.
-
Conference of Recent Advance in Intrusion Detection (RAID), Sophia Antipolis, French Riviera, France, September 2004
-
-
Blum, A.1
Song, D.2
Venkataraman, S.3
-
8
-
-
84944043513
-
Finding a connection chain for tracing intruders
-
F. Guppens, Y. Deswarte, D. Gollamann, and M. Waidner, editors
-
K. Yoda and H. Etoh, "Finding a connection chain for tracing intruders," in F. Guppens, Y. Deswarte, D. Gollamann, and M. Waidner, editors, 6th European Symposisum on Research in Computer Security - ESORICS 2000 LNCS -1985, Toulouse, France, October 2000.
-
6th European Symposisum on Research in Computer Security - ESORICS 2000 LNCS -1985, Toulouse, France, October 2000
-
-
Yoda, K.1
Etoh, H.2
-
9
-
-
50249171389
-
Stepping stone attack attribution in non-cooperative ip networks
-
L. Zhang, A. Persaud, A. Johnson, and Y. Guan, "Stepping stone attack attribution in non-cooperative ip networks," in roceedings of the 25th IEEE International Performance Computing and Communications Conference (IPCCC 2006), April 2006.
-
Proceedings of the 25th IEEE International Performance Computing and Communications Conference (IPCCC 2006), April 2006
-
-
Zhang, L.1
Persaud, A.2
Johnson, A.3
Guan, Y.4
-
11
-
-
84958977733
-
Multiscale stepping-stone detection: Detecting pairs of jittered interactive streams by exploiting maximum tolerable delay
-
New York, Springer
-
D. Donoho, A. G. Flesia, U. Shankar, V. Paxson, J. Coit, and S. Staniford, "Multiscale stepping-stone detection: Detecting pairs of jittered interactive streams by exploiting maximum tolerable delay," in Fifth International Symposium on Recent Advances in Intrusion Detection, Lecture Notes in Computer Science 2516, New York, Springer, 2002.
-
(2002)
Fifth International Symposium on Recent Advances in Intrusion Detection, Lecture Notes in Computer Science 2516
-
-
Donoho, D.1
Flesia, A.G.2
Shankar, U.3
Paxson, V.4
Coit, J.5
Staniford, S.6
-
12
-
-
57849157961
-
A highly robust audio fingerprinting system with an efficient search strategy
-
J. Haitsma and T. Kalker, "A highly robust audio fingerprinting system with an efficient search strategy," Journal of New Music Research, vol.32, no.2, pp. 211-221, 2003.
-
(2003)
Journal of New Music Research
, vol.32
, Issue.2
, pp. 211-221
-
-
Haitsma, J.1
Kalker, T.2
-
13
-
-
0037629738
-
On effectiveness of link padding for statistical traffic analysis attacks
-
X. Fu, B. Graham, R. Bettati, and W. Zhao, "On effectiveness of link padding for statistical traffic analysis attacks," in ICDCS '03: Proceedings of the 23rd International Conference on Distributed Computing Systems, 2003, p. 340.
-
ICDCS '03: Proceedings of the 23rd International Conference on Distributed Computing Systems, 2003
, pp. 340
-
-
Fu, X.1
Graham, B.2
Bettati, R.3
Zhao, W.4
-
15
-
-
69749095702
-
Dependent link padding algorithms for low latency anonymity systems
-
W. Wang, M. Motani, and V. Srinivasan, "Dependent link padding algorithms for low latency anonymity systems," in CCS '08: Proceedings of the 15th ACM conference on Computer and communications security, 2008, pp. 323-332.
-
CCS '08: Proceedings of the 15th ACM Conference on Computer and Communications Security, 2008
, pp. 323-332
-
-
Wang, W.1
Motani, M.2
Srinivasan, V.3
-
17
-
-
34548314612
-
Tracing traffic through intermediate hosts that repacketize flows
-
Y. J. Pyun, Y. H. Park, X. Wang, D. Reeves, and P. Ning, "Tracing traffic through intermediate hosts that repacketize flows," in INFOCOM 2007. 26th IEEE International Conference on Computer Communications. IEEE, 2007, pp. 634-642.
