-
1
-
-
84879914643
-
Manifesto - Perspectives workshop: Network attack detection and defense
-
Schloss Dagstuhl, Wadern, Germany March
-
Carle, G., Dressler, F., Kemmerer, R.A., König, H., Kruegel, C., Laskov, P.: Manifesto - Perspectives Workshop: Network Attack Detection and Defense. In: Dagstuhl Perspectives Workshop 08102 - Network Attack Detection and Defense 2008, Schloss Dagstuhl, Wadern, Germany (March 2008)
-
(2008)
Dagstuhl Perspectives Workshop 08102 - Network Attack Detection and Defense 2008
-
-
Carle, G.1
Dressler, F.2
Kemmerer, R.A.3
König, H.4
Kruegel, C.5
Laskov, P.6
-
2
-
-
46149108945
-
Vermont - A versatile monitoring toolkit using IPFIX/PSAMP
-
Tübingen, Germany, IEEE (September
-
Lampert, R.T., Sommer, C., Münz, G., Dressler, F.: Vermont - A Versatile Monitoring Toolkit Using IPFIX/PSAMP. In: IEEE/IST Workshop on Monitoring, Attack Detection and Mitigation (MonAM 2006), Tübingen, Germany, IEEE (September 2006) 62-65
-
(2006)
IEEE/IST Workshop on Monitoring, Attack Detection and Mitigation (MonAM 2006)
, pp. 62-65
-
-
Lampert, R.T.1
Sommer, C.2
Münz, G.3
Dressler, F.4
-
3
-
-
70450206702
-
Specification of the IP flow information export (IPFIX) protocol for the exchange of IP traffic flow information
-
IETF January
-
Claise, B.: Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of IP Traffic Flow Information. RFC 5101, IETF (January 2008)
-
(2008)
RFC 5101
-
-
Claise, B.1
-
4
-
-
56649095956
-
IPFIX mediation: Problem statement
-
(work in progress) draftietf-ipfix-mediators-problem-statement-00.txt, IETF May
-
Kobayashi, A., Nishida, H., Sommer, C., Dressler, F., Stephan, E., Claise, B.: IPFIX Mediation: Problem Statement. Internet-Draft (work in progress) draftietf-ipfix-mediators-problem-statement-00.txt, IETF (May 2008)
-
(2008)
Internet-Draft
-
-
Kobayashi, A.1
Nishida, H.2
Sommer, C.3
Dressler, F.4
Stephan, E.5
Claise, B.6
-
5
-
-
1242310086
-
Automatically inferring patterns of resource consumption in network traffic
-
Karlsruhe, Germany, ACM August
-
Estan, C., Savage, S., Varghese, G.: Automatically Inferring Patterns of Resource Consumption in Network Traffic. In: ACM SIGCOMM 2003, Karlsruhe, Germany, ACM (August 2003) 137-148
-
(2003)
ACM SIGCOMM 2003
, pp. 137-148
-
-
Estan, C.1
Savage, S.2
Varghese, G.3
-
6
-
-
3543096392
-
Fast portscan detection using sequential hypothesis testing
-
Berkeley/Oakland, CA May
-
Jung, J., Paxson, V., Berger, A.W., lakrishnan, H.B.: Fast Portscan Detection Using Sequential Hypothesis Testing. In: IEEE Symposium on Security and Privacy, Berkeley/Oakland, CA (May 2004)
-
(2004)
IEEE Symposium on Security and Privacy
-
-
Jung, J.1
Paxson, V.2
Berger, A.W.3
Lakrishnan, H.B.4
-
8
-
-
48749130030
-
Traffic classification through simple statistical fingerprinting
-
January
-
Crotti, M., Dusi, M., Gringoli, F., Salgarelli, L.: Traffic Classification Through Simple Statistical Fingerprinting. ACM Computer Communication Review (CCR) 37(1) (January 2007) 5-16
-
(2007)
ACM Computer Communication Review (CCR)
, vol.37
, Issue.1
, pp. 5-16
-
-
Crotti, M.1
Dusi, M.2
Gringoli, F.3
Salgarelli, L.4
-
9
-
-
38549099284
-
Identifying P2P heavy-hitters from network-flow data
-
Pittsburgh, Pennsylvania September
-
Wagner, A., Dübendorfer, T., Hämmerle, L., Plattner, B.: Identifying P2P Heavy-Hitters from Network-Flow Data. In: 2nd CERT Workshop on Flow Analysis (FloCon 2005), Pittsburgh, Pennsylvania (September 2005)
-
(2005)
2nd CERT Workshop on Flow Analysis (FloCon 2005)
-
-
Wagner, A.1
Dübendorfer, T.2
Hämmerle, L.3
Plattner, B.4
-
10
-
-
31844452004
-
On the effectiveness of distributed worm monitoring
-
Baltimore, MD July
-
Rajab, M.A., Monrose, F., Terzis, A.: On the Effectiveness of Distributed Worm Monitoring. In: 14th USENIX Security Symposium, Baltimore, MD (July 2005)
-
(2005)
14th USENIX Security Symposium
-
-
Rajab, M.A.1
Monrose, F.2
Terzis, A.3
|