-
1
-
-
56449096542
-
-
Cisco ios netflow. http://www.cisco.com/warp/public/732/Tech/nmp/netflow/index.shtml.
-
Cisco ios netflow
-
-
-
4
-
-
85094679576
-
-
Internet routing registry. Version current January 2003
-
Internet routing registry. http://www.irr.net/. Version current January 2003.
-
-
-
-
5
-
-
85094673437
-
-
libpcap utility
-
libpcap utility. http://sourceforge.net/projects/libpcap.
-
-
-
-
7
-
-
85094668065
-
-
Ripe ncc
-
Ripe ncc. http://www.ripe.net.
-
-
-
-
8
-
-
85094654594
-
-
Routeviews
-
Routeviews. http://www.routeviews.org/.
-
-
-
-
9
-
-
85094668568
-
-
Sprint IPMON project
-
Sprint IPMON project. http://ipmon.sprint.com/.
-
-
-
-
17
-
-
0034581037
-
Ten risks of PKI: What you're not being told about public key infrastructure
-
at
-
C. Ellison and B. Schneier. Ten risks of PKI: What you're not being told about public key infrastructure. Computer Security Journal, 16(1):1-7, 2000. Available online at URL http://www.counterpane.com/pki-risks.html.
-
(2000)
Computer Security Journal
, vol.16
, Issue.1
, pp. 1-7
-
-
Ellison, C.1
Schneier, B.2
-
19
-
-
85180543778
-
Working around BGP: An incremental approach to improving security and accuracy of interdomain routing
-
San Diego, CA, USA, Feb
-
G. Goodell, W. Aiello, T. Griffin, J. Ioannidis, P. McDaniel, and A. Rubin. Working around BGP: An incremental approach to improving security and accuracy of interdomain routing. In Proc. of NDSS, San Diego, CA, USA, Feb. 2003.
-
(2003)
Proc. of NDSS
-
-
Goodell, G.1
Aiello, W.2
Griffin, T.3
Ioannidis, J.4
McDaniel, P.5
Rubin, A.6
-
20
-
-
84961572484
-
SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks
-
June
-
Y. Hu, D. B. Johnson, and A. Perrig. SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks. In Proc. of WMCSA, June 2002.
-
(2002)
Proc. of WMCSA
-
-
Hu, Y.1
Johnson, D. B.2
Perrig, A.3
-
21
-
-
0003597249
-
-
Technical Report TR01-384, Department of Computer Science, Rice University, Dec
-
Y. Hu, A. Perrig, and D. B. Johnson. Wormhole detection in wireless ad hoc networks. Technical Report TR01-384, Department of Computer Science, Rice University, Dec. 2001.
-
(2001)
Wormhole detection in wireless ad hoc networks
-
-
Hu, Y.1
Perrig, A.2
Johnson, D. B.3
-
22
-
-
84982836904
-
Efficient security mechanisms for routing protocols
-
February
-
Y. Hu, A. Perrig, and D. B. Johnson. Efficient security mechanisms for routing protocols. In Proc. of NDSS'03, February 2003.
-
(2003)
Proc. of NDSS'03
-
-
Hu, Y.1
Perrig, A.2
Johnson, D. B.3
-
23
-
-
85094679179
-
Design and analysis of the Secure Border Gateway Protocol (S-BGP)
-
S. Kent, C. Lynn, and K. Seo. Design and analysis of the Secure Border Gateway Protocol (S-BGP). In Proc. of DISCEX'00.
-
Proc. of DISCEX'00
-
-
Kent, S.1
Lynn, C.2
Seo, K.3
-
24
-
-
0033743163
-
Secure Border Gateway Protocol (Secure-BGP)
-
Apr
-
S. Kent, C. Lynn, and K. Seo. Secure Border Gateway Protocol (Secure-BGP). IEEE Journal on Selected Areas of Communications, 18(4):582-592, Apr. 2000.
-
(2000)
IEEE Journal on Selected Areas of Communications
, vol.18
, Issue.4
, pp. 582-592
-
-
Kent, S.1
Lynn, C.2
Seo, K.3
-
27
-
-
84961751347
-
Retrofitting security into Internet infrastructure protocols
-
S. Murphy, O. Gudmundsson, R. Mundy, and B. Wellington. Retrofitting security into Internet infrastructure protocols. In Proc. of DISCEX'00, volume 1, pages 3-17, 1999.
-
(1999)
Proc. of DISCEX'00
, vol.1
, pp. 3-17
-
-
Murphy, S.1
Gudmundsson, O.2
Mundy, R.3
Wellington, B.4
-
29
-
-
3042669550
-
Secure traceroute to detect faulty or malicious routing
-
V. N. Padmanabhan and D. R. Simon. Secure traceroute to detect faulty or malicious routing. In Proc. HotNets-I, 2002.
-
(2002)
Proc. HotNets-I
-
-
Padmanabhan, V. N.1
Simon, D. R.2
-
30
-
-
85013350011
-
Wide area traffic: Failure of poisson modeling
-
V. Paxson and S.Floyd. Wide area traffic: Failure of poisson modeling. In Proc. ACM SIGCOMM, 1994.
-
(1994)
Proc. ACM SIGCOMM
-
-
Paxson, V.1
Floyd, S.2
-
33
-
-
85094641239
-
-
R. Thomas. http://www.cmyru.com.
-
-
-
Thomas, R.1
-
34
-
-
1542300243
-
An analysis of BGP multiple origin AS (MOAS) conflicts
-
X. Zhao, D. Pei, L. Wang, D. Massey, A. Mankin, S. F. Wu, and L. Zhang. An analysis of BGP multiple origin AS (MOAS) conflicts. In ACM SIGCOMM IMW, 2001.
-
(2001)
ACM SIGCOMM IMW
-
-
Zhao, X.1
Pei, D.2
Wang, L.3
Massey, D.4
Mankin, A.5
Wu, S. F.6
Zhang, L.7
|