-
1
-
-
0014814325
-
Space/Time Tradeoffs in Hash Coding with Allowable Errors
-
B. Bloom. "Space/Time Tradeoffs in Hash Coding with Allowable Errors". Communications of the ACM 13:7 (1970), 422-426.
-
(1970)
Communications of the ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.1
-
2
-
-
33750733595
-
An Improved Construction for Counting Bloom Filters
-
F. Bonomi, M. Mitzenmacher, R. Panigrahy, S. Singh and G. Varghese. "An Improved Construction for Counting Bloom Filters". Algorithms ESA 2006, 14th Annual European Symposium, pp. 684-695, 2006.
-
(2006)
Algorithms ESA 2006, 14th Annual European Symposium
, pp. 684-695
-
-
Bonomi, F.1
Mitzenmacher, M.2
Panigrahy, R.3
Singh, S.4
Varghese, G.5
-
3
-
-
70450232823
-
Network Applications of Bloom Filters: A Survey
-
A. Broder and M. Mitzenmacher. "Network Applications of Bloom Filters: A Survey". Internet Mathematics, 1:4 (2005), 485-509.
-
(2005)
Internet Mathematics
, vol.1
, Issue.4
, pp. 485-509
-
-
Broder, A.1
Mitzenmacher, M.2
-
7
-
-
34547686400
-
Fast Packet Classification Using Bloom Filters
-
S. Dharmapurikar, H. Song, J. Turner, and J. Lockwood. "Fast Packet Classification Using Bloom Filters", Proceedings of the 2006 ACM Symposim on Architectures for Networking and Communications Systems, Dec 2006.
-
Proceedings of the 2006 ACM Symposim on Architectures for Networking and Communications Systems, Dec 2006
-
-
Dharmapurikar, S.1
Song, H.2
Turner, J.3
Lockwood, J.4
-
8
-
-
0035360861
-
Trajectory sampling for direct traffic observation
-
N. Duffield and M. Grossglauser. "Trajectory sampling for direct traffic observation". IEEE/ACM Trans. Network. 9 (3) (2001) 280-292.
-
(2001)
IEEE/ACM Trans. Network
, vol.9
, Issue.3
, pp. 280-292
-
-
Duffield, N.1
Grossglauser, M.2
-
10
-
-
33750361486
-
Bitmap Algorithms for Counting Active Flows on High-Speed Links
-
Oct
-
C. Estan, G. Varghese, and M. Fish. "Bitmap Algorithms for Counting Active Flows on High-Speed Links". In IEEE/ACM Trans. Netw. 14, 5 (Oct. 2006), 925-937.
-
(2006)
In IEEE/ACM Trans. Netw.
, vol.14
, Issue.5
, pp. 925-937
-
-
Estan, C.1
Varghese, G.2
Fish, M.3
-
12
-
-
51349107047
-
MultiLayer Compressed Counting Bloom Filters
-
D. Ficara, S. Giordano, G. Procissi and F. Vitucci. "MultiLayer Compressed Counting Bloom Filters". 27th Conf. on Computer Commun, IEEE INFOCOM 2008, Phoenix, USA, April 2008.
-
27th Conf. on Computer Commun, IEEE INFOCOM 2008, Phoenix, USA, April 2008
-
-
Ficara, D.1
Giordano, S.2
Procissi, G.3
Vitucci, F.4
-
13
-
-
77953296690
-
More Netflow Tools for Performance and Security
-
C. Gates, M. Collins, M. Duggan, A. Kompanek and M. Thomas. "More Netflow Tools for Performance and Security". 18th USENIX Conference on System Administration, Atlanta, GA, November 2004.
-
18th USENIX Conference on System Administration, Atlanta, GA, November 2004
-
-
Gates, C.1
Collins, M.2
Duggan, M.3
Kompanek, A.4
Thomas, M.5
-
14
-
-
34547284915
-
Scan Detection on Very Large Networks Using Logistic Regression Modeling
-
C. Gates, J. McNutt, J. Kadane and M. Kellner. "Scan Detection on Very Large Networks Using Logistic Regression Modeling". 11th IEEE Symposium on Computers and Communications, Washington, DC, June 2006.
-
11th IEEE Symposium on Computers and Communications, Washington, DC, June 2006
-
-
Gates, C.1
McNutt, J.2
Kadane, J.3
Kellner, M.4
-
15
-
-
3543096392
-
Fast portscan detection using sequential hypothesis testing
-
J. Jung, V. Paxson, A.W. Berger, and H. Balakrishnan. "Fast portscan detection using sequential hypothesis testing". In Proceedings of IEEE Symposium on Security and Privacy, SP2004, Oakland, CA, USA, May 2004
-
Proceedings of IEEE Symposium on Security and Privacy, SP2004, Oakland, CA, USA, May 2004
-
-
Jung, J.1
Paxson, V.2
Berger, A.W.3
Balakrishnan, H.4
-
16
-
-
77957810554
-
A Double-Filter Structure Based Scheme for Scalable Port Scan Detection
-
S. Kong, T. He, X. Shao, and X. Li. "A Double-Filter Structure Based Scheme for Scalable Port Scan Detection". Proceedings of IEEE International Conference on Communications 2006, Istanbul, Turkey, 2006
-
Proceedings of IEEE International Conference on Communications 2006, Istanbul, Turkey, 2006
-
-
Kong, S.1
He, T.2
Shao, X.3
Li, X.4
-
18
-
-
34547239996
-
The Spread of the Sapphire/Slammer Worm
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford and N. Weaver. "The Spread of the Sapphire/Slammer Worm". Proceedings of IEEE Security and Privacy, July 2003.
-
Proceedings of IEEE Security and Privacy, July 2003
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
19
-
-
33745205813
-
Inferring Internet Denial of Service Activity
-
May
-
D. Moore, C. Shannon, D. J. Brown, G. Voelker and S. Savage. "Inferring Internet Denial of Service Activity". ACM Trans. Comp. Sys., vol. 24, no. 2 (May, 2006), 115-139.
-
(2006)
ACM Trans. Comp. Sys.
, vol.24
, Issue.2
, pp. 115-139
-
-
Moore, D.1
Shannon, C.2
Brown, D.J.3
Voelker, G.4
Savage, S.5
-
20
-
-
77953296149
-
Revisiting the Threshold Random Walk Scan Detector
-
V. Naganokar and J. McHugh. "Revisiting the Threshold Random Walk Scan Detector". Proceedings of FloCon 2008, Savannah, GA, USA, January 2008.
-
Proceedings of FloCon 2008, Savannah, GA, USA, January 2008
-
-
Naganokar, V.1
McHugh, J.2
-
24
-
-
84991765629
-
Automated worm fingerprinting
-
S. Singh , C. Estan, G. Varghese, S. Savage. " Automated worm fingerprinting". In proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation (2004) - Volume 6, 4-4.
-
(2004)
Proceedings of the 6th Conference on Symposium on Opearting Systems Design & Implementation
, vol.6
, pp. 4-4
-
-
Singh, S.1
Estan, C.2
Varghese, G.3
Savage, S.4
-
28
-
-
33749821117
-
Detection of Super Sources and Destinations in High-Speed Networks: Algorithms, Analysis and Evaluation
-
Q. Zhao, J. Xu, and A. Kumar. "Detection of Super Sources and Destinations in High-Speed Networks: Algorithms, Analysis and Evaluation". In IEEE Journal on Selected Areas in Communications 24(10): 1840-1852 (2006).
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.10
, pp. 1840-1852
-
-
Zhao, Q.1
Xu, J.2
Kumar, A.3
|