-
1
-
-
34147099073
-
Survey of network-based defense mechanisms countering the dos and ddos problems
-
T. Peng, C. Leckie, and K. Ramamohanarao, "Survey of network-based defense mechanisms countering the dos and ddos problems," ACM Computing Survey, vol. 39, no. 1, 2007.
-
(2007)
ACM Computing Survey
, vol.39
, Issue.1
-
-
Peng, T.1
Leckie, C.2
Ramamohanarao, K.3
-
2
-
-
77955872093
-
On anonymity in an electronic society: A survey of anonymous communication systems
-
M. Edman and B. Yener, "On anonymity in an electronic society: A survey of anonymous communication systems," ACM Computing Survey, vol. 42, no. 1, 2009.
-
(2009)
ACM Computing Survey
, vol.42
, Issue.1
-
-
Edman, M.1
Yener, B.2
-
3
-
-
74049154670
-
Your botnet is my botnet: Analysis of a botnet takeover
-
B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, R. Kemmerer, C. Kruegel, and G. Vigna, "Your botnet is my botnet: Analysis of a botnet takeover," in CCS '09: Proceedings of the 2009 ACM conference on computer communication security, 2009.
-
(2009)
CCS '09: Proceedings of the 2009 ACM Conference on Computer Communication Security
-
-
Stone-Gross, B.1
Cova, M.2
Cavallaro, L.3
Gilbert, B.4
Szydlowski, M.5
Kemmerer, R.6
Kruegel, C.7
Vigna, G.8
-
4
-
-
66249147541
-
A survey of botnet technology and defenses
-
M. Bailey, E. Cooke, F. Jahanian, Y. Xu, and M. Karir, "A survey of botnet technology and defenses," in Proceedings of the 2009 cybersecurity applications and technology conference for Homeland security, 2009.
-
(2009)
Proceedings of the 2009 Cybersecurity Applications and Technology Conference for Homeland Security
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
Xu, Y.4
Karir, M.5
-
5
-
-
58149490850
-
Information theory based detection against network behavior mimicking ddos attack
-
S. Yu, W. Zhou, and R. Doss, "Information theory based detection against network behavior mimicking ddos attack," IEEE Communications Letters, vol. 12, no. 4, pp. 319-321, 2008.
-
(2008)
IEEE Communications Letters
, vol.12
, Issue.4
, pp. 319-321
-
-
Yu, S.1
Zhou, W.2
Doss, R.3
-
6
-
-
70349659341
-
Adaptive early packet filtering for protecting firewalls against dos attacks
-
A. El-Atawy, E. Al-Shaer, T. Tran, and R. Boutaba, "Adaptive early packet filtering for protecting firewalls against dos attacks," in Proceedings of the INFOCOM, 2009.
-
(2009)
Proceedings of the INFOCOM
-
-
El-Atawy, A.1
Al-Shaer, E.2
Tran, T.3
Boutaba, R.4
-
7
-
-
61449197774
-
A large-scale hidden semi-markov model for anomaly detection on user browsing behaviors
-
Y. Xie and S.-Z. Yu, "A large-scale hidden semi-markov model for anomaly detection on user browsing behaviors," IEEE/ACM Transactions on Networking, vol. 17, no. 1, pp. 54-65, 2009.
-
(2009)
IEEE/ACM Transactions on Networking
, vol.17
, Issue.1
, pp. 54-65
-
-
Xie, Y.1
Yu, S.-Z.2
-
8
-
-
74049154670
-
Your botnet is my botnet: Analysis of a botnet takeover
-
B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, R. Kemmerer, C. Kruegel, and G. Vigna, "Your botnet is my botnet: Analysis of a botnet takeover," in Proceedings of the 2009 ACM conference on computer communication security, 2009.
-
(2009)
Proceedings of the 2009 ACM Conference on Computer Communication Security
-
-
Stone-Gross, B.1
Cova, M.2
Cavallaro, L.3
Gilbert, B.4
Szydlowski, M.5
Kemmerer, R.6
Kruegel, C.7
Vigna, G.8
-
9
-
-
85084097075
-
Insights from the inside: A view of botnet management from infiltration
-
C. Y. Cho, J. Caballero, C. Grier, V. Paxson, and D. Song, "Insights from the inside: A view of botnet management from infiltration," in Proceedings of USENIX LEET, 2010.
-
(2010)
Proceedings of USENIX LEET
-
-
Cho, C.Y.1
Caballero, J.2
Grier, C.3
Paxson, V.4
Song, D.5
-
10
-
-
36249008514
-
-
SEC
-
V. L. L. Thing, M. Sloman, and N. Dulay, "A survey of bots used for distributed denial of service attacks," in SEC, 2007, pp. 229-240.
