-
2
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
V. Paxson. Bro: a system for detecting network intruders in real-time. Computer Networks, 31(23-24):2435-2463, 1999.
-
(1999)
Computer Networks
, vol.31
, Issue.23-24
, pp. 2435-2463
-
-
Paxson, V.1
-
5
-
-
61749100211
-
Efficient application identification and the temporal and spatial stability of classification schema
-
Apr
-
W. Li et al. Efficient application identification and the temporal and spatial stability of classification schema. Computer Networks, 53(6):790-809, Apr 2009.
-
(2009)
Computer Networks
, vol.53
, Issue.6
, pp. 790-809
-
-
Li, W.1
-
6
-
-
56449109261
-
Tunnel Hunter: Detecting application-layer tunnels with statistical fingerprinting
-
Jan
-
M. Dusi et al. Tunnel Hunter: Detecting application-layer tunnels with statistical fingerprinting. Computer Networks, 53(1):81-97, Jan 2009.
-
(2009)
Computer Networks
, vol.53
, Issue.1
, pp. 81-97
-
-
Dusi, M.1
-
8
-
-
0040291388
-
The Click Modular Router
-
R. Morris et al. The Click Modular Router. ACM Trans. Comput. Syst., 18(3):263-297, 2000.
-
(2000)
ACM Trans. Comput. Syst.
, vol.18
, Issue.3
, pp. 263-297
-
-
Morris, R.1
-
9
-
-
70450232823
-
Network applications of bloom filters: A survey
-
A. Broder & M. Mitzenmacher. Network applications of bloom filters: A survey. Internet Mathematics, 1(4):485-609, 2003.
-
(2003)
Internet Mathematics
, vol.1
, Issue.4
, pp. 485-609
-
-
Broder, A.1
Mitzenmacher, M.2
-
10
-
-
2442583610
-
New directions in traffic measurement and accounting: Focusing on the elephants, ignoring the mice
-
C. Estan and G. Varghese. New directions in traffic measurement and accounting: Focusing on the elephants, ignoring the mice. ACM Trans. Comput. Syst., 21(3):270-313, 2003.
-
(2003)
ACM Trans. Comput. Syst.
, vol.21
, Issue.3
, pp. 270-313
-
-
Estan, C.1
Varghese, G.2
-
11
-
-
8344263038
-
Space-code bloom filter for efficient per-flow traffic measurement
-
A. Kumar et al. Space-code bloom filter for efficient per-flow traffic measurement. In Proceedings of IEEE INFOCOM, Mar 2004.
-
Proceedings of IEEE INFOCOM, Mar 2004
-
-
Kumar, A.1
-
12
-
-
33745874149
-
Characteristics of internet background radiation
-
R. Pang et al. Characteristics of internet background radiation. In Proceedings of IMC'04, 2004.
-
Proceedings of IMC'04, 2004
-
-
Pang, R.1
-
13
-
-
0028384238
-
Caching strategies to improve disk system performance
-
R. Karedla et al. Caching strategies to improve disk system performance. Computer, 27(3), 1994.
-
(1994)
Computer
, vol.27
, Issue.3
-
-
Karedla, R.1
-
14
-
-
67650302604
-
GTVS: Boosting the collection of application traffic ground truth
-
M. Canini et al. GTVS: Boosting the collection of application traffic ground truth. In Proceedings of TMA'09, May 2009.
-
Proceedings of TMA'09, May 2009
-
-
Canini, M.1
-
16
-
-
33746890192
-
Snort offloader: A reconfigurable hardware NIDS filter
-
H. Song et al. Snort offloader: A reconfigurable hardware NIDS filter. In Proceedings of FPL'05, 2005.
-
Proceedings of FPL'05, 2005
-
-
Song, H.1
-
17
-
-
67650317025
-
Shunting: A hardware/software architecture for flexible, high-performance network intrusion prevention
-
J. Gonzalez et al. Shunting: A hardware/software architecture for flexible, high-performance network intrusion prevention. In Proceedings of CCS'07, 2007.
-
Proceedings of CCS'07, 2007
-
-
Gonzalez, J.1
|