-
1
-
-
84860011139
-
-
Cisco Systems, San Jose CA
-
"Understanding ACL on Catalyst 6500 series switches," Cisco Systems, San Jose, CA, 2003 [Online]. Available: http://www.cisco.com/en/US/ products/hw/switches/ps708/products-white-paper09186a00800c9470.shtml
-
(2003)
Understanding ACL on Catalyst 6500 Series Switches
-
-
-
3
-
-
42149173109
-
Using uncleanliness to predict future botnet addresses
-
San Diego, CA Oct.
-
M. Collins, T. Shimeall, S. Faber, J. Janies, R.Weaver,M.De Shon, and J. Kadane, "Using uncleanliness to predict future botnet addresses," in Proc. ACM Internet Meas. Conf., San Diego, CA, Oct. 2007, pp. 93-104.
-
(2007)
Proc. ACM Internet Meas. Conf.
, pp. 93-104
-
-
Collins, M.1
Shimeall, T.2
Faber, S.3
Janies, J.4
Weaver, R.5
De Shon, M.6
Kadane, J.7
-
4
-
-
51349126234
-
Spatial-temporal characteristics of internet malicious sources
-
Phoenix, AZ May
-
Z. Chen, C. Ji, and P. Barford, "Spatial-temporal characteristics of internet malicious sources," in Proc. IEEE INFOCOM Mini-Conf., Phoenix, AZ, May 2008, pp. 2306-2314.
-
(2008)
Proc. IEEE INFOCOM Mini-Conf.
, pp. 2306-2314
-
-
Chen, Z.1
Ji, C.2
Barford, P.3
-
5
-
-
34248379606
-
Analyzing large DDoS attacks using multiple data sources
-
DOI 10.1145/1162666.1162675, Proceedings of the 2006 SIGCOMM Workshop on Large-scale Attack Defense, LSAD'06
-
Z. Mao, V. Sekar, O. Spatscheck, J. Van Der Merwe, and R. Vasudevan, "Analyzing large DDoS attacks using multiple data sources," in Proc. ACM SIGCOMM Workshop Large-Scale Attack Defense, Pisa, Italy, Sep. 2006, pp. 161-168. (Pubitemid 46740687)
-
(2006)
Proceedings of the 2006 SIGCOMM Workshop on Large-scale Attack Defense, LSAD'06
, vol.2006
, pp. 161-168
-
-
Mao, Z.M.1
Sekar, V.2
Spatscheck, O.3
Van Der Merwe, J.4
Vasudevan, R.5
-
6
-
-
33750365498
-
Understanding the network-level behavior of spammers
-
DOI 10.1145/1151659.1159947
-
A. Ramachandran and N. Feamster, "Understanding the network-level behavior of spammers," in Proc. ACM SIGCOMM, Pisa, Italy, Sep. 2006, pp. 291-302. (Pubitemid 44623735)
-
(2006)
Computer Communication Review
, vol.36
, Issue.4
, pp. 291-302
-
-
Ramachandran, A.1
Feamster, N.2
-
7
-
-
70350215415
-
Exploiting network structure for proactive spam mitigation
-
Boston, MA Aug.
-
S. Venkataraman, S. Sen, O. Spatscheck, P. Haffner, and D. Song, "Exploiting network structure for proactive spam mitigation," presented at the USENIX Security Symp., Boston, MA, Aug. 2007.
-
(2007)
The USENIX Security Symp
-
-
Venkataraman, S.1
Sen, S.2
Spatscheck, O.3
Haffner, P.4
Song, D.5
-
8
-
-
36949011812
-
How dynamic are IP addresses?
-
DOI 10.1145/1282380.1282415, ACM SIGCOMM 2007: Conference on Computer Communications
-
Y. Xie, F. Yu, K. Achan, E. Gillum, M. Goldszmidt, and T. Wobber, "How dynamic are IP addresses?," in Proc. ACM SIGCOMM, Kyoto, Japan, Aug. 2007, pp. 301-312. (Pubitemid 350239793)
-
(2007)
ACM SIGCOMM 2007: Conference on Computer Communications
, pp. 301-312
-
-
Xie, Y.1
Yu, F.2
Achan, K.3
Gillum, E.4
Goldszmidt, M.5
Wobber, T.6
-
9
-
-
85077707798
-
Highly predictive blacklisting
-
San Jose, CA Jul.