-
INFOCOM 2007. 26th IEEE International Conference on Computer Communications. IEEE, 2007
, pp. 634-642
-
-
Pyun, Y.J.1
Park, Y.H.2
Wang, X.3
Reeves, D.4
Ning, P.5
-
19
-
-
0029232080
-
Holding intruders accountable on the internet
-
S. Staniford-Chen and L. Heberlein, "Holding intruders accountable on the internet," in Proc. IEEE Symposium on Security and Privacy, Oakland, CA, May 1995, p. 3949.
-
Proc. IEEE Symposium on Security and Privacy, Oakland, CA, May 1995
, pp. 3949
-
-
Staniford-Chen, S.1
Heberlein, L.2
-
20
-
-
44049098027
-
A signal processing perspective of stepping-stone detection
-
T. He and L. Tong, "A signal processing perspective of stepping-stone detection," in Proc. of IEEE CISS'06, Princeton, NJ, 2006.
-
Proc. of IEEE CISS'06, Princeton, NJ, 2006
-
-
He, T.1
Tong, L.2
-
21
-
-
84957003012
-
Inter-packet delay based correlation for tracing encrypted connections through stepping stone
-
X. Wang, D. S. Reeves, and S. F. Wu, "Inter-packet delay based correlation for tracing encrypted connections through stepping stone," in Proceedings of the 7th European Symposium on Research in Computer Securit, (ESORICS, 2002, pp. 244-263.
-
Proceedings of the 7th European Symposium on Research in Computer Securit, ESORICS, 2002
, pp. 244-263
-
-
Wang, X.1
Reeves, D.S.2
Wu, S.F.3
-
22
-
-
33847129500
-
An integrated architecture for attack attribution
-
December
-
W. T. Strayer, C. E. Jones, I. Castineyra, J. B. Levin, and R. R. Hain, "An integrated architecture for attack attribution," in BBN Technologies, Tech. Rep. BBN REPORT-8384, December 2003.
-
(2003)
BBN Technologies, Tech. Rep. BBN REPORT-8384
-
-
Strayer, W.T.1
Jones, C.E.2
Castineyra, I.3
Levin, J.B.4
Hain, R.R.5
-
23
-
-
39049168726
-
Characterizing and detecting skype-relayed traffic
-
K. Suh, D. Figueiredo, J. Kurose, and D. Towsley, "Characterizing and detecting skype-relayed traffic," in Proc. of Infocom, 2006.
-
(2006)
Proc. of Infocom
-
-
Suh, K.1
Figueiredo, D.2
Kurose, J.3
Towsley, D.4
-
24
-
-
48649102224
-
Efficient detection of delay-constrained relay nodes
-
B. Coskun and N. Memon, "Efficient detection of delay-constrained relay nodes," in ACSAC'07: 23rd Annual Computer Security Applications Conference, Miami Beach, FL, Dec 2007.
-
ACSAC'07: 23rd Annual Computer Security Applications Conference, Miami Beach, FL, Dec 2007
-
-
Coskun, B.1
Memon, N.2
-
25
-
-
33745773302
-
Tracking anonymous peer-to-peer voip calls on the internet
-
X. Wang, S. Chen, and S. Jajodia, "Tracking anonymous peer-to-peer voip calls on the internet," in CCS '05: Proceedings of the 12th ACM conference on Computer and communications security, 2005, pp. 81-91.
-
CCS '05: Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005
, pp. 81-91
-
-
Wang, X.1
Chen, S.2
Jajodia, S.3
-
26
-
-
0005308437
-
Surfing wavelets on streams: One-pass summaries for approximate aggregate queries
-
A. C. Gilbert, Y. Kotidis, S. Muthukrishnan, and M. Strauss, "Surfing wavelets on streams: One-pass summaries for approximate aggregate queries," in VLDB '01: Proceedings of the 27th International Conference on Very Large Data Bases, 2001, pp. 79-88.
-
VLDB '01: Proceedings of the 27th International Conference on Very Large Data Bases, 2001
, pp. 79-88
-
-
Gilbert, A.C.1
Kotidis, Y.2
Muthukrishnan, S.3
Strauss, M.4
-
27
-
-
0034444578
-
Robust image hashing
-
R. Venkatesan, S. Koon, M. Jakubowski, and P. Moulin, "Robust image hashing," in Proc. IEEE Int. Conf. Image Processing, 2000.
-
Proc. IEEE Int. Conf. Image Processing, 2000
-
-
Venkatesan, R.1
Koon, S.2
Jakubowski, M.3
Moulin, P.4
|