-
1
-
-
85011016678
-
Tracing anonymous packets to their approximate source
-
Berkeley, CA, USA, USENIX Association
-
Hal Burch and Bill Cheswick. Tracing anonymous packets to their approximate source. In LISA '00: Proceedings of the 14th USENIX Conference on System Administration, pages 319-328, Berkeley, CA, USA, 2000. USENIX Association.
-
(2000)
LISA '00: Proceedings of the 14th USENIX Conference on System Administration
, pp. 319-328
-
-
Burch, H.1
Cheswick, B.2
-
2
-
-
0033650584
-
Practical network support for ip traceback
-
Stefan Savage, David Wetherall, Anna Karlin, and Tom Anderson. Practical network support for ip traceback. SIGCOMM Comput. Commun. Rev., 30(4):295-306, 2000.
-
(2000)
SIGCOMM Comput. Commun. Rev.
, vol.30
, Issue.4
, pp. 295-306
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
3
-
-
0029232080
-
Holding intruders accountable on the internet
-
Washington, DC, USA, IEEE Computer Society
-
S. Staniford-Chen and L. T. Heberlein. Holding intruders accountable on the internet. In SP '95: Proceedings of the 1995 IEEE Symposium on Security and Privacy, page 39, Washington, DC, USA, 1995. IEEE Computer Society.
-
(1995)
SP '95: Proceedings of the 1995 IEEE Symposium on Security and Privacy
, pp. 39
-
-
Staniford-Chen, S.1
Heberlein, L.T.2
-
4
-
-
77950909383
-
Definition of Attribution
-
Meriam Webster. Last Visited: 16 April
-
Meriam Webster. Definition of Attribution. In Meriam- Webster's Online Dictionary, 1651. Last Visited: 16 April 2009.
-
(1651)
Meriam- Webster's Online Dictionary
-
-
-
8
-
-
27644505323
-
Valuaating Privacy
-
September-October 2005
-
Hauberman, Bernard, Adan, Etan, and Ane, Leslie 2005. Valuaating Privacy. IEEE Security and Privacy Vol.3, Issue 5 (September-October 2005) 22-25.
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.5
, pp. 22-25
-
-
Hauberman, B.1
Adan, E.2
Ane, L.3
-
12
-
-
0031606138
-
'Goodies' in Exchange for Consumer Information on the Internet: The Economics and Issues
-
IEEEE
-
Chang,a.,Kannan,P.K.,Whinston, A. 1998. 'Goodies' in Exchange for Consumer Information on the Internet: The Economics and Issues. In Proceedings of the Thirty-First Hawaii International Conference on System Sciences Vol. 4. (Hawaii, USA January 6-91998). IEEEE, 533-542.
-
(1998)
Proceedings of the Thirty-First Hawaii International Conference on System Sciences Vol. 4. (Hawaii, USA January 6-91998)
, pp. 533-542
-
-
Chang, A.1
Kannan, P.K.2
Whinston, A.3
-
15
-
-
0034775309
-
Hash-based IP traceback
-
San Diego, CA, USA
-
Alex C. Snoeren. Hash-based IP traceback. In SIGCOMM '01: Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications, pages 3-14, San Diego, CA, USA, 2001.
-
SIGCOMM '01: Proceedings of the 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications
, Issue.2001
, pp. 3-14
-
-
Snoeren, A.C.1
-
16
-
-
0036947597
-
Single-packet IP traceback
-
Alex C. Snoeren, Craig Partridge, Luis A. Sanchez, Christine E. Jones, Fabrice Tchakountio, Beverly Schwartz, Stephen T. Kent, W. Timothy Strayer. Single-packet IP traceback. IEEE/ACM Transactions on Networking (TON), 10(6):721-734, 2002.
-
(2002)
IEEE/ACM Transactions on Networking (TON)
, vol.10
, Issue.6
, pp. 721-734
-
-
Snoeren, A.C.1
Partridge, C.2
Sanchez, L.A.3
Jones, C.E.4
Tchakountio, F.5
Schwartz, B.6
Kent, S.T.7
Strayer, W.T.8
-
18
-
-
33847129500
-
An Integrated Architecture for Attack Attribution
-
December 31
-
W. Timothy Strayer, Christine E. Jones, Isidro Castineyra, Joel B. Levin, and Regina Rosales Hain. An Integrated Architecture for Attack Attribution. BBN Technical Report No.8384, December 31, 2003.
