-
1
-
-
85031236652
-
Operating Systems Support for Planetary-Scale Network Services
-
Bavier, A.; Bowman, M.; Chun, B.; Culler, D.; Karlin, S.; Muir, S.; Peterson, L.; Roscoe, T.; Spalink, T.; Wawrzoniak, M.; 2004. Operating Systems Support for Planetary-Scale Network Services, USENIX Symposium on Networked Systems Design and Implementation (NSDI), pp. 253-266.
-
(2004)
USENIX Symposium on Networked Systems Design and Implementation (NSDI)
, pp. 253-266
-
-
Bavier, A.1
Bowman, M.2
Chun, B.3
Culler, D.4
Karlin, S.5
Muir, S.6
Peterson, L.7
Roscoe, T.8
Spalink, T.9
Wawrzoniak, M.10
-
2
-
-
71549132338
-
A distortion free watermark framework for relational databases
-
B. Shishkov, J. Cordeiro, A. Ranchordas, INSTICC Press Sofia, Bulgaria
-
S. Bhattacharya, and A. Cortesi A distortion free watermark framework for relational databases B. Shishkov, J. Cordeiro, A. Ranchordas, ICSOFT (2) 2009 INSTICC Press Sofia, Bulgaria 229 234
-
(2009)
ICSOFT (2)
, pp. 229-234
-
-
Bhattacharya, S.1
Cortesi, A.2
-
3
-
-
71549145624
-
A generic distortion free watermarking technique for relational databases
-
A. Prakash, I. Gupta, Springer Kolkata, India 10.1007/978-3-642-10772-6
-
S. Bhattacharya, and A. Cortesi A generic distortion free watermarking technique for relational databases A. Prakash, I. Gupta, ICISS. Vol. 5905 of Lecture Notes in Computer Science 2009 Springer Kolkata, India 252 264 10.1007/978-3-642-10772-6
-
(2009)
ICISS. Vol. 5905 of Lecture Notes in Computer Science
, pp. 252-264
-
-
Bhattacharya, S.1
Cortesi, A.2
-
4
-
-
85080378133
-
An algorithm for anomaly-based botnet detection.
-
USENIX Association, Berkeley, CA, USA
-
J.R. Binkley, and S. Singh An algorithm for anomaly-based botnet detection. SRUTI '06: Proceedings of the 2nd Conference on Steps to Reducing Unwanted Traffic on the Internet USENIX Association, Berkeley, CA, USA 2006 7
-
(2006)
SRUTI '06: Proceedings of the 2nd Conference on Steps to Reducing Unwanted Traffic on the Internet
, pp. 7
-
-
Binkley, J.R.1
Singh, S.2
-
5
-
-
42149173109
-
Using uncleanliness to predict future botnet addresses
-
ACM, New York, NY, USA
-
M.P. Collins, T.J. Shimeall, S. Faber, J. Janies, R. Weaver, M. De Shon, and J. Kadane Using uncleanliness to predict future botnet addresses IMC '07: Proceedings of the 7th ACM SIGCOMM Conference on Internet measurement ACM, New York, NY, USA 2007 93 104
-
(2007)
IMC '07: Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement
, pp. 93-104
-
-
Collins, M.P.1
Shimeall, T.J.2
Faber, S.3
Janies, J.4
Weaver, R.5
De Shon, M.6
Kadane, J.7
-
10
-
-
85177693003
-
Rainbow: A robust and invisible non-blind watermark for network flows
-
A. Houmansadr, N. Kiyavash, and N. Borisov Rainbow: a robust and invisible non-blind watermark for network flows NDSS 2009
-
(2009)
NDSS
-
-
Houmansadr, A.1
Kiyavash, N.2
Borisov, N.3
-
12
-
-
77649330399
-
Distortion-free watermarking scheme for wireless sensor networks
-
Y. Badr, S. Caballé, F. Xhafa, A. Abraham, B. Gros
-
I. Kamel, O. AlKoky, and A.A.A. Dakkak Distortion-free watermarking scheme for wireless sensor networks Y. Badr, S. Caballé, F. Xhafa, A. Abraham, B. Gros, INCoS. IEEE 2009 135 140 http://ieeexplore.ieee.org/xpl/ mostRecentIssue.jsp?punumber=5367992
-
(2009)
INCoS. IEEE
, pp. 135-140
-
-
Kamel, I.1
Alkoky, O.2
Dakkak, A.A.A.3
-
15
-
-
80052167664
-
Multi-flow attacks against network flow watermarking schemes
-
P. van Oorschot, USENIX Association, Berkeley CA, USA
-
N. Kiyavash, A. Houmansadr, and N. Borisov Multi-flow attacks against network flow watermarking schemes P. van Oorschot, USENIX Security Symposium 2008 USENIX Association, Berkeley CA, USA
-
(2008)
USENIX Security Symposium
-
-
Kiyavash, N.1
Houmansadr, A.2
Borisov, N.3
-
16
-
-
58249139558
-
Distortion-free secret image sharing mechanism using modulus operator
-
MAY 5 10.1016/j.patcog.2008.09.014
-
P.Y. Lin, J.S. Lee, and C.C. Chang Distortion-free secret image sharing mechanism using modulus operator Pattern Recognition 42 May (5) 2009 886 895 10.1016/j.patcog.2008.09.014
-
(2009)
Pattern Recognition
, vol.42
, pp. 886-895
-
-
Lin, P.Y.1
Lee, J.S.2
Chang, C.C.3
-
17
-
-
80052986561
-
Stegobot: A covert social network botnet.
