-
1
-
-
84886741405
-
Nfsight: netflow-based network awareness tool
-
R. Berthier, M. Cukier, M. Hiltunen, D. Kormann, G. Vesonder, and D. Sheleheda. Nfsight: netflow-based network awareness tool. In Proceedings of the 24th USENIX LISA, 2010.
-
(2010)
Proceedings of the 24th USENIX LISA
-
-
Berthier, R.1
Cukier, M.2
Hiltunen, M.3
Kormann, D.4
Vesonder, G.5
Sheleheda, D.6
-
2
-
-
77649329798
-
Netpy: Advanced Network Traffic Monitoring
-
A. Cirneci, S. Boboc, C. Leordeanu, V. Cristea, and C. Estan. Netpy: Advanced Network Traffic Monitoring. In Proc. Int Conf. on Intelligent Networking and Collaborative Systems (INCOS'09), pages 253-254, 2009.
-
(2009)
Proc. Int Conf. on Intelligent Networking and Collaborative Systems (INCOS'09)
, pp. 253-254
-
-
Cirneci, A.1
Boboc, S.2
Leordeanu, C.3
Cristea, V.4
Estan, C.5
-
3
-
-
84958540312
-
Communities of interest
-
Frank Hoffmann, David Hand, Niall Adams, Douglas Fisher, and Gabriela Guimaraes, editors, pages Springer Berlin Heidelberg
-
Corinna Cortes, Daryl Pregibon, and Chris Volinsky. Communities of interest. In Frank Hoffmann, David Hand, Niall Adams, Douglas Fisher, and Gabriela Guimaraes, editors, Advances in Intelligent Data Analysis, volume 2189 of Lecture Notes in Computer Science, pages 105-114. Springer Berlin / Heidelberg, 2001. 10.1007/3-540-44816-0_11.
-
(2001)
Advances in Intelligent Data Analysis, volume 2189 of Lecture Notes in Computer Science
, pp. 105-114
-
-
Cortes, Corinna1
Pregibon, Daryl2
Volinsky, Chris3
-
4
-
-
33845391802
-
Vigilante: End-to-end containment of internet worms
-
M. Costa, J. Crowcroft, M. Castro, A. Rowstron, L. Zhou, L. Zhang, and P. Barham. Vigilante: End-to-end containment of internet worms. In Proceedings of the ACM Symposium on Operating Systems Principles (SOSP), 2005.
-
(2005)
Proceedings of the ACM Symposium on Operating Systems Principles (SOSP)
-
-
Costa, M.1
Crowcroft, J.2
Castro, M.3
Rowstron, A.4
Zhou, L.5
Zhang, L.6
Barham, P.7
-
5
-
-
34548778120
-
Visual discovery in computer network defense
-
A.D. D'Amico, J.R. Goodall, D.R. Tesone, and J.K. Kopylec. Visual discovery in computer network defense. IEEE Computer Graphics and Applications, 27(5):20-27, 2007.
-
(2007)
IEEE Computer Graphics and Applications
, vol.27
, Issue.5
, pp. 20-27
-
-
D'Amico, A.D.1
Goodall, J.R.2
Tesone, D.R.3
Kopylec, J.K.4
-
6
-
-
56449095222
-
Large-scale network monitoring for visual analysis of attacks
-
page Springer
-
F. Fischer, F. Mansmann, D.A. Keim, S. Pietzko, and M. Waldvogel. Large-scale network monitoring for visual analysis of attacks. In Proc. Workshop on Visualization for Computer Security (VizSEC), page 111. Springer, 2008.
-
(2008)
Proc. Workshop on Visualization for Computer Security (VizSEC)
, pp. 111
-
-
Fischer, F.1
Mansmann, F.2
Keim, D.A.3
Pietzko, S.4
Waldvogel, M.5
-
7
-
-
77953296690
-
More NetFlow tools: For performance and security
-
C. Gates, M. Collins, M. Duggan, A. Kompanek, and M. Thomas. More NetFlow tools: For performance and security. In Proc. 18th USENIX LISA, pages 121-132, 2004.
-
(2004)
Proc. 18th USENIX LISA
, pp. 121-132
-
-
Gates, C.1
Collins, M.2
Duggan, M.3
Kompanek, A.4
Thomas, M.5
-
8
-
-
85075837457
-
Botminer: Clustering analysis of network traffic for protocol- and structure-independent botnet detection
-
G. Gu, R. Perdisci, J. Zhang, and W. Lee. Botminer: Clustering analysis of network traffic for protocol- and structure-independent botnet detection. In Proceedings of the USENIX Security Conference, 2008.