-
(2003)
BBN Technical Report No.8384
-
-
Strayer, W.T.1
Jones, C.E.2
Castineyra, I.3
Levin, J.B.4
Hain, R.R.5
-
20
-
-
3242807392
-
A Hybrid Negotiation Strategy Mechanism in an Automated Negotiation System
-
Sheng Zhang, Song Ye, Fillia Makedon, and James Ford, "A Hybrid Negotiation Strategy Mechanism in an Automated Negotiation System," Proceedings of the 5th ACM Conference on Electronic Commerce pp. 256-257 (2004).
-
(2004)
Proceedings of the 5th ACM Conference on Electronic Commerce
, pp. 256-257
-
-
Zhang, S.1
Ye, S.2
Makedon, F.3
Ford, J.4
-
21
-
-
0034317642
-
QoS Negotiation in Real-Time Systems and its Application to Automated Flight Control
-
Nov.
-
T. Atdelzater, E. Atkins, and K. Shin, "QoS Negotiation in Real-Time Systems and its Application to Automated Flight Control," IEEE Transactions on Computers 49(11) pp. 1170-1183 (Nov. 2000).
-
(2000)
IEEE Transactions on Computers
, vol.49
, Issue.11
, pp. 1170-1183
-
-
Atdelzater, T.1
Atkins, E.2
Shin, K.3
-
22
-
-
84974715448
-
SNAP: A Protocol for Negotiating Service Level Agreements and Coordinating Resource Management in Distributed Systems
-
Karl Czajkowski, Ian Foster, Carl Kesselman, Volker Sander, and Steven Tuecke, "SNAP: A Protocol for Negotiating Service Level Agreements and Coordinating Resource Management in Distributed Systems," Job Scheduling Strategies for Parallel Processing pp. 153-183 (2002).
-
(2002)
Job Scheduling Strategies for Parallel Processing
, pp. 153-183
-
-
Czajkowski, K.1
Foster, I.2
Kesselman, C.3
Sander, V.4
Tuecke, S.5
-
23
-
-
0036871183
-
Negotiating Trust in the Web
-
Nov.
-
M. Winslett, T. Yu, K. Seamons, A. Hess, J. Jacobson, R. Jarvis, B. Smith, and L. Yu, "Negotiating Trust in the Web," IEEE Internet Computing 6(6) pp. 30-37 (Nov. 2002).
-
(2002)
IEEE Internet Computing
, vol.6
, Issue.6
, pp. 30-37
-
-
Winslett, M.1
Yu, T.2
Seamons, K.3
Hess, A.4
Jacobson, J.5
Jarvis, R.6
Smith, B.7
Yu, L.8
-
24
-
-
0035479935
-
A Genetic Agent-Based Negotiation System
-
Oct.
-
Samuel Choi, Jiming Liu, and Sheung-Ping Chan, "A Genetic Agent-Based Negotiation System," Computer Networks 37(2) pp. 195-204 (Oct. 2001).
-
(2001)
Computer Networks
, vol.37
, Issue.2
, pp. 195-204
-
-
Choi, S.1
Liu, J.2
Chan, S.-P.3
-
25
-
-
3242795583
-
SCENS: A System for the Mediated Sharing of Sensitive Data
-
Song Ye, Fillia Makedon, Tilmann Steinberg, Li Shen, James Ford, Yuhang Wang, Yan Zhao, and Sarantos Kapidakis, "SCENS: A System for the Mediated Sharing of Sensitive Data," Proceedings of the 3rd ACM/IEEE-CS Joint Conference on Digital Libraries pp. 263-265 (2003).
-
(2003)
Proceedings of the 3rd ACM/IEEE-CS Joint Conference on Digital Libraries
, pp. 263-265
-
-
Ye, S.1
Makedon, F.2
Steinberg, T.3
Shen, L.4
Ford, J.5
Wang, Y.6
Zhao, Y.7
Kapidakis, S.8
|