-
A. Ker, S. Kraver, T. Filler, Springer Berlin, Heidelberg
-
S. Nagaraja, A. Houmansadr, P. Agarwal, V. Kumar, P. Piyawongwisal, and N. Borisov Stegobot: a covert social network botnet. A. Ker, S. Kraver, T. Filler, 13th Information Hiding Conference (IH). Lecture Notes in Computer Science 2011 Springer Berlin, Heidelberg
-
(2011)
13th Information Hiding Conference (IH). Lecture Notes in Computer Science
-
-
Nagaraja, S.1
Houmansadr, A.2
Agarwal, P.3
Kumar, V.4
Piyawongwisal, P.5
Borisov, N.6
-
18
-
-
0003894635
-
-
Status: EXPERIMENTAL.; ftp://ftp.math.utah.edu/pub/rfc/rfc1459.txt
-
Oikarinen, J.; Reed, D.; 1993. RFC 1459: Internet Relay Chat Protocol. Status: EXPERIMENTAL. ftp://ftp.internic.net/rfc/rfc1459.txt, ftp://ftp.math.utah.edu/pub/rfc/rfc1459.txt.
-
(1993)
RFC 1459: Internet Relay Chat Protocol
-
-
Oikarinen, J.1
Reed, D.2
-
20
-
-
34548314612
-
Tracing traffic through intermediate hosts that repacketize flows
-
DOI 10.1109/INFCOM.2007.80, 4215662, Proceedings - IEEE INFOCOM 2007: 26th IEEE International Conference on Computer Communications
-
Y. Pyun, Y. Park, X. Wang, D.S. Reeves, and P. Ning Tracing traffic through intermediate hosts that repacketize flows. G. Kesidis, E. Modiano, R. Srikant, IEEE Conference on Computer Communications (INFOCOM). 2007 634 642 (Pubitemid 47334280)
-
(2007)
Proceedings - IEEE INFOCOM
, pp. 634-642
-
-
Pyun, Y.J.1
Park, Y.H.2
Wang, X.3
Reeves, D.S.4
Ning, P.5
-
21
-
-
33750365498
-
Understanding the network-level behavior of spammers
-
DOI 10.1145/1151659.1159947
-
A. Ramachandran, and N. Feamster Understanding the network-level behavior of spammers L. Rizzo, T.E. Anderson, N. McKeown, SIGCOMM 2006 ACM 291 302 (Pubitemid 44623735)
-
(2006)
Computer Communication Review
, vol.36
, Issue.4
, pp. 291-302
-
-
Ramachandran, A.1
Feamster, N.2
-
22
-
-
77952717608
-
Revealing botnet membership using dnsbl counter-intelligence.
-
USENIX Association, Berkeley, CA, USA
-
A. Ramachandran, N. Feamster, and D. Dagon Revealing botnet membership using dnsbl counter-intelligence. SRUTI'06: Proceedings of the 2nd Conference on Steps to Reducing Unwanted Traffic on the Internet USENIX Association, Berkeley, CA, USA 2006 8
-
(2006)
SRUTI'06: Proceedings of the 2nd Conference on Steps to Reducing Unwanted Traffic on the Internet
, pp. 8
-
-
Ramachandran, A.1
Feamster, N.2
Dagon, D.3
-
23
-
-
56549101103
-
A first step towards live botmaster traceback
-
R. Lippmann, E. Kirda, A. Trachtenberg, Springer
-
D. Ramsbrock, X. Wang, and X. Jiang A first step towards live botmaster traceback R. Lippmann, E. Kirda, A. Trachtenberg, RAID. Vol. 5230 of Lecture Notes in Computer Science 2008 Springer 59 77
-
(2008)
RAID. Vol. 5230 of Lecture Notes in Computer Science
, pp. 59-77
-
-
Ramsbrock, D.1
Wang, X.2
Jiang, X.3
-
24
-
-
1642516070
-
The Honeynet Project: Trapping the hackers
-
L. Spitzner The Honeynet Project: trapping the hackers IEEE Security & Privacy Magazine 1 2 2003 15 23
-
(2003)
IEEE Security & Privacy Magazine
, vol.1
, Issue.2
, pp. 15-23
-
-
Spitzner, L.1
-
25
-
-
79952494106
-
Distortion free geometry based secret image sharing
-
10.1016/j.procs.2010.12.119
-
G. Ulutas, M. Ulutas, and V.V. Nabiyev Distortion free geometry based secret image sharing Procedia CS 3 2011 721 726 10.1016/j.procs.2010.12.119
-
(2011)
Procedia
, vol.3 CS
, pp. 721-726
-
-
Ulutas, G.1
Ulutas, M.2
Nabiyev, V.V.3
-
26
-
-
72949095419
-
Bayesian bot detection based on dns traffic similarity.