-
(2008)
Proceedings of the USENIX Security Conference
-
-
Gu, G.1
Perdisci, R.2
Zhang, J.3
Lee, W.4
-
9
-
-
84877343478
-
Watch your Flows with NfSen and NFDUMP
-
P. Haag. Watch your Flows with NfSen and NFDUMP. In 50th RIPE Meeting, 2005.
-
(2005)
50th RIPE Meeting
-
-
Haag, P.1
-
10
-
-
33750405289
-
Security issues in scada networks
-
V. Igure, S. Laughter, and R. Williams. Security issues in scada networks. Computers & Security, 25(7):498 - 506, 2006.
-
(2006)
Computers & Security
, vol.25
, Issue.7
, pp. 498-506
-
-
Igure, V.1
Laughter, S.2
Williams, R.3
-
12
-
-
80051907648
-
Low-overhead fault tolerance for high-throughput data processing systems
-
page TBD, Los Alamitos, CA, USA, June IEEE Computer Society
-
André Martin, Thomas Knauth, Stephan Creutz, Diogo Becker de Brum, Stefan Weigert, Andrey Brito, and Christof Fetzer. Low-overhead fault tolerance for high-throughput data processing systems. In ICDCS '11: Proceedings of the 2011 31st IEEE International Conference on Distributed Computing Systems, page TBD, Los Alamitos, CA, USA, June 2011. IEEE Computer Society.
-
(2011)
ICDCS '11: Proceedings of the 2011 31st IEEE International Conference on Distributed Computing Systems
-
-
Martin, André1
Knauth, Thomas2
Creutz, Stephan3
de Brum, Diogo Becker4
Weigert, Stefan5
Brito, Andrey6
Fetzer, Christof7
-
13
-
-
85094679478
-
Self-defending software: Automatically patching security vulnerabilities
-
J. Perkins, S. Kim, S. Larsen, S. Amarasinghe, J. Bachrach, M. Carbin, C. Pacheco, F. Sherwood, S. Sidiroglou, G. Sullivan, W.-F. Wong, Y. Zibin, M. Ernst, and M. Rinard. Self-defending software: Automatically patching security vulnerabilities. In Proceedings of the ACM Symposium on Operating Systems Principles (SOSP), 2009.
-
(2009)
Proceedings of the ACM Symposium on Operating Systems Principles (SOSP)
-
-
Perkins, J.1
Kim, S.2
Larsen, S.3
Amarasinghe, S.4
Bachrach, J.5
Carbin, M.6
Pacheco, C.7
Sherwood, F.8
Sidiroglou, S.9
Sullivan, G.10
Wong, W.-F.11
Zibin, Y.12
Ernst, M.13
Rinard, M.14
-
14
-
-
84870637005
-
Flowscan: A Network Traffic Flow Reporting and Visualization Tool
-
D. Plonka. Flowscan: A Network Traffic Flow Reporting and Visualization Tool. In Proc. 14th USENIX LISA, pages 305-318, 2000.
-
(2000)
Proc. 14th USENIX LISA
, pp. 305-318
-
-
Plonka, D.1
-
16
-
-
84941149577
-
The OSU flow-tools package and CISCO NetFlow logs
-
S. Romig, M. Fullmer, and R. Luman. The OSU flow-tools package and CISCO NetFlow logs. In Proc. 14th USENIX LISA, pages 291-304, 2000.
-
(2000)
Proc. 14th USENIX LISA
, pp. 291-304
-
-
Romig, S.1
Fullmer, M.2
Luman, R.3
-
18
-
-
66249140932
-
FloVis: Flow Visualization System
-
T. Taylor, D. Paterson, J. Glanfield, C. Gates, S. Brooks, and J. McHugh. FloVis: Flow Visualization System. In Proc. Cybersecurity Applications and Technologies Conference for Homeland Security (CATCH), pages 186-198, 2009.
-
(2009)
Proc. Cybersecurity Applications and Technologies Conference for Homeland Security (CATCH)
, pp. 186-198
-
-
Taylor, T.1
Paterson, D.2
Glanfield, J.3
Gates, C.4
Brooks, S.5
McHugh, J.6
-
19
-
-
85077048913
-
Automatic misconfiguration troubleshooting with peerpressure
-
H. Wang, J. Platt, Y. Chen, R. Zhang, and Y.-M. Wang. Automatic misconfiguration troubleshooting with peerpressure. In In OSDI, pages 245-258, 2004.
-
(2004)
OSDI
, pp. 245-258
-
-
Wang, H.1
Platt, J.2
Chen, Y.3
Zhang, R.4
Wang, Y.-M.5
|