-
2
-
-
11144272176
-
A Taxonomy of DDOS attack and DDOS defense mechanisms
-
Apr
-
J. Mirkovic and P. Reiher, "A Taxonomy of DDOS Attack and DDOS Defense Mechanisms", ACM SIGCOMM Computer Comm. Rev., vol. 34, no. 2, pp. 39-53, Apr. 2004.
-
(2004)
ACM SIGCOMM Computer Comm. Rev.
, vol.34
, Issue.2
, pp. 39-53
-
-
Mirkovic, J.1
Reiher, P.2
-
3
-
-
78149238766
-
-
Internet Security News
-
Internet Security News, http://www.landfield.com/isn/mailarchive/2001/ Feb/0037.html, 2008.
-
(2008)
-
-
-
4
-
-
78149267774
-
-
SANS, Internet Storm Center
-
SANS, Internet Storm Center, http://isc.sans.org/, 2010.
-
(2010)
-
-
-
9
-
-
85081770459
-
The internet motion sensor: A distributed blackhole monitoring system
-
Feb
-
M. Bailey, E. Cooke, F. Jahanian, J. Nazario, and D. Watson, "The Internet Motion Sensor: A Distributed Blackhole Monitoring System", Proc. 12th Ann. Network and Distributed System Security Symp. (NDSS), Feb. 2005.
-
(2005)
Proc. 12th Ann. Network and Distributed System Security Symp. (NDSS)
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
Nazario, J.4
Watson, D.5
-
12
-
-
51349164941
-
Iloc: An invisible localization attack to internet threat monitoring systems
-
Apr
-
X. Wang, W. Yu, X. Fu, D. Xuan, and W. Zhao, "Iloc: An Invisible Localization Attack to Internet Threat Monitoring Systems", Proc. IEEE INFOCOM (Mini-Conf.), Apr. 2008.
-
(2008)
Proc. IEEE INFOCOM (Mini-conf.)
-
-
Wang, X.1
Yu, W.2
Fu, X.3
Xuan, D.4
Zhao, W.5
-
15
-
-
27544467640
-
Toward a framework for internet forensic analysis
-
Nov
-
V. Sekar, Y. Xie, D. Maltz, M. Reiter, and H. Zhang, "Toward a Framework for Internet Forensic Analysis", Proc. Third Workshop Hot Topics in Networks (HotNets), Nov. 2004.
-
(2004)
Proc. Third Workshop Hot Topics in Networks (HotNets)
-
-
Sekar, V.1
Xie, Y.2
Maltz, D.3
Reiter, M.4
Zhang, H.5
-
16
-
-
84888402098
-
The zombie roundup: Understanding, detecting, and disrupting botnets
-
July
-
E. Cooke, F. Jahanian, and D. McPherson, "The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets", Proc. Steps to Reducing Unwanted Traffic on the Internet Workshop (SRUTI), July 2005.
-
(2005)
Proc. Steps to Reducing Unwanted Traffic on the Internet Workshop (SRUTI)
-
-
Cooke, E.1
Jahanian, F.2
McPherson, D.3
-
18
-
-
0020128340
-
Theory of spread-spectrum communication: Tutorial
-
May
-
R. K. Pickholtz, D. L. Schilling, and L. B. Milstein, "Theory of Spread-Spectrum Communication: Tutorial", IEEE Trans. Comm., vol. 30, no. 5, pp. 855-884, May 1982.
-
(1982)
IEEE Trans. Comm.
, vol.30
, Issue.5
, pp. 855-884
-
-
Pickholtz, R.K.1
Schilling, D.L.2
Milstein, L.B.3
-
23
-
-
77949731575
-
Temporal sequence learning and data reduction for anomaly detection
-
Aug
-
T. Lane and C. E. Brodley, "Temporal Sequence Learning and Data Reduction for Anomaly Detection", ACM Trans. Information and System Security, vol. 2, no. 3, pp. 295-331, Aug. 1999.
-
(1999)
ACM Trans. Information and System Security
, vol.2
, Issue.3
, pp. 295-331
-
-
Lane, T.1
Brodley, C.E.2
-
25
-
-
77955214169
-
Computers beat humans at single character recognition in reading based human interaction proofs (Hips)
-
Aug
-
K. Chellapilla, K. Larson, P. Simard, and M. Czerwinski, "Computers Beat Humans at Single Character Recognition in Reading Based Human Interaction Proofs (Hips)", Proc. Fifth Conf. Email and Anti-Spam (CEAS), Aug. 2008.
-
(2008)
Proc. Fifth Conf. Email and Anti-Spam (CEAS)
-
-
Chellapilla, K.1
Larson, K.2
Simard, P.3
Czerwinski, M.4
-
26
-
-
78149244680
-
-
CAIDA, Telescope Analysis
-
CAIDA, Telescope Analysis, http://www.caida.org/analysis/security/ telescope, 2010.
-
(2010)
-
-
-
27
-
-
78149235728
-
-
myNetWatchman, myNetWatchman Project
-
myNetWatchman, myNetWatchman Project, http://www.mynetwatchman.com, 2010.
-
(2010)
-
-
-
32
-
-
85086055947
-
A risk based approach to limit the effects of covert channels for internet sensor data aggregators for sensor privacy
-
June
-
C. Viecco and J. Camp, "A Risk Based Approach to Limit the Effects of Covert Channels for Internet Sensor Data Aggregators for Sensor Privacy", Proc. Third IFIP WG 11.11 Int'l Conf. Trust Management (TM), June 2009.
-
(2009)
Proc. Third IFIP WG 11.11 Int'l Conf. Trust Management (TM)
-
-
Viecco, C.1
Camp, J.2
-
33
-
-
0032073935
-
Spreading codes generator for wireless CDMA network
-
E. J. Crusellers, M. Soriano, and J. L. Melus, "Spreading Codes Generator for Wireless cdma Network", Int'l J. Wireless Personal Comm., vol. 7, no. 1, pp. 69-88, 1998.
-
(1998)
Int'l J. Wireless Personal Comm.
, vol.7
, Issue.1
, pp. 69-88
-
-
Crusellers, E.J.1
Soriano, M.2
Melus, J.L.3
-
35
-
-
74849092532
-
Covert channels in privacy-preserving identification systems
-
Nov
-
D. Bailey, D. Boneh, E.-J. Goh, and A. Juels, "Covert Channels in Privacy-Preserving Identification Systems", Proc. 2007 ACM Conf. Computer and Comm. Security (CCS), Nov. 2007.
-
(2007)
Proc. 2007 ACM Conf. Computer and Comm. Security (CCS)
-
-
Bailey, D.1
Boneh, D.2
Goh, E.-J.3
Juels, A.4
|