-
J. Zhang, P. Porras, and J. Ullrich, "Highly predictive blacklisting," presented at the USENIX Security Symp., San Jose, CA, Jul. 2008.
-
(2008)
The USENIX Security Symp
-
-
Zhang, J.1
Porras, P.2
Ullrich, J.3
-
10
-
-
84859974958
-
Dshield: Cooperative network security community-Internet security
-
"Dshield: Cooperative network security community-Internet security," Dshield.org [Online]. Available: http://www.dshield.org
-
Dshield.org
-
-
-
14
-
-
0036647190
-
An efficient k-means clustering algorithms: Analysis and implementation
-
DOI 10.1109/TPAMI.2002.1017616
-
T. Kanungo, D. Mount, N. Netanyahu, C. Piatko, R. Silverman, and A. Wu, "An efficient k-means clustering algorithm: Analysis and implementation," IEEE Trans. Pattern Anal. Mach. Intell., vol. 24, no. 7, pp. 881-892, Jul. 2002. (Pubitemid 34835464)
-
(2002)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.24
, Issue.7
, pp. 881-892
-
-
Kanungo, T.1
Mount, D.M.2
Netanyahu, N.S.3
Piatko, C.D.4
Silverman, R.5
Wu, A.Y.6
-
15
-
-
50049083120
-
On filtering of DDoS attacks based on source address prefixes
-
Istanbul, Turkey Sep.
-
G. Pack, J. Yoon, E. Collins, and C. Estan, "On filtering of DDoS attacks based on source address prefixes," presented at the SecureComm, Istanbul, Turkey, Sep. 2006.
-
(2006)
The SecureComm
-
-
Pack, G.1
Yoon, J.2
Collins, E.3
Estan, C.4
-
16
-
-
0141650502
-
Observed structure of addresses in IP traffic
-
Marseille, France Nov.
-
E. Kohler, J. Li, V. Paxson, and S. Shenker, "Observed structure of addresses in IP traffic," in Proc. ACM SIGCOMM Workshop Internet Meas., Marseille, France, Nov. 2002, pp. 253-266.
-
(2002)
Proc. ACM SIGCOMM Workshop Internet Meas.
, pp. 253-266
-
-
Kohler, E.1
Li, J.2
Paxson, V.3
Shenker, S.4
-
17
-
-
34548324846
-
Measuring network-aware worm spreading ability
-
DOI 10.1109/INFCOM.2007.22, 4215604, Proceedings - IEEE INFOCOM 2007: 26th IEEE International Conference on Computer Communications
-
Z. Chen and C. Ji, "Measuring network-aware worm spreading ability," in Proc. IEEE INFOCOM, Anchorage, AK, May 2007, pp. 116-124. (Pubitemid 47334222)
-
(2007)
Proceedings - IEEE INFOCOM
, pp. 116-124
-
-
Chen, Z.1
Ji, C.2
-
18
-
-
16444383160
-
Survey of clustering algorithms
-
DOI 10.1109/TNN.2005.845141
-
R. Xu and D. Wunsch, II, "Survey of clustering algorithms," IEEE Trans. Neural Netw., vol. 16, no. 3, pp. 645-678, May 2005. (Pubitemid 40718010)
-
(2005)
IEEE Transactions on Neural Networks
, vol.16
, Issue.3
, pp. 645-678
-
-
Xu, R.1
Wunsch II, D.2
-
19
-
-
4544272175
-
Controlling high bandwidth aggregates in the network
-
Jul.
-
R. Mahajan, S. Bellovin, S. Floyd, J. Ioannidis, V. Paxson, and S. Schenker, "Controlling high bandwidth aggregates in the network," Comput. Commun. Rev., vol. 32, pp. 62-73, Jul. 2002.
-
(2002)
Comput. Commun. Rev.
