-
2
-
-
84879974400
-
Seamless Dynamic Reconfiguration of Flow Meters: Requirements and Solutions
-
Kassel, Germany: Springer, March
-
T. Limmer and F. Dressler, "Seamless Dynamic Reconfiguration of Flow Meters: Requirements and Solutions," in 16. GI/ITG Fachtagung Kommunikation in Verteilten Systemen (KiVS 2009). Kassel, Germany: Springer, March 2009, pp. 179-190.
-
(2009)
16. GI/ITG Fachtagung Kommunikation in Verteilten Systemen (KiVS 2009)
, pp. 179-190
-
-
Limmer, T.1
Dressler, F.2
-
3
-
-
46149108945
-
Vermont - A Versatile Monitoring Toolkit Using IPFIX/PSAMP
-
Tübingen, Germany: IEEE, September
-
R. T. Lampert, C. Sommer, G. Münz, and F. Dressler, "Vermont - A Versatile Monitoring Toolkit Using IPFIX/PSAMP," in IEEE/IST Workshop on Monitoring, Attack Detection and Mitigation (MonAM 2006). Tübingen, Germany: IEEE, September 2006, pp. 62-65.
-
(2006)
IEEE/IST Workshop on Monitoring, Attack Detection and Mitigation (MonAM 2006)
, pp. 62-65
-
-
Lampert, R.T.1
Sommer, C.2
Münz, G.3
Dressler, F.4
-
6
-
-
33847772544
-
-
IETF, RFC 5102, January
-
J. Quittek, S. Bryant, B. Claise, P. Aitken, and J. Meyer, "Information Model for IP Flow Information Export," IETF, RFC 5102, January 2008.
-
(2008)
Information Model for IP Flow Information Export
-
-
Quittek, J.1
Bryant, S.2
Claise, B.3
Aitken, P.4
Meyer, J.5
-
8
-
-
77951279947
-
Manifesto - Perspectives Workshop: Network Attack Detection and Defense
-
G. Carle, F. Dressler, R. A. Kemmerer, H. König, C. Kruegel, and P. Laskov, "Manifesto - Perspectives Workshop: Network Attack Detection and Defense," in Dagstuhl Perspectives Workshop 08102 - Network Attack Detection and Defense 2008, Schloss Dagstuhl, Wadern, Germany, March 2008.
-
Dagstuhl Perspectives Workshop 08102 - Network Attack Detection and Defense 2008, Schloss Dagstuhl, Wadern, Germany, March 2008
-
-
Carle, G.1
Dressler, F.2
Kemmerer, R.A.3
König, H.4
Kruegel, C.5
Laskov, P.6
-
9
-
-
0024065804
-
Computation of Cyclic Redundancy Checks via Table Look-Up
-
D. V. Sarwate, "Computation of Cyclic Redundancy Checks via Table Look-Up," Communications of the ACM, vol. 31, no. 8, pp. 1008-1013, 1988.
-
(1988)
Communications of the ACM
, vol.31
, Issue.8
, pp. 1008-1013
-
-
Sarwate, D.V.1
-
10
-
-
55749101227
-
-
April [Online]. Available
-
Anarchriz/DREAD, "CRC and how to Reverse it," April 1999. [Online]. Available: http://www.woodmann.com/RCE-CD-SITES/Anachriz/programming/ crc.htm
-
(1999)
CRC and How to Reverse It
-
-
-
11
-
-
0017321603
-
Evaluation of error detection polynomial performance on the AUTOVON channel
-
New Orleans, LA: IEEE, December 8-25
-
K. Brayer and J. L. Hammond Jr, "Evaluation of error detection polynomial performance on the AUTOVON channel," in National Telecommunications Conference, vol. 1. New Orleans, LA: IEEE, December 1975, pp. 8-21 to 8-25.
-
(1975)
National Telecommunications Conference
, vol.1
, pp. 8-21
-
-
Brayer, K.1
Hammond Jr., J.L.2
-
12
-
-
85066841533
-
Analysis of CRC methods and potential data integrity exploits
-
B. Maxwell, D. R. Thompson, G. Amerson, and L. Johnson, "Analysis of CRC methods and potential data integrity exploits," in International Conference on Emerging Technologies, Minneapolis, MI, August 2003, pp. 25-26.
-
International Conference on Emerging Technologies, Minneapolis, MI, August 2003
, pp. 25-26
-
-
Maxwell, B.1
Thompson, D.R.2
Amerson, G.3
Johnson, L.4
-
13
-
-
0036343692
-
Detecting SYN Flooding Attacks
-
H. Wang, D. Zhang, and K. G. Shin, "Detecting SYN Flooding Attacks," in 21st IEEE Conference on Computer Communications (IEEE INFOCOM 2002), New York, NY, June 2002.
-
21st IEEE Conference on Computer Communications (IEEE INFOCOM 2002), New York, NY, June 2002
-
-
Wang, H.1
Zhang, D.2
Shin, K.G.3
-
14
-
-
84880380775
-
-
[Online]. Available
-
A. Turner, "tcpreplay." [Online]. Available: http://tcpreplay.synfin.net/trac/wiki/tcpreplay
-
Tcpreplay
-
-
Turner, A.1
-
16
-
-
84963650728
-
Universal classes of hash functions
-
Boulder, CO: ACM, May
-
J. L. Carter and M. N. Wegman, "Universal classes of hash functions," in 9th ACM Symposium on Theory of Computing. Boulder, CO: ACM, May 1977, pp. 106-112.
-
(1977)
9th ACM Symposium on Theory of Computing
, pp. 106-112
-
-
Carter, J.L.1
Wegman, M.N.2
-
17
-
-
85010849899
-
Denial of Service via Algorithmic Complexity Attacks
-
S. Crosby and D. Wallach, "Denial of Service via Algorithmic Complexity Attacks," in 12th USENIX Security Symposium, Washington, D.C., August 2003, pp. 3-3
-
12th USENIX Security Symposium, Washington, D.C., August 2003
, pp. 3-3
-
-
Crosby, S.1
Wallach, D.2
-
18
-
-
84957068240
-
UMAC: Fast and secure message authentication
-
19th International Cryptology Conference (Advances in Cryptology, CRYPTO '99), Vol. Santa Barbara, CA, August
-
J. Black, S. Halevi, H. Krawczyk, T. Krovetz, and P. Rogaway, "UMAC: Fast and secure message authentication," in 19th International Cryptology Conference (Advances in Cryptology, CRYPTO '99), vol.LNCS 1666, Santa Barbara, CA, August 1999, pp. 216-233.
-
(1999)
LNCS
, vol.1666
, pp. 216-233
-
-
Black, J.1
Halevi, S.2
Krawczyk, H.3
Krovetz, T.4
Rogaway, P.5
|