-
1
-
-
84883528987
-
W32.Stuxnet dossier
-
retrieved Oct 24, 2011 Online
-
N. Falliere, L. Murchu, and E. Chien, "W32.Stuxnet dossier." Symantec Security Response, 2010, retrieved Oct 24, 2011 Online: http://www.symantec.com/content/en/us/enterprise/media/security response/whitepapers/w32 stuxnet dossier.pdf.
-
Symantec Security Response, 2010
-
-
Falliere, N.1
Murchu, L.2
Chien, E.3
-
2
-
-
77955078927
-
Ethernet-A survey on its fields of application
-
J. Sommer, S. Gunreben, F. Feller, M. Kohn, A. Mifdaoui, D. Sass, and J. Scharf, "Ethernet-a survey on its fields of application," IEEE Commun. Surveys Tuts., vol. 12, no. 2, pp. 263-284, 2010.
-
(2010)
IEEE Commun. Surveys Tuts.
, vol.12
, Issue.2
, pp. 263-284
-
-
Sommer, J.1
Gunreben, S.2
Feller, F.3
Kohn, M.4
Mifdaoui, A.5
Sass, D.6
Scharf, J.7
-
3
-
-
0016973732
-
Ethernet: Distributed packet switching for local computer networks
-
July
-
R. Metcalfe and D. Boggs, "Ethernet: Distributed packet switching for local computer networks," Communications of the ACM, vol. 19, no. 7, pp. 395-404, July 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.7
, pp. 395-404
-
-
Metcalfe, R.1
Boggs, D.2
-
4
-
-
70449371498
-
A survey of advanced ethernet forwarding approaches
-
R. Sofia, "A survey of advanced ethernet forwarding approaches," IEEE Commun. Surveys Tuts., vol. 11, no. 1, pp. 92-115, 2009.
-
(2009)
IEEE Commun. Surveys Tuts.
, vol.11
, Issue.1
, pp. 92-115
-
-
Sofia, R.1
-
5
-
-
0024904842
-
Survey of commercially available secure LAN products
-
Fifth Annu Comput Secur Appl Conf
-
G. King, "A survey of commercially available secure LAN products," in Computer Security Applications Conference, 1989., Fifth Annual, 1989, pp. 239-247. (Pubitemid 20700755)
-
(1989)
Annual Computer Security Applications Conference
, pp. 239-247
-
-
King Greg1
-
6
-
-
84881310440
-
Encapsulation security protocol design for local area networks
-
Local Area Network Security, ser T. Berson and T. Beth, Eds. Springer Berlin Heidelberg ch. chapter 10
-
R. Housley, "Encapsulation security protocol design for local area networks," in Local Area Network Security, ser. Lecture Notes in Computer Science, T. Berson and T. Beth, Eds. Springer Berlin Heidelberg, 1989, vol. 396, ch. chapter 10, pp. 103-109.
-
(1989)
Lecture Notes in Computer Science
, vol.396
, pp. 103-109
-
-
Housley, R.1
-
7
-
-
0026820373
-
Design of a physical layer security mechanism for CSMA/CD networks
-
Feb
-
F. Poon and M. Iqbal, "Design of a physical layer security mechanism for CSMA/CD networks," Communications, Speech and Vision, IEE Proceedings I, vol. 139, no. 1, pp. 103-112, Feb 1992.
-
(1992)
Communications, Speech and Vision, IEE Proceedings i
, vol.139
, Issue.1
, pp. 103-112
-
-
Poon, F.1
Iqbal, M.2
-
8
-
-
0027719364
-
A particular solution to provide secure communications in an Ethernet environment
-
New York, NY, USA: ACM Press
-
M. Soriano, J. Forńe, F. Recacha, and J. L. Meĺus, "A particular solution to provide secure communications in an Ethernet environment," in CCS '93: Proc. 1st ACM conference on Computer and communications security. New York, NY, USA: ACM Press, 1993, pp. 17-25.