, vol.32
, pp. 62-73
-
-
Mahajan, R.1
Bellovin, S.2
Floyd, S.3
Ioannidis, J.4
Paxson, V.5
Schenker, S.6
-
20
-
-
69249233518
-
Scalable network-layer defense against internet bandwidth-flooding attacks
-
Aug.
-
K. Argyraki and D. Cheriton, "Scalable network-layer defense against internet bandwidth-flooding attacks," IEEE/ACMTrans. Netw., vol. 17, no. 4, pp. 1284-1297, Aug. 2009.
-
(2009)
IEEE/ACMTrans. Netw.
, vol.17
, Issue.4
, pp. 1284-1297
-
-
Argyraki, K.1
Cheriton, D.2
-
21
-
-
65249149520
-
To filter or to authorize: Network-layer DoS defense against multimillion-node botnets
-
Seattle, WA Aug.
-
X. Liu, X. Yang, and Y. Lu, "To filter or to authorize: Network-layer DoS defense against multimillion-node botnets," in Proc. ACM SIGCOMM, Seattle, WA, Aug. 2008, pp. 195-206.
-
(2008)
Proc. ACM SIGCOMM
, pp. 195-206
-
-
Liu, X.1
Yang, X.2
Lu, Y.3
-
22
-
-
84859999208
-
High performance packet classification
-
"High performance packet classification," HiPAC.org [Online]. Available: http://www.hipac.org/performance-tests/results.html
-
HiPAC.org
-
-
-
23
-
-
84859999206
-
-
DePaul University, Chicago IL
-
E. Al-Shaer and H. Hamed, "Firewall policy advisor," DePaul University, Chicago, IL, 2005 [Online]. Available: http://www.mnlab. cs.depaul.edu/projects/SPA
-
(2005)
Firewall Policy Advisor
-
-
Al-Shaer, E.1
Hamed, H.2
-
24
-
-
84858728623
-
Tracking dynamic sources of malicious activity at internet-scale
-
BC, Canada Dec.
-
S. Venkataraman, A. Blum, D. Song, S. Sen, and O. Spatscheck, "Tracking dynamic sources of malicious activity at internet-scale," presented at the NIPS Whistler, BC, Canada, Dec. 2009.
-
(2009)
The NIPS Whistler
-
-
Venkataraman, S.1
Blum, A.2
Song, D.3
Sen, S.4
Spatscheck, O.5
-
25
-
-
14944356227
-
Online identification of hierarchical heavy hitters: Algorithms, evaluation, and applications
-
Proceedings of the 2004 ACM SIGCOMM Internet Measurement Conference, IMC 2004
-
Y. Zhang, S. Singh, S. Sen, N. Duffield, and C. Lund, "Online identification of hierarchical heavy hitters: Algorithms, evaluation, and applications," in Proc. ACM SIGCOMM Internet Meas. Conf., Taormina, Italy, Oct. 2004, pp. 101-114. (Pubitemid 40372035)
-
(2004)
Proceedings of the 2004 ACM SIGCOMM Internet Measurement Conference, IMC 2004
, pp. 101-114
-
-
Zhang, Y.1
Singh, S.2
Sen, S.3
Duffield, N.4
Lund, C.5
-
26
-
-
1242310086
-
Automatically inferring patterns of resource consumption in network traffic
-
Karlsruhe, Germany Aug.
-
C. Estan, S. Savage, and G.Varghese, "Automatically inferring patterns of resource consumption in network traffic," in Proc. ACMSIGCOMM, Karlsruhe, Germany, Aug. 2003, pp. 137-148.
-
(2003)
Proc. ACMSIGCOMM
, pp. 137-148
-
-
Estan, C.1
Savage, S.2
Varghese, G.3
-
27
-
-
3142735161
-
Diamond in the rough: Finding hierarchical heavy hitters in multi-dimensional data
-
Paris, France Jun.
-
G. Cormode, F. Korn, S. Muthukrishnan, and D. Srivastava, "Diamond in the rough: Finding hierarchical heavy hitters in multi-dimensional data," in Proc. ACM SIGMOD Int. Conf. Manage. Data, Paris, France, Jun. 2004, pp. 155-166.
