-
1
-
-
84866352048
-
DDoS attack hobbles major sites, including Amazon
-
C. News, "DDoS attack hobbles major sites, including Amazon," http://news.cnet.com/8301-30684-3-10421577-265.html.
-
C. News
-
-
-
2
-
-
84866345132
-
Google Introduces New Security Measures after Cyber-Attack
-
W. S. Journal, "Google Introduces New Security Measures After Cyber-Attack," http://online.wsj.com/article/BT-CO-20100112-716798.html.
-
W. S. Journal
-
-
-
3
-
-
74049152260
-
Hey, You, Get off of My Cloud! Exploring Information Leakage in Third-Party Compute Clouds
-
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, "Hey, You, Get Off of My Cloud! Exploring Information Leakage in Third-Party Compute Clouds," in Proc. of ACM Conference on Computer and Communication Security (CCS), November 2009.
-
Proc. of ACM Conference on Computer and Communication Security (CCS), November 2009
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
5
-
-
70450249797
-
A Scalable, Commodity Data Center Network Architecture
-
M. Al-Fares, A. Loukissas, and A. Vahdat, "A Scalable, Commodity Data Center Network Architecture," in Proceedings of ACM SIGCOMM, August 2008.
-
Proceedings of ACM SIGCOMM, August 2008
-
-
Al-Fares, M.1
Loukissas, A.2
Vahdat, A.3
-
6
-
-
77954981414
-
BCube: A High Performance, Server-centric Network Architecture for Modular Data Centers
-
C. Guo, G. Lu, D. Li, H. Wu, X. Zhang, Y. Shi, C. Tian, Y. Zhang, and S. Lu, "BCube: A High Performance, Server-centric Network Architecture for Modular Data Centers," in Proceedings of ACM SIGCOMM, August 2009.
-
Proceedings of ACM SIGCOMM, August 2009
-
-
Guo, C.1
Lu, G.2
Li, D.3
Wu, H.4
Zhang, X.5
Shi, Y.6
Tian, C.7
Zhang, Y.8
Lu, S.9
-
7
-
-
79952284379
-
VL2: A Scalable and Flexible Data Center Network
-
A. Greenberg, J. Hamilton, N. Jain, S. Kandula, C. Kim, P. Lahiri, D. A. Maltz, and P. Pat, "VL2: A Scalable and Flexible Data Center Network," in Proceedings of ACM SIGCOMM, August 2009.
-
Proceedings of ACM SIGCOMM, August 2009
-
-
Greenberg, A.1
Hamilton, J.2
Jain, N.3
Kandula, S.4
Kim, C.5
Lahiri, P.6
Maltz, D.A.7
Pat, P.8
-
8
-
-
78650484111
-
Understanding Data Center Traffic Characteristics
-
T. Benson, A. Anand, A, Akella, and Ming Zhang, "Understanding Data Center Traffic Characteristics," in Proceedings of SIGCOMM WREN Workshop, August 2009.
-
Proceedings of SIGCOMM WREN Workshop, August 2009
-
-
Benson, T.1
Anand, A.2
Akella, A.3
Zhang, M.4
-
9
-
-
85008008496
-
Internet traffic behavior profiling for network security monitoring
-
December
-
K. Xu, Z.-L. Zhang, and S. Bhattacharyya, "Internet traffic behavior profiling for network security monitoring," IEEE/ACM Transactions on Networking, vol. 16, pp. 1241-1252, December 2008.
-
(2008)
IEEE/ACM Transactions on Networking
, vol.16
, pp. 1241-1252
-
-
Xu, K.1
Zhang, Z.-L.2
Bhattacharyya, S.3
-
10
-
-
78649491247
-
Network Prefix-level Traffic Profiling: Characterizing, Modeling, and Evaluation
-
H. Jiang, Z. Ge, S. Jin, and J. Wang, "Network Prefix-level Traffic Profiling: Characterizing, Modeling, and Evaluation," Computer Networks, 2010.
-
(2010)
Computer Networks
-
-
Jiang, H.1
Ge, Z.2
Jin, S.3
Wang, J.4
-
11
-
-
79951601753
-
Profiling-by-Association: A Resilient Traffic Profiling Solution for the Internet Backbone
-
M. Iliofotou, B. Gallagher, T. Eliassi-Rad, G. Xie, and M. Faloutsos, "Profiling-by-Association: A Resilient Traffic Profiling Solution for the Internet Backbone," in Proceedings of ACM CoNEXT, December 2010.
-
Proceedings of ACM CoNEXT, December 2010
-
-
Iliofotou, M.1
Gallagher, B.2
Eliassi-Rad, T.3
Xie, G.4
Faloutsos, M.5
-
13
-
-
61749104382
-
Profiling and identification of P2P traffic
-
April
-
Y. Hu, D.-M. Chiu, and J. Lui, "Profiling and identification of P2P traffic," Computer Networks, vol. 53, no. 6, April 2009.