-
(1993)
CCS '93: Proc. 1st ACM Conference on Computer and Communications Security
, pp. 17-25
-
-
Soriano, M.1
Forńe, J.2
Recacha, F.3
Meĺus, J.L.4
-
9
-
-
0029212565
-
Implementation of a hybrid encryption scheme for Ethernet
-
Jul
-
M. El-Hadidi, N. Hegazi, and H. Aslan, "Implementation of a hybrid encryption scheme for Ethernet," in Computers and Communications, 1995. Proceedings., IEEE Symposium on. IEEE Comput. Soc. Press, Jul 1995, pp. 150-156.
-
(1995)
Computers and Communications 1995. Proceedings. IEEE Symposium On. IEEE Comput. Soc. Press
, pp. 150-156
-
-
El-Hadidi, M.1
Hegazi, N.2
Aslan, H.3
-
14
-
-
84881315126
-
Vulnerability analysis and defence for the internet, ser
-
Springer US
-
A. Singh, B. Singh, and H. Joseph, Vulnerability Analysis and Defence for the Internet, ser. Advances in Information Security. Springer US, 2008, vol. 37.
-
(2008)
Advances in Information Security
, vol.37
-
-
Singh, A.1
Singh, B.2
Joseph, H.3
-
18
-
-
85037175440
-
Wireless sensor network security: A survey
-
CRC Press: Boca Raton, FL, USA
-
J. P. Walters, Z. Liang, W. Shi, and V. Chaudhary, "Wireless sensor network security: A survey," in Security in Distributed, Grid, and Pervasive Computing. CRC Press: Boca Raton, FL, USA, 2007.
-
(2007)
Security in Distributed, Grid, and Pervasive Computing
-
-
Walters, J.P.1
Liang, Z.2
Shi, W.3
Chaudhary, V.4
-
21
-
-
0003828189
-
Dynamic host configuration protocol
-
Mar. updated by RFCs 3396 4361, 5494
-
R. Droms, "Dynamic Host Configuration Protocol," RFC 2131 (Draft Standard), Internet Engineering Task Force, Mar. 1997, updated by RFCs 3396, 4361, 5494.
-
(1997)
RFC 2131 (Draft Standard), Internet Engineering Task Force
-
-
Droms, R.1
-
22
-
-
0003817787
-
Ethernet address resolution protocol: Or converting network protocol addresses to 48.bit ethernet address for transmission on ethernet hardware
-
Nov. updated by RFCs 5227, 5494
-
D. Plummer, "Ethernet Address Resolution Protocol: Or Converting Network Protocol Addresses to 48.bit Ethernet Address for Transmission on Ethernet Hardware," RFC 826 (Standard), Internet Engineering Task Force, Nov. 1982, updated by RFCs 5227, 5494.
-
(1982)
RFC 826 (Standard), Internet Engineering Task Force
-
-
Plummer, D.1
-
23
-
-
67650673188
-
Neighbor discovery for IP version 6 (IPv6)
-
Sep. updated by RFC 5942
-
T. Narten, E. Nordmark, W. Simpson, and H. Soliman, "Neighbor Discovery for IP version 6 (IPv6)," RFC 4861 (Draft Standard), Internet Engineering Task Force, Sep. 2007, updated by RFC 5942.
-
(2007)
RFC 4861 (Draft Standard), Internet Engineering Task Force
-
-
Narten, T.1
Nordmark, E.2
Simpson, W.3
Soliman, H.4
-
24
-
-
1542481876
-
Dynamic host configuration protocol for IPv6 (DHCPv6)
-
Jul. updated by RFCs 4361, 5494, 6221, 6422
-
R. Droms, J. Bound, B. Volz, T. Lemon, C. Perkins, and M. Carney, "Dynamic Host Configuration Protocol for IPv6 (DHCPv6)," RFC 3315 (Proposed Standard), Internet Engineering Task Force, Jul. 2003, updated by RFCs 4361, 5494, 6221, 6422.