-
(2004)
Proc. ACM SIGMOD Int. Conf. Manage. Data
, pp. 155-166
-
-
Cormode, G.1
Korn, F.2
Muthukrishnan, S.3
Srivastava, D.4
-
28
-
-
0000143954
-
A linear programming approach to the cutting stock problem-Part II
-
P. Gilmore and R. Gomory, "A linear programming approach to the cutting stock problem-Part II," Oper. Res., vol. 11, no. 6, pp. 863-888, 1963.
-
(1963)
Oper. Res.
, vol.11
, Issue.6
, pp. 863-888
-
-
Gilmore, P.1
Gomory, R.2
-
29
-
-
0033879594
-
Approximation algorithms for knapsack problems with cardinality constraints
-
DOI 10.1016/S0377-2217(99)00261-1
-
A. Caprara, H. Kellerer, U. Pferschy, and D. Pisinger, "Approximation algorithms for knapsack problems with cardinality constraints," Eur. J. Oper. Res., vol. 123, no. 2, pp. 333-345, 2000. (Pubitemid 30596940)
-
(2000)
European Journal of Operational Research
, vol.123
, Issue.2
, pp. 333-345
-
-
Caprara, A.1
Kellerer, H.2
Pferschy, U.3
Pisinger, D.4
-
30
-
-
5644249597
-
Solving multidimensional knapsack problems with generalized upper bound constraints using critical event tabu search
-
V. Li and G. Curry, "Solving multidimensional knapsack problems with generalized upper bound constraints using critical event tabu search," Comput. Oper. Res., vol. 32, no. 4, pp. 825-848, 2005.
-
(2005)
Comput. Oper. Res.
, vol.32
, Issue.4
, pp. 825-848
-
-
Li, V.1
Curry, G.2
-
31
-
-
0030110028
-
LP relaxation of the two dimensional knapsack problem with box and GUB constraints
-
DOI 10.1016/0377-2217(94)00285-1
-
A. Bagchi, N. Bhattacharyya, and N. Chakravarti, "LP relaxation of the two dimensional knapsack problem with box and GUB constraints," Eur. J. Oper. Res., vol. 89, no. 3, pp. 609-617, 1996. (Pubitemid 126386792)
-
(1996)
European Journal of Operational Research
, vol.89
, Issue.3
, pp. 609-617
-
-
Bagchi, A.1
Bhattacharyya, N.2
Chakravarti, N.3
-
32
-
-
14944345436
-
A polyhedral study of the cardinality constrained knapsack problem
-
I. de Farias, Jr and G. Nemhauser, "A polyhedral study of the cardinality constrained knapsack problem," Math. Program., vol. 96, no. 3, pp. 439-467, 2003.
-
(2003)
Math. Program.
, vol.96
, Issue.3
, pp. 439-467
-
-
De Farias Jr., I.1
Nemhauser, G.2
-
33
-
-
70349658385
-
Optimal filtering of source address prefixes: Models and algorithms
-
Rio de Janeiro, Brazil Apr.
-
F. Soldo, A. Markopoulou, and K. Argyraki, "Optimal filtering of source address prefixes: Models and algorithms," in Proc. IEEE INFOCOM, Rio de Janeiro, Brazil, Apr. 2009, pp. 2446-2454.
-
(2009)
Proc. IEEE INFOCOM
, pp. 2446-2454
-
-
Soldo, F.1
Markopoulou, A.2
Argyraki, K.3
-
34
-
-
52949114582
-
Filtering sources of unwanted traffic
-
San Diego, CA Jan.
-
F. Soldo, K. El Defrawy, A. Markopoulou, B. Krishnamurthy, and J. Van Der Merwe, "Filtering sources of unwanted traffic," presented at the Inf. Theory Appl. Workshop, San Diego, CA, Jan. 2008.
-
(2008)
The Inf. Theory Appl. Workshop
-
-
Soldo, F.1
El Defrawy, K.2
Markopoulou, A.3
Krishnamurthy, B.4
Merwe Der J.Van5
|