-
1
-
-
33845633068
-
Sketch guided sampling - Using on-line estimates of ow size for adaptive data collection
-
A. Kumar and J. Xu. Sketch guided sampling - using on-line estimates of ow size for adaptive data collection. In Proc. IEEE Infocom, 2006.
-
(2006)
Proc. IEEE Infocom
-
-
Kumar, A.1
Xu, J.2
-
3
-
-
4444311813
-
Divide and concatenate: An architectural level optimization technique for universal hash functions
-
R. K. B. Yang and D.A.McGrew. Divide and concatenate: An architectural level optimization technique for universal hash functions. In Proc. of the Design Automation Conference, 2004.
-
(2004)
Proc. of the Design Automation Conference
-
-
Yang, R.K.B.1
McGrew, D.A.2
-
4
-
-
85080378133
-
An algorithm for anomaly-based botnet detection
-
J. R. Binkley and S. Singh. An algorithm for anomaly-based botnet detection. In Proc. USENIX SRUTI, 2006.
-
(2006)
Proc. USENIX SRUTI
-
-
Binkley, J.R.1
Singh, S.2
-
5
-
-
85175133385
-
Botsniffer: Detecting botnet command and control channels in network traffic
-
G. Gu, J. Zhang, and W. Lee. Botsniffer: Detecting botnet command and control channels in network traffic. In Proc. NDSS, 2008.
-
(2008)
Proc. NDSS
-
-
Gu, G.1
Zhang, J.2
Lee, W.3
-
6
-
-
85061529860
-
Bothunter: Detecting malware infection through IDS-driven dialog correlation
-
G. Gu, P. Porras, V. Yegneswaran, M. Fong, W. and Lee. Bothunter: Detecting malware infection through IDS-driven dialog correlation. In Proc. USENIX Security, 2007.
-
(2007)
Proc. USENIX Security
-
-
Gu, G.1
Porras, P.2
Yegneswaran, V.3
Fong, M.4
Lee, W.5
-
7
-
-
85075837457
-
Botminer: Clustering analysis of network traffic for protocol- and structure-independent botnet detection
-
G. Gu, R. Perdisci, J. Zhang, and W. Lee. Botminer: Clustering analysis of network traffic for protocol- and structure-independent botnet detection. In Proc. USENIX Security, 2008.
-
(2008)
Proc. USENIX Security
-
-
Gu, G.1
Perdisci, R.2
Zhang, J.3
Lee, W.4
-
8
-
-
57849085977
-
Rishi: Identify bot contaminated hosts by irc nickname evaluation
-
J. Goebel and T. Holz. Rishi: identify bot contaminated hosts by irc nickname evaluation. In Proc. USENIX HotBots, 2007.
-
(2007)
Proc. USENIX HotBots
-
-
Goebel, J.1
Holz, T.2
-
9
-
-
51349163638
-
Accurate and efficient traffic monitoring using adaptive non-linear sampling method
-
C. Hu, S. Wang, J. Tian, B. Liu, Y. Cheng, and Y. Chen. Accurate and efficient traffic monitoring using adaptive non-linear sampling method. In Proc. IEEE Infocom, 2008.
-
(2008)
Proc. IEEE Infocom
-
-
Hu, C.1
Wang, S.2
Tian, J.3
Liu, B.4
Cheng, Y.5
Chen, Y.6
-
11
-
-
77952351261
-
Towards complete node enumeration in a peer-to-peer botnet
-
B. Kang, E. C. Tin, and C. P. Lee. Towards complete node enumeration in a peer-to-peer botnet. In Proc. ACM AISACCS, 2009.
-
(2009)
Proc. ACM AISACCS
-
-
Kang, B.1
Tin, E.C.2
Lee, C.P.3
-
16
-
-
77950794331
-
Fire: Finding rogue networks
-
B. Stone-Gross, A. Moser, C. Kruegel, E. Kirda, and K. Almeroth. Fire: Finding rogue networks. In Proc. ACSAC, 2009.
-
(2009)
Proc. ACSAC
-
-
Stone-Gross, B.1
Moser, A.2
Kruegel, C.3
Kirda, E.4
Almeroth, K.5
-
18
-
-
77955861102
-
Are your hosts trading or plotting? telling p2p file-sharing and bots apart
-
T.-F. Yen and M. K. Reiter. Are your hosts trading or plotting? telling p2p file-sharing and bots apart. In ICDCS, 2010.
-
(2010)
ICDCS
-
-
Yen, T.-F.1
Reiter, M.K.2
-
20
-
-
84908346958
-
Rb-seeker: Auto-detection of redirection botnets
-
X. Hu, M. Knysz and K. Shin. Rb-seeker: Auto-detection of redirection botnets. In Proc. NDSS, 2009.
-
(2009)
Proc. NDSS
-
-
Hu, X.1
Knysz, M.2
Shin, K.3
-
21
-
-
14944356227
-
Online identification of hierarchical heavy hitters: Algorithms, evaluation, and applications
-
Y. Zhang, S. Singh, S. Sen, N. Duffield and C. Lund. Online identification of hierarchical heavy hitters: Algorithms, evaluation, and applications. In Proc. ACM IMC, 2004.
-
(2004)
Proc. ACM IMC
-
-
Zhang, Y.1
Singh, S.2
Sen, S.3
Duffield, N.4
Lund, C.5
-
23
-
-
58449108281
-
Traffic aggregation for malware detection
-
T.-F. Yen and M. K. Reiter. Traffic aggregation for malware detection. In Proc. DIMVA, 2008.
-
(2008)
Proc. DIMVA
-
-
Yen, T.-F.1
Reiter, M.K.2
-
24
-
-
0030157145
-
Birch: An efficient data clustering method for very large databases
-
ACM Press
-
T. Zhang, R. Ramakrishnan, and M. Livny. Birch: An efficient data clustering method for very large databases. In Proc. ACM SIGMOD. ACM Press, 1996.
-
(1996)
Proc. ACM SIGMOD
-
-
Zhang, T.1
Ramakrishnan, R.2
Livny, M.3
|