-
(2003)
RFC 3315 (Proposed Standard), Internet Engineering Task Force
-
-
Droms, R.1
Bound, J.2
Volz, B.3
Lemon, T.4
Perkins, C.5
Carney, M.6
-
25
-
-
84881317617
-
Generalized Multi-Protocol Label Switching (GMPLS) Extensions for Synchronous Optical Network (SONET) and Synchronous Digital Hierarchy (SDH) control
-
Aug. updated by RFC 6344
-
E. Mannie and D. Papadimitriou, "Generalized Multi-Protocol Label Switching (GMPLS) Extensions for Synchronous Optical Network (SONET) and Synchronous Digital Hierarchy (SDH) Control," RFC 4606 (Proposed Standard), Internet Engineering Task Force, Aug. 2006, updated by RFC 6344.
-
(2006)
RFC 4606 (Proposed Standard), Internet Engineering Task Force
-
-
Mannie, E.1
Papadimitriou, D.2
-
26
-
-
0003914088
-
Using Internet Group Management Protocol Version 3 (IGMPv3) and Multicast Listener Discovery Protocol Version 2 (MLDv2) for Source-Specific Multicast
-
Aug.
-
H. Holbrook, B. Cain, and B. Haberman, "Using Internet Group Management Protocol Version 3 (IGMPv3) and Multicast Listener Discovery Protocol Version 2 (MLDv2) for Source-Specific Multicast," RFC 4604 (Proposed Standard), Internet Engineering Task Force, Aug. 2006.
-
(2006)
RFC 4604 (Proposed Standard), Internet Engineering Task Force
-
-
Holbrook, H.1
Cain, B.2
Haberman, B.3
-
27
-
-
84881315260
-
-
[Online]. Available
-
"VLAN security white paper," 2002. [Online]. Available: http://www.cisco.com/en/US/products/hw/switches/ps708/products white paper09186a008013159f.shtml
-
(2002)
VLAN Security White Paper
-
-
-
31
-
-
0038319236
-
Cisco Hot Standby Router Protocol (HSRP)
-
Mar.
-
T. Li, B. Cole, P. Morton, and D. Li, "Cisco Hot Standby Router Protocol (HSRP)," RFC 2281 (Informational), Internet Engineering Task Force, Mar. 1998.
-
(1998)
RFC 2281 (Informational), Internet Engineering Task Force
-
-
Li, T.1
Cole, B.2
Morton, P.3
Li, D.4
-
34
-
-
4243337284
-
-
IEEE Std. 802.1AX
-
Link Aggregation, IEEE Std. 802.1AX, 2008.
-
(2008)
Link Aggregation
-
-
-
36
-
-
72849151945
-
-
June retrieved Jan 17, 2011. [Online]. Available
-
S. Stasiukonis, "Social engineering, the USB way," June 2006, retrieved Jan 17, 2011. [Online]. Available: http://www.darkreading.com/ security/article/208803634/index.html
-
(2006)
Social Engineering, the USB Way
-
-
Stasiukonis, S.1
-
37
-
-
83455197543
-
Architecting for innovation
-
Jul
-
T. Koponen, S. Shenker, H. Balakrishnan, N. Feamster, I. Ganichev, A. Ghodsi, P. B. Godfrey, N. McKeown, G. Parulkar, B. Raghavan, J. Rexford, S. Arianfar, and D. Kuptsov, "Architecting for innovation," SIGCOMM Comput. Commun. Rev., vol. 41, no. 3, pp. 24-36, Jul 2011.
-
(2011)
SIGCOMM Comput. Commun. Rev.