-
(2007)
A Survey of Bots Used for Distributed Denial of Service Attacks
, pp. 229-240
-
-
Thing, V.L.L.1
Sloman, M.2
Dulay, N.3
-
11
-
-
85000701895
-
My botnet is bigger than yours (maybe, better than yours): Why size estimates remain challenging
-
M. A. Rajab, J. Zarfoss, F. Monrose, and A. Terzis, "My botnet is bigger than yours (maybe, better than yours): why size estimates remain challenging," in HotBots'07: Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets, 2007.
-
(2007)
HotBots'07: Proceedings of the First Conference on First Workshop on Hot Topics in Understanding Botnets
-
-
Rajab, M.A.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
12
-
-
0032670943
-
Web caching and zipf-like distributions: Evidence and implications
-
L. Breslau, P. Cao, L. Fan, G. Phillips, and S. Shenker, "Web caching and zipf-like distributions: Evidence and implications," in Proceedings of the INFOCOM, 1999, pp. 126-134.
-
(1999)
Proceedings of the INFOCOM
, pp. 126-134
-
-
Breslau, L.1
Cao, P.2
Fan, L.3
Phillips, G.4
Shenker, S.5
-
13
-
-
33947425424
-
Citations and the zipf-mandelbrot's law
-
Z. K. Silagadze, "Citations and the zipf-mandelbrot's law," Complex Systems, vol. 11, p. 487, 1997.
-
(1997)
Complex Systems
, vol.11
, pp. 487
-
-
Silagadze, Z.K.1
-
14
-
-
14944364487
-
Characterizing the query behavior in peer-to-peer file sharing systems
-
New York, NY, USA: ACM
-
A. Klemm, C. Lindemann, M. K. Vernon, and O. P. Waldhorst, "Characterizing the query behavior in peer-to-peer file sharing systems," in Proceedings of the 4th ACM SIGCOMM conference on Internet measurement. New York, NY, USA: ACM, 2004, pp. 55-67.
-
(2004)
Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement
, pp. 55-67
-
-
Klemm, A.1
Lindemann, C.2
Vernon, M.K.3
Waldhorst, O.P.4
-
15
-
-
57949085517
-
Traffic modeling and proportional partial caching for peer-to-peer systems
-
M. Hefeeda and O. Saleh, "Traffic modeling and proportional partial caching for peer-to-peer systems," IEEE/ACM Transactions on Networking, vol. 16, no. 6, pp. 1447-1460, 2008.
-
(2008)
IEEE/ACM Transactions on Networking
, vol.16
, Issue.6
, pp. 1447-1460
-
-
Hefeeda, M.1
Saleh, O.2
-
16
-
-
0031383380
-
Self-similarity in world wide web traffic: Evidence and possible causes
-
M. E. Crovella and A. Bestavros, "Self-similarity in world wide web traffic: evidence and possible causes," IEEE/ACM Transactions on Networking, vol. 5, no. 6, pp. 835-846, 1997.
-
(1997)
IEEE/ACM Transactions on Networking
, vol.5
, Issue.6
, pp. 835-846
-
-
Crovella, M.E.1
Bestavros, A.2
-
17
-
-
0032478716
-
Strong regularities in world wide web surfing
-
B. A. Huberman, P. L. T. Pirolli, J. E. Pitkow, and R. M. Lukose, "Strong regularities in world wide web surfing," Science, vol. 280, no. 3, 1998.
-
(1998)
Science
, vol.280
, Issue.3
-
-
Huberman, B.A.1
Pirolli, P.L.T.2
Pitkow, J.E.3
Lukose, R.M.4
-
18
-
-
79960601554
-
A brief history of generative models for power law and lognornal distributions
-
M. Mitzenmacher, "A brief history of generative models for power law and lognornal distributions," Internet Mathematics, vol. 1, 2004.
-
(2004)
Internet Mathematics
, vol.1
-
-
Mitzenmacher, M.1
-
19
-
-
3042550642
-
The double pareto-lognormal distribution - A new parametric model for size distributions
-
W. J. Reed and M. Jorgensen, "The double pareto-lognormal distribution - a new parametric model for size distributions," Communication in Statistics - Theory and Methods, vol. 33, no. 8, pp. 1733-1753, 2003.
-
(2003)
Communication in Statistics - Theory and Methods
, vol.33
, Issue.8
, pp. 1733-1753
-
-
Reed, W.J.1
Jorgensen, M.2
-
21
-
-
27544453628
-
User centric walk: An integrated approach for modeling the browsing behavior of users on the web
-
Washington, DC, USA: IEEE Computer Society
-
S. Burklen, P. J. Marron, S. Fritsch, and K. Rothermel, "User centric walk: An integrated approach for modeling the browsing behavior of users on the web," in ANSS '05: Proceedings of the 38th annual Symposium on Simulation. Washington, DC, USA: IEEE Computer Society, 2005, pp. 149-159.
-
(2005)
ANSS '05: Proceedings of the 38th Annual Symposium on Simulation
, pp. 149-159
-
-
Burklen, S.1
Marron, P.J.2
Fritsch, S.3
Rothermel, K.4
|