-
1
-
-
34547491379
-
Lessons learned from the deployment of a high-interaction honeypot
-
IEEE Computer Society Press, Washington, DC, USA
-
Alata, E., Nicomette, V., Kaaniche, M., Dacier, M., Herrb, M.: Lessons learned from the deployment of a high-interaction honeypot. In: EDCC 2006: Proceedings of the Sixth European Dependable Computing Conference, pp. 39-46. IEEE Computer Society Press, Washington, DC, USA (2006)
-
(2006)
EDCC 2006: Proceedings of the Sixth European Dependable Computing Conference
, pp. 39-46
-
-
Alata, E.1
Nicomette, V.2
Kaaniche, M.3
Dacier, M.4
Herrb, M.5
-
2
-
-
33847789378
-
Cisco Systems NetFlow Services Export
-
Version 9. (Informational) October
-
Claise, B.: Cisco Systems NetFlow Services Export Version 9. RFC 3954 (Informational) (October 2004)
-
(2004)
RFC
, vol.3954
-
-
Claise, B.1
-
3
-
-
80051574706
-
-
Hewlett-Packard Development Company
-
Hewlett-Packard Development Company. Top Cyber Security Risks Threat Report for (2010), http://dvlabs.tippingpoint.com/toprisks2010
-
(2010)
Top Cyber Security Risks Threat Report for
-
-
-
4
-
-
80051561820
-
-
Dragon Research Group. sshpwauth report (2010), http://www. dragonresearchgroup.org/insight/sshpwauth.txt
-
(2010)
Sshpwauth Report
-
-
-
6
-
-
80051575079
-
-
INVEA-TECH. Standard FlowMon Probe (2009), http://www.invea-tech.com/
-
(2009)
Standard FlowMon Probe
-
-
-
7
-
-
0004192381
-
Identification and Entity Authentication
-
CRC Press, Boca Raton
-
Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A., Rivest, R.L.: Identification and Entity Authentication. In: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)
-
(1997)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
Van Oorschot, P.C.2
Vanstone, S.A.3
Rivest, R.L.4
-
8
-
-
11144272176
-
A Taxonomy of DDoS Attack and DDoS Defense Mechanisms
-
Mirkovic, J., Reiher, P.: A Taxonomy of DDoS Attack and DDoS Defense Mechanisms. SIGCOMM Comput. Commun. Rev. 34(2), 39-53 (2004)
-
(2004)
SIGCOMM Comput. Commun. Rev.
, vol.34
, Issue.2
, pp. 39-53
-
-
Mirkovic, J.1
Reiher, P.2
-
10
-
-
77955469676
-
An Overview of IP Flow-Based Intrusion Detection
-
Sperotto, A., Schaffrath, G., Sadre, R., Morariu, C., Pras, A., Stiller, B.: An Overview of IP Flow-Based Intrusion Detection. Communications Surveys Tutorials 12(3), 343-356 (2010)
-
(2010)
Communications Surveys Tutorials
, vol.12
, Issue.3
, pp. 343-356
-
-
Sperotto, A.1
Schaffrath, G.2
Sadre, R.3
Morariu, C.4
Pras, A.5
Stiller, B.6
-
11
-
-
50049096256
-
A Distributed Active Response Architecture for Preventing SSH Dictionary Attacks
-
Thames, J.L., Abler, R., Keeling, D.: A Distributed Active Response Architecture for Preventing SSH Dictionary Attacks. In: IEEE Southeastcon 2008, pp. 84-89 (2008)
-
(2008)
IEEE Southeastcon 2008
, pp. 84-89
-
-
Thames, J.L.1
Abler, R.2
Keeling, D.3
-
12
-
-
63049094145
-
Bidirectional Flow Export Using IP Flow Information Export (IPFIX)
-
(Proposed Standard) January
-
Trammell, B., Boschi, E.: Bidirectional Flow Export Using IP Flow Information Export (IPFIX). RFC 5103 (Proposed Standard) (January 2008)
-
(2008)
RFC
, vol.5103
-
-
Trammell, B.1
Boschi, E.2
-
13
-
-
33748559731
-
-
Springer, Heidelberg
-
Zezula, P., Amato, G., Dohnal, V., Batko, M.: Similarity Search - The Metric Space Approach, vol. 32. Springer, Heidelberg (2006)
-
(2006)
Similarity Search - The Metric Space Approach
, vol.32
-
-
Zezula, P.1
Amato, G.2
Dohnal, V.3
Batko, M.4
|