, vol.41
, Issue.3
, pp. 24-36
-
-
Koponen, T.1
Shenker, S.2
Balakrishnan, H.3
Feamster, N.4
Ganichev, I.5
Ghodsi, A.6
Godfrey, P.B.7
McKeown, N.8
Parulkar, G.9
Raghavan, B.10
Rexford, J.11
Arianfar, S.12
Kuptsov, D.13
-
38
-
-
84881318493
-
-
white paper, Trustwave [Online]. Available
-
"Global security report 2011," white paper, Trustwave, 2011. [Online]. Available: https://www.trustwave.com/downloads/Trustwave WP Global Security Report 2011.pdf
-
(2011)
Global Security Report 2011
-
-
-
39
-
-
84881318666
-
Hacking layer 2: Fun with Ethernet switches
-
August 2002, retrieved Feb 15 [Online]. Available
-
S. Convery, "Hacking layer 2: Fun with Ethernet switches," Black Hat USA, August 2002, retrieved Feb 15, 2011. [Online]. Available: http://www.blackhat.com/presentations/bh-usa-02/bh-us-02-convery-switches.pdf
-
(2011)
Black Hat USA
-
-
Convery, S.1
-
40
-
-
84881310224
-
Making unidirectional VLAN and PVLAN jumping bidirectional
-
Dec 2005, retrieved May 15 [Online]. Available
-
A. A. Vladimirov, "Making unidirectional VLAN and PVLAN jumping bidirectional," Full-disclosure mailing list, Dec 2005, retrieved May 15, 2011. [Online]. Available: http://lists.grok.org.uk/pipermail/fulldisclosure/ 2005-December/040333.html
-
(2011)
Full-disclosure Mailing List
-
-
Vladimirov, A.A.1
-
42
-
-
84881311187
-
-
Online 2009, retrieved May 15 [Online]. Available
-
"VoIP hopper software," Online, 2009, retrieved May 15, 2011. [Online]. Available: http://voiphopper.sourceforge.net/
-
(2011)
VoIP Hopper Software
-
-
-
45
-
-
84881313254
-
-
October 2011, retrieved Oct, 24, 2011. [Online]. Available
-
A. Coffman, "Simple DNS man in the middle attack for password phishing," October 2011, retrieved Oct 24, 2011. [Online]. Available: http://thecoffman.com/2011/10/20/simple-dns-manin-the-middle-attack-for- password-phishing/
-
Simple DNS Man in the Middle Attack for Password Phishing
-
-
Coffman, A.1
-
47
-
-
40949087228
-
-
Master's thesis, University of California Davis [Online]. Available
-
M. Marro, "Attacks at the data link layer," Master's thesis, University of California Davis, 2003. [Online]. Available: http://seclab.cs. ucdavis.edu/papers/Marro masters thesis.pdf
-
(2003)
Attacks at the Data Link Layer
-
-
Marro, M.1
-
49
-
-
70349124474
-
Application-based TCP hijacking
-
New York, NY, USA: ACM Press
-
O. Zheng, J. Poon, and K. Beznosov, "Application-based TCP hijacking," in Proc. Second European Workshop on System Security, ser. EUROSEC '09. New York, NY, USA: ACM Press, 2009, pp. 9-15.
-
(2009)
Proc. Second European Workshop on System Security, Ser. EUROSEC '09
, pp. 9-15
-
-
Zheng, O.1
Poon, J.2
Beznosov, K.3
-
52
-
-
13244299564
-
Extensible Authentication Protocol (EAP)
-
Jun. updated by RFC 5247
-
B. Aboba, L. Blunk, J. Vollbrecht, J. Carlson, and H. Levkowetz, "Extensible Authentication Protocol (EAP)," RFC 3748 (Proposed Standard), Internet Engineering Task Force, Jun. 2004, updated by RFC 5247.
-
(2004)
RFC 3748 (Proposed Standard), Internet Engineering Task Force
-
-
Aboba, B.1
Blunk, L.2
Vollbrecht, J.3
Carlson, J.4
Levkowetz, H.5
-
53
-
-
77950315765
-
Extensible Authentication Protocol (EAP) Key Management Framework
-
Aug.
-
B. Aboba, D. Simon, and P. Eronen, "Extensible Authentication Protocol (EAP) Key Management Framework," RFC 5247 (Proposed Standard), Internet Engineering Task Force, Aug. 2008.
-
(2008)
RFC 5247 (Proposed Standard), Internet Engineering Task Force
-
-
Aboba, B.1
Simon, D.2
Eronen, P.3
-
54
-
-
84881315115
-
Mitigating the threats of rogue machines802.1X or IPsec?