-
ACM, New York, NY, USA
-
R. Villamarín-Salomón, and J.C. Brustoloni Bayesian bot detection based on dns traffic similarity. In: SAC '09: Proceedings of the 2009 ACM Symposium on Applied Computing ACM, New York, NY, USA 2009 2035 2041
-
(2009)
SAC '09: Proceedings of the 2009 ACM Symposium on Applied Computing
, pp. 2035-2041
-
-
Villamarín-Salomón, R.1
Brustoloni, J.C.2
-
28
-
-
34548762543
-
Network flow watermarking attack on low-latency anonymous communication systems
-
DOI 10.1109/SP.2007.30, 4223219, Proceedings - S and P 2007: 2007 IEEE Symposium on Security and Privacy, SP'07
-
X. Wang, S. Chen, and S. Jajodia Network flow watermarking attack on low-latency anonymous communication systems B. Pfitzmann, P. McDaniel, IEEE Symposium on Security and Privacy 2007 116 130 (Pubitemid 47432521)
-
(2007)
Proceedings - IEEE Symposium on Security and Privacy
, pp. 116-130
-
-
Wang, X.1
Chen, S.2
Jajodia, S.3
-
29
-
-
84957003012
-
Inter-packet delay based correlation for tracing encrypted connections through stepping stones.
-
D. Gollmann, G. Karjoth, M. Waidner, Springer
-
X. Wang, D. Reeves, and S.F. Wu Inter-packet delay based correlation for tracing encrypted connections through stepping stones. D. Gollmann, G. Karjoth, M. Waidner, European Symposium on Research in Computer Security. Vol. 2502 of Lecture Notes in Computer Science 2002 Springer 244 263
-
(2002)
European Symposium on Research in Computer Security. Vol. 2502 of Lecture Notes in Computer Science
, pp. 244-263
-
-
Wang, X.1
Reeves, D.2
Wu, S.F.3
-
30
-
-
2442556704
-
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
-
Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
-
X. Wang, and D.S. Reeves Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays V. Atluri, ACM Conference on Computer and Communications Security 2003 ACM New York, NY, USA 20 29 (Pubitemid 40673785)
-
(2003)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 20-29
-
-
Wang, X.1
Reeves, D.S.2
-
31
-
-
34548755641
-
DSSS-based flow marking technique for invisible traceback
-
DOI 10.1109/SP.2007.14, 4223211, Proceedings - S and P 2007: 2007 IEEE Symposium on Security and Privacy, SP'07
-
W. Yu, X. Fu, S. Graham, D. Xuan, and W. Zhao DSSS-based flow marking technique for invisible traceback B. Pfitzmann, P. McDaniel, IEEE Symposium on Security and Privacy 2007 18 32 (Pubitemid 47432513)
-
(2007)
Proceedings - IEEE Symposium on Security and Privacy
, pp. 18-32
-
-
Yu, W.1
Fu, X.2
Graham, S.3
Xuan, D.4
Zhao, W.5
-
32
-
-
85084161090
-
Detecting stepping stones.
-
S. Bellovin, G. Rose, USENIX Association Berkeley, CA, USA
-
Y. Zhang, and V. Paxson Detecting stepping stones. S. Bellovin, G. Rose, USENIX Security Symposium 2000 USENIX Association Berkeley, CA, USA 171 184
-
(2000)
USENIX Security Symposium
, pp. 171-184
-
-
Zhang, Y.1
Paxson, V.2
-
33
-
-
61649123904
-
Characterizing the IRC-based botnet phenomenon
-
University of Mannheim
-
Zhuge, J.; Holz, T.; Han, X.; Guo, J.; Zou, W.; 2007. Characterizing the IRC-based botnet phenomenon. Tech. Rep. TR-2007-010, Department for Mathematics and Computer Science, University of Mannheim.
-
(2007)
Tech. Rep. TR-2007-010, Department for Mathematics and Computer Science
-
-
Zhuge, J.1
Holz, T.2
Han, X.3
Guo, J.4
Zou, W.5
-
34
-
-
77954261822
-
The detection of IRC botnet based on abnormal behavior
-
W. Zilong, W. Jinsong, H. Wenyi, and X. Chengyi The detection of IRC botnet based on abnormal behavior In: Second International Conference on Multimedia and Information Technology (MMIT), vol. 2 2010 April 146 149
-
(2010)
Second International Conference on Multimedia and Information Technology (MMIT)
, vol.2
, pp. 146-149
-
-
Zilong, W.1
Jinsong, W.2
Wenyi, H.3
Chengyi, X.4
|