-
1
-
-
36949033604
-
Ethane : TTTaking control of the enterprise
-
M. Casado, M. J. Freedman, J. Pettit, J. Luo, N. McKeown, and S. Shenker. Ethane : Taking control of the enterprise. In SIGCOMM '07, 2007.
-
(2007)
SIGCOMM '07
-
-
Casado, M.1
Freedman, M.J.2
Pettit, J.3
Luo, J.4
McKeown, N.5
Shenker, S.6
-
3
-
-
77954321144
-
-
Cisco Application eXtension Platform Overview
-
Cisco Application eXtension Platform Overview. http://www.cisco.com/en/ US/prod/collateral/routers/ps9701/white-paper-c11-459082.html.
-
-
-
-
4
-
-
0016949746
-
A lattice model of secure information flow
-
May
-
D. E. Denning. A lattice model of secure information flow. Communications of the ACM, 19(5):236-243, May 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
7
-
-
11244271633
-
The case for separating routing from routers
-
Portland, OR, Sept.
-
N. Feamster, H. Balakrishnan, J. Rexford, A. Shaikh, and K. van der Merwe. The case for separating routing from routers. In ACM SIGCOMM Workshop on Future Directions in Network Architecture, Portland, OR, Sept. 2004.
-
(2004)
ACM SIGCOMM Workshop on Future Directions in Network Architecture
-
-
Feamster, N.1
Balakrishnan, H.2
Rexford, J.3
Shaikh, A.4
Merwe Der K.Van5
-
8
-
-
33750037341
-
A clean slate 4D approach to network control and management
-
A. Greenberg, G. Hjalmtysson, D. A. Maltz, A. Myers, J. Rexford, G. Xie, H. Yan, J. Zhan, and H. Zhang. A clean slate 4D approach to network control and management. ACM Computer Communications Review, 35(5):41-54, 2005.
-
(2005)
ACM Computer Communications Review
, vol.35
, Issue.5
, pp. 41-54
-
-
Greenberg, A.1
Hjalmtysson, G.2
Maltz, D.A.3
Myers, A.4
Rexford, J.5
Xie, G.6
Yan, H.7
Zhan, J.8
Zhang, H.9
-
9
-
-
85075837457
-
BotMiner: Clustering analysis of network traffic for protocol- and structure-independent botnet detection
-
G. Gu, R. Perdisci, J. Zhang, and W. Lee. BotMiner: Clustering analysis of network traffic for protocol- and structure-independent botnet detection. In 17th USENIX Security Symposium, 2008.
-
(2008)
17th USENIX Security Symposium
-
-
Gu, G.1
Perdisci, R.2
Zhang, J.3
Lee, W.4
-
10
-
-
70350656962
-
NOX: Towards an operating system for networks
-
July
-
N. Gude, T. Koponen, J. Pettit, B. Pfaff, M. Casado, N. McKeown, and S. Shenker. NOX: towards an operating system for networks. ACM SIGCOMM Computer Communication Review, 38(3):105-110, July 2008.
-
(2008)
ACM SIGCOMM Computer Communication Review
, vol.38
, Issue.3
, pp. 105-110
-
-
Gude, N.1
Koponen, T.2
Pettit, J.3
Pfaff, B.4
Casado, M.5
McKeown, N.6
Shenker, S.7
-
11
-
-
78650904811
-
-
Feb., In submission; Earlier version appeared as Georgia Tech Technical Report GT-CSE-08-102
-
S. Hao, N. Syed, N. Feamster, A. Gray, and S. Krasser. Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine. http://www.cc.gatech.edu/~feamster/papers/snare-tr.pdf, Feb. 2009. In submission; Earlier version appeared as Georgia Tech Technical Report GT-CSE-08-102
-
(2009)
Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine
-
-
Hao, S.1
Syed, N.2
Feamster, N.3
Gray, A.4
Krasser, S.5
-
12
-
-
77954330731
-
-
Technical report Dec.
-
T. Hinrichs, N. Gude, M. Casado, J. Mitchell, and S. Shenker. Expressing and enforcing flow-based network security policies. Technical report, Dec. 2008.
-
(2008)
Expressing and Enforcing Flow-based Network Security Policies
-
-
Hinrichs, T.1
Gude, N.2
Casado, M.3
Mitchell, J.4
Shenker, S.5
-
13
-
-
0032050466
-
IP switching - ATM under IP
-
P. Newman, G. Minshall, and T. L. Lyon. IP Switching - ATM under IP. IEEE/ACM Trans. Netw., 6(2):117-129, 1998.
-
(1998)
IEEE/ACM Trans. Netw.
, vol.6
, Issue.2
, pp. 117-129
-
-
Newman, P.1
Minshall, G.2
Lyon, T.L.3
-
14
-
-
77954348301
-
-
OpenFlow Switch Consortium
-
OpenFlow Switch Consortium. http://www.openflowswitch.org/, 2008.
-
(2008)
-
-
-
15
-
-
77952388137
-
Filtering spam with behavioral blacklisting
-
Alexandria, VA, Oct.
-
A. Ramachandran, N. Feamster, and S. Vempala. Filtering spam with behavioral blacklisting. In Proc. 14th ACM Conference on Computer and Communications Security, Alexandria, VA, Oct. 2007.
-
(2007)
Proc. 14th ACM Conference on Computer and Communications Security
-
-
Ramachandran, A.1
Feamster, N.2
Vempala, S.3
-
16
-
-
77954334717
-
-
Scanning Technology for Automated Registration, Repair and Response Tasks.
-
Scanning Technology for Automated Registration, Repair and Response Tasks. https://start.gatech.edu/.
-
-
-
-
17
-
-
84877761671
-
NANO: Network access neutrality observatory
-
Calgary, Alberta. Canada., Oct.
-
M. B. Tariq, M. Motiwala, and N. Feamster. NANO: Network Access Neutrality Observatory. In Proc. 7th ACM Workshop on Hot Topics in Networks (Hotnets-VII), Calgary, Alberta. Canada., Oct. 2008.
-
(2008)
Proc. 7th ACM Workshop on Hot Topics in Networks (Hotnets-VII)
-
-
Tariq, M.B.1
Motiwala, M.2
Feamster, N.3
-
18
-
-
0032063993
-
The tempest - A practical framework for network programmability
-
May
-
J. van der Merwe, S. Rooney, I. Leslie, and S. Crosby. The Tempest - A Practical Framework for Network Programmability. IEEE Network, 12(3):20-28, May 1998.
-
(1998)
IEEE Network
, vol.12
, Issue.3
, pp. 20-28
-
-
Merwe Der J.Van1
Rooney, S.2
Leslie, I.3
Crosby, S.4
-
19
-
-
77954343579
-
-
Configuring Dynamic Port VLAN Membership with VMPS
-
Configuring Dynamic Port VLAN Membership with VMPS. http://www.cisco.com/ univercd/cc/td/doc/product/lan/cat5000/rel-4-2/config/vmps.htm.
-
-
-
|