-
2
-
-
14944369649
-
Characteristics of internet background radiation
-
R. Pang, V. Yegneswaran, P. Barford, V. Paxson, and L. Peterson, "Characteristics of internet background radiation," in Proc. ACM IMC, Taormina, Sicily, Italy, 2004.
-
(2004)
Proc. ACM IMC, Taormina, Sicily, Italy
-
-
Pang, R.1
Yegneswaran, V.2
Barford, P.3
Paxson, V.4
Peterson, L.5
-
4
-
-
34547399387
-
A multifaceted approach to understanding the botnet phenomenon
-
M. Rajab, J. Zarfoss, F. Monrose, and A. Terzis, "A multifaceted approach to understanding the botnet phenomenon," in Proc. ACM IMC, Rio de Janeiro, Brazil, 2006.
-
(2006)
Proc. ACM IMC, Rio de Janeiro, Brazil
-
-
Rajab, M.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
8
-
-
34547427252
-
Semi-automated discovery of application session structure
-
J. Kannan et al., "Semi-automated discovery of application session structure," in Proc. ACM IMC, Rio de Janeiro, Brazil, 2006.
-
(2006)
Proc. ACM IMC, Rio de Janeiro, Brazil
-
-
Kannan, J.1
-
9
-
-
69849109516
-
Using honeynets for internet situational awareness
-
V. Yegneswaran, P. Barford, and V. Paxson, "Using honeynets for internet situational awareness," in Proc. ACM Hotnets IV, College Park, MD, 2005.
-
(2005)
Proc. ACM Hotnets IV, College Park, MD
-
-
Yegneswaran, V.1
Barford, P.2
Paxson, V.3
-
10
-
-
77953328281
-
Measurement and diagnosis of address-misconfigured P2P traffic
-
Z. Li, A. Goyal, Y. Chen, and A. Kuzmanovic, "Measurement and diagnosis of address-misconfigured P2P traffic," in Proc. IEEE INFOCOM, San Diego, CA, 2010.
-
(2010)
Proc. IEEE INFOCOM, San Diego, CA
-
-
Li, Z.1
Goyal, A.2
Chen, Y.3
Kuzmanovic, A.4
-
11
-
-
16344396406
-
Monitoring and early warning for internet worms
-
C. C. Zou et al., "Monitoring and early warning for internet worms," in Prof. ACM CCS, Washington, DC, 2003.
-
(2003)
Prof. ACM CCS, Washington, DC
-
-
Zou, C.C.1
-
17
-
-
85058835823
-
Mapping internet sensors with probe response attacks
-
Baltimore, MD
-
J. Bethencourt, J. Franklin, and M. Vernon, "Mapping internet sensors with probe response attacks," in Proc. USENIX Security, Baltimore, MD, 2005.
-
(2005)
Proc. USENIX Security
-
-
Bethencourt, J.1
Franklin, J.2
Vernon, M.3
-
18
-
-
79951824148
-
-
Tech. Rep. TR1577
-
J. Cai, V. Yesneswaran, C. Alfeld, and P. Barfard, Honeynets and Honeygames: A Game Theoretic Approach to Defending Network Monitors University ofWiscconsin, Tech. Rep. TR1577, 2006.
-
(2006)
Honeynets and Honeygames: A Game Theoretic Approach to Defending Network Monitors University OfWiscconsin
-
-
Cai, J.1
Yesneswaran, V.2
Alfeld, C.3
Barfard, P.4
-
19
-
-
79951842874
-
-
[Online] Available
-
OS Platform Statistics by W3school [Online]. Available: http://www. w3schools.com/browsers/browsers-stats.asp
-
OS Platform Statistics by W3school
-
-
-
20
-
-
79951819194
-
-
[Online] Available
-
AP Market Sharing [Online]. Available: http://news.com.com/Microsofts+Wi- Fi+ups+and+downs/2100-1039-3-994518
-
AP Market Sharing
-
-
-
22
-
-
79951832178
-
-
[Online] Available
-
Net-Worm.Win32Allaple.a [Online]. Available: http://www.viruslist. com/en/viruses/encyclopedia?virusid=145521
-
Net-Worm.Win32Allaple.a
-
-
-
23
-
-
77952395048
-
Automating analysis of large-scale botnet probing events
-
Z. Li, A. Goyal, Y. Chen, and V. Paxson, "Automating analysis of large-scale botnet probing events," in Proc. ACM Asia CCS, Sydney, Australia, 2009.
-
(2009)
Proc. ACM Asia CCS, Sydney, Australia
-
-
Li, Z.1
Goyal, A.2
Chen, Y.3
Paxson, V.4
-
24
-
-
79960561313
-
Collaborating against common enemies
-
S. Katti, B. Krishnamurhy, and D. Katabi, "Collaborating against common enemies," in Proc. ACMIMC, Berkeley, CA, 2005.
-
(2005)
Proc. ACMIMC, Berkeley, CA
-
-
Katti, S.1
Krishnamurhy, B.2
Katabi, D.3
-
25
-
-
79951834025
-
-
[Online] Available
-
Honey Bow Sensor [Online]. Available: http://honeybow.mwcollect.org
-
Honey Bow Sensor
-
-
-
26
-
-
79951840412
-
-
[Online] Available
-
Honeysnap [Online]. Available: http://www.honeynet.org/tools/honeysnap/ index.html
-
Honeysnap
-
-
-
27
-
-
0742276097
-
Inside the slammer worm
-
D. Moore et al., "Inside the slammer worm," IEEE Security Privacy Mag., vol. 1, no. 4, pp. 33-39, 2003.
-
(2003)
IEEE Security Privacy Mag.
, vol.1
, Issue.4
, pp. 33-39
-
-
Moore, D.1
-
28
-
-
84878701299
-
Exploiting underlying structure for detailed reconstruction of an internet scale event
-
A. Kumar, V. Paxson, and N. Weaver, "Exploiting underlying structure for detailed reconstruction of an internet scale event," in Proc. ACM IMC, Berkeley, CA, 2005.
-
(2005)
Proc. ACM IMC, Berkeley, CA
-
-
Kumar, A.1
Paxson, V.2
Weaver, N.3
|