-
(2009)
Computer Networks
, vol.53
, Issue.6
-
-
Hu, Y.1
Chiu, D.-M.2
Lui, J.3
-
14
-
-
77950347409
-
A view of cloud computing
-
Armando, Randy, April
-
M. Armbrust, A. Fox, Armando, R. Griffith, A. D. Joseph, R. Katz, Randy, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, "A view of cloud computing," Communications of the ACM, vol. 53, no. 4, pp. 50-58, April 2010.
-
(2010)
Communications of the ACM
, vol.53
, Issue.4
, pp. 50-58
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.5
Konwinski, A.6
Lee, G.7
Patterson, D.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
15
-
-
70349752533
-
-
Amazon, aws.amazon.com
-
Amazon, "Amazon Web Services," aws.amazon.com.
-
Amazon Web Services
-
-
-
16
-
-
77953221164
-
Securing Elasticity in the Cloud
-
June
-
D. Owens, "Securing Elasticity in the Cloud," Communications of the ACM, vol. 53, no. 6, pp. 46-51, June 2010.
-
(2010)
Communications of the ACM
, vol.53
, Issue.6
, pp. 46-51
-
-
Owens, D.1
-
18
-
-
79751511212
-
-
Technical Report No. UCB/EECS-2010-5, University of California at Berkely, January
-
Y. Chen, V. Paxson, and R. Katz, "Whats New About Cloud Computing Security?" Technical Report No. UCB/EECS-2010-5, University of California at Berkely, January 2010.
-
(2010)
Whats New about Cloud Computing Security?
-
-
Chen, Y.1
Paxson, V.2
Katz, R.3
-
19
-
-
77949849343
-
A Layered Security Approach for Cloud Computing Infrastructure
-
M. Yildiz, J. Abawajy, T. Ercan, and A. Bernoth, "A Layered Security Approach for Cloud Computing Infrastructure," in Proceedings of International Symposium on Pervasive Systems, Algorithms, and Networks (ISPAN), December 2009.
-
Proceedings of International Symposium on Pervasive Systems, Algorithms, and Networks (ISPAN), December 2009
-
-
Yildiz, M.1
Abawajy, J.2
Ercan, T.3
Bernoth, A.4
-
22
-
-
33745267664
-
PMeasure: A peer-to-peer measurement infrastructure for the Internet
-
June
-
W. Liu and R. Boutaba, "pMeasure: A peer-to-peer measurement infrastructure for the Internet," Computer Communications, vol. 29, no. 10, pp. 1665-1674, June 2006.
-
(2006)
Computer Communications
, vol.29
, Issue.10
, pp. 1665-1674
-
-
Liu, W.1
Boutaba, R.2
-
24
-
-
78650939601
-
Internet Background Radiation Revisited
-
E. Wustrow, M. Karir, M. Bailey, F. Jahanian, and G. Houston, "Internet Background Radiation Revisited," in Proceedings of ACM SIGCOMM Conference on Internet Measurement, November 2010.
-
Proceedings of ACM SIGCOMM Conference on Internet Measurement, November 2010
-
-
Wustrow, E.1
Karir, M.2
Bailey, M.3
Jahanian, F.4
Houston, G.5
-
25
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
July
-
B. Bloom, "Space/time trade-offs in hash coding with allowable errors," Communications of the ACM, vol. 13, no. 7, pp. 422-426, July 1970.
-
(1970)
Communications of the ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.1
-
26
-
-
77956067021
-
Google-Wide Profiling: A Continuous Profiling Infrastructure for Data Centers
-
G. Ren, E. Tune, T. Moseley, Y. Shi, S. Rus, and R. Hundt, "Google-Wide Profiling: A Continuous Profiling Infrastructure for Data Centers," IEEE Micro, vol. 30, no. 4, pp. 65-79, 2010.
-
(2010)
IEEE Micro
, vol.30
, Issue.4
, pp. 65-79
-
-
Ren, G.1
Tune, E.2
Moseley, T.3
Shi, Y.4
Rus, S.5
Hundt, R.6
-
29
-
-
16344396406
-
Monitoring and Early Warning for Internet Worms
-
C. Zou, L. Gao, W. Gong, and D. Towsley, "Monitoring and Early Warning for Internet Worms," in Proceedings of ACM CCS, 2003.
-
Proceedings of ACM CCS, 2003
-
-
Zou, C.1
Gao, L.2
Gong, W.3
Towsley, D.4
-
30
-
-
33845614039
-
Impact of Packet Sampling on Portscan Detection
-
December
-
J. Mai, A. Sridharan, C.-N. Chuah, H. Zang, and T. Ye, "Impact of Packet Sampling on Portscan Detection," IEEE Journal on Selected Areas in Communications, vol. 24, no. 12, pp. 2285-2298, December 2006.
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.12
, pp. 2285-2298
-
-
Mai, J.1
Sridharan, A.2
Chuah, C.-N.3
Zang, H.4
Ye, T.5
|