-
2
-
-
84872294071
-
GT: Picking up the truth from the ground for internet traffic
-
Gringoli, F., Salgarelli, L., Dusi, M., Cascarano, N., Risso, F., Claffy, K.C.: GT: picking up the truth from the ground for internet traffic. In: SIGCOMM Comput. Commun. Rev. (2009).
-
(2009)
SIGCOMM Comput. Commun. Rev.
-
-
Gringoli, F.1
Salgarelli, L.2
Dusi, M.3
Cascarano, N.4
Risso, F.5
Claffy, K.C.6
-
3
-
-
70350402293
-
Prospex: Protocol specification extraction
-
Comparetti, P.M., Wondracek, G., Kruegel, C., Kirda, E.: Prospex: Protocol Specification Extraction. In: SP 2009: Proceedings of the 2009 30th IEEE Symposium on Security and Privacy (2009).
-
(2009)
SP 2009: Proceedings of the 2009 30th IEEE Symposium on Security and Privacy
-
-
Comparetti, P.M.1
Wondracek, G.2
Kruegel, C.3
Kirda, E.4
-
5
-
-
77952403312
-
Polyglot: Automatic extraction of protocol message format using dynamic binary analysis
-
Caballero, J., Yin, H., Liang, Z., Song, D.: Polyglot: automatic extraction of protocol message format using dynamic binary analysis. In: CCS 2007: Proceedings of the 14th ACM conference on Computer and Communications Security (2007).
-
(2007)
CCS 2007: Proceedings of the 14th ACM Conference on Computer and Communications Security
-
-
Caballero, J.1
Yin, H.2
Liang, Z.3
Song, D.4
-
7
-
-
29244451861
-
ACAS: Automated construction of application signatures
-
Haffner, P., Sen, S., Spatscheck, O., Wang, D.: ACAS: automated construction of application signatures. In: MineNet 2005: Proceedings of the 2005 ACM SIGCOMM workshop on Mining network data (2005).
-
(2005)
MineNet 2005: Proceedings of the 2005 ACM SIGCOMM Workshop on Mining Network Data
-
-
Haffner, P.1
Sen, S.2
Spatscheck, O.3
Wang, D.4
-
8
-
-
34547427252
-
Semi-automated discovery of application session structure
-
Kannan, J., Jung, J., Paxson, V., Koksal, C.E.: Semi-automated discovery of application session structure. In: IMC 2006: Proceedings of the 6th ACM SIGCOMM conference on Internet measurement (2006).
-
(2006)
IMC 2006: Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement
-
-
Kannan, J.1
Jung, J.2
Paxson, V.3
Koksal, C.E.4
-
9
-
-
34249790654
-
Unexpected means of protocol inference
-
Ma, J., Levchenko, K., Kreibich, C., Savage, S., Voelker, G.M.: Unexpected means of protocol inference. In: IMC 2006: Proceedings of the 6th ACM SIGCOMM conference on Internet measurement (2006).
-
(2006)
IMC 2006: Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement
-
-
Ma, J.1
Levchenko, K.2
Kreibich, C.3
Savage, S.4
Voelker, G.M.5
-
10
-
-
22944474900
-
Probabilistic finite-state machines-Part i
-
Vidal, E., Thollard, F., de la Higuera, C., Casacuberta, F., Carrasco, R.C.: Probabilistic Finite-State Machines-Part I. IEEE Trans. Pattern Anal. Mach. Intell. (2005).
-
(2005)
IEEE Trans. Pattern Anal. Mach. Intell.
-
-
Vidal, E.1
Thollard, F.2
De La Higuera, C.3
Casacuberta, F.4
Carrasco, R.C.5
-
11
-
-
0003477556
-
-
Oxford University Press, Inc., Oxford
-
Kendall, M.G., Stuart, A., Ord, J.K.: Kendall's advanced theory of statistics. Oxford University Press, Inc., Oxford (1987).
-
(1987)
Kendall's Advanced Theory of Statistics
-
-
Kendall, M.G.1
Stuart, A.2
Ord, J.K.3
-
13
-
-
84980090975
-
The distribution of the flora in the alpine zone
-
Jaccard, P.: The distribution of the flora in the alpine zone. The New Phytologist (1912).
-
(1912)
The New Phytologist
-
-
Jaccard, P.1
-
14
-
-
85077688456
-
Towards automatic discovery of deviations in binary implementations with applications to error detection and fingerprint generation
-
Brumley, D., Caballero, J., Liang, Z., Newsome, J., Song, D.: Towards automatic discovery of deviations in binary implementations with applications to error detection and fingerprint generation. In: SS 2007: Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium (2007).
-
(2007)
SS 2007: Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
-
-
Brumley, D.1
Caballero, J.2
Liang, Z.3
Newsome, J.4
Song, D.5
-
15
-
-
85038902950
-
FiG: Automatic fingerprint generation
-
Caballero, J., Venkataraman, S., Poosankam, P., Kang, M.G., Song, D., Blum, A.: FiG: Automatic Fingerprint Generation. In: Annual Network and Distributed System Security Symposium (2007).
-
(2007)
Annual Network and Distributed System Security Symposium
-
-
Caballero, J.1
Venkataraman, S.2
Poosankam, P.3
Kang, M.G.4
Song, D.5
Blum, A.6
-
16
-
-
85077692116
-
Dynamic applicationlayer protocol analysis for network intrusion detection
-
Dreger, H., Feldmann, A., Mai, M., Paxson, V., Sommer, R.: Dynamic applicationlayer protocol analysis for network intrusion detection. In: USENIX-SS 2006: Proceedings of the 15th conference on USENIX Security Symposium (2006).
-
(2006)
USENIX-SS 2006: Proceedings of the 15th Conference on USENIX Security Symposium
-
-
Dreger, H.1
Feldmann, A.2
Mai, M.3
Paxson, V.4
Sommer, R.5
-
18
-
-
84941155240
-
Well separated clusters and optimal fuzzy-partitions
-
Dunn, J.C.: Well separated clusters and optimal fuzzy-partitions. Journal of Cybernetics (1974).
-
(1974)
Journal of Cybernetics
-
-
Dunn, J.C.1
-
19
-
-
79959325077
-
-
ternet2 netflow statistics
-
Internet2 netflow statistics, http://netflow.internet2.edu.
-
-
-
-
20
-
-
79959319225
-
-
XUNLEI
-
XUNLEI, http://www.xunlei.com/.
-
-
-
-
21
-
-
79959319824
-
-
PPLIVE
-
PPLIVE, http://www.pptv.com/.
-
-
-
-
22
-
-
79959289521
-
-
How SambaWasWritten
-
How SambaWasWritten, http://samba.org/ftp/tridge/misc/french-cafe.txt.
-
-
-
|