-
August 2005, retrieved Oct 11 [Online]. Available
-
S. Riley, "Mitigating the threats of rogue machines802.1X or IPsec?" Microsoft TechNet, August 2005, retrieved Oct 11, 2011. [Online]. Available: http://technet.microsoft.com/en-us/library/cc512611.aspx
-
(2011)
Microsoft Tech Net
-
-
Riley, S.1
-
56
-
-
84884546992
-
-
white paper, Cisco Inc [Online]. Available
-
I. Dubrawsky, "Safe layer 2 security in-depth," white paper, Cisco Inc, 2004. [Online]. Available: http://www.cisco.com/warp/public/cc/so/ cuso/epso/sqfr/sfblu wp.pdf
-
(2004)
Safe Layer 2 Security In-depth
-
-
Dubrawsky, I.1
-
57
-
-
44249126961
-
SANE: A protection architecture for enterprise networks
-
M. Casado, T. Garfinkel, A. Akella, M. Freedman, D. Boneh, N. McKeown, and S. Shenker, "SANE: A protection architecture for enterprise networks," in USENIX Security Symposium, 2006.
-
(2006)
USENIX Security Symposium
-
-
Casado, M.1
Garfinkel, T.2
Akella, A.3
Freedman, M.4
Boneh, D.5
McKeown, N.6
Shenker, S.7
-
58
-
-
69249218972
-
Rethinking enterprise network control
-
Aug
-
M. Casado, M. J. Freedman, J. Pettit, J. Luo, N. Gude, N. McKeown, and S. Shenker, "Rethinking enterprise network control," IEEE/ACM Trans. Netw., vol. 17, no. 4, pp. 1270-1283, Aug 2009.
-
(2009)
IEEE/ACM Trans. Netw.
, vol.17
, Issue.4
, pp. 1270-1283
-
-
Casado, M.1
Freedman, M.J.2
Pettit, J.3
Luo, J.4
Gude, N.5
McKeown, N.6
Shenker, S.7
-
59
-
-
68649129121
-
OpenFlow, enabling innovation in campus networks
-
Mar
-
N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, and J. Turner, "OpenFlow, enabling innovation in campus networks," SIGCOMM Comp Commun Rev, vol. 38, no. 2, pp. 69-74, Mar 2008.
-
(2008)
SIGCOMM Comp Commun Rev
, vol.38
, Issue.2
, pp. 69-74
-
-
McKeown, N.1
Anderson, T.2
Balakrishnan, H.3
Parulkar, G.4
Peterson, L.5
Rexford, J.6
Shenker, S.7
Turner, J.8
-
60
-
-
70350656962
-
NOX, towards an operating system for networks
-
Jul
-
N. Gude, T. Koponen, J. Pettit, B. Pfaff, M. Casado, N. McKeown, and S. Shenker, "NOX, towards an operating system for networks," SIGCOMM Comp Commun Rev, vol. 38, no. 3, pp. 105-110, Jul 2008.
-
(2008)
SIGCOMM Comp Commun Rev
, vol.38
, Issue.3
, pp. 105-110
-
-
Gude, N.1
Koponen, T.2
Pettit, J.3
Pfaff, B.4
Casado, M.5
McKeown, N.6
Shenker, S.7
-
61
-
-
84881314509
-
Pushing enterprise security down the network stack
-
Tech. Rep. [Online]. Available
-
R. Clark, N. Feamster, A. Nayak, and A. Reimers, "Pushing enterprise security down the network stack," Georgia Tech, Tech. Rep., 2009. [Online]. Available: http://hdl.handle.net/1853/30782
-
(2009)
Georgia Tech
-
-
Clark, R.1
Feamster, N.2
Nayak, A.3
Reimers, A.4
-
62
-
-
84857207112
-
Onix: A distributed control platform for large-scale production networks
-
Berkeley, CA, USA: USENIX Association
-
T. Koponen, M. Casado, N. Gude, J. Stribling, L. Poutievski, M. Zhu, R. Ramanathan, Y. Iwata, H. Inoue, T. Hama, and S. Shenker, "Onix: a distributed control platform for large-scale production networks," in Proc. 9th USENIX conference on Operating systems design and implementation, ser. OSDI'10. Berkeley, CA, USA: USENIX Association, 2010, pp. 1-6.
-
(2010)
Proc. 9th USENIX Conference on Operating Systems Design and Implementation, Ser. OSDI'10
, pp. 1-6
-
-
Koponen, T.1
Casado, M.2
Gude, N.3
Stribling, J.4
Poutievski, L.5
Zhu, M.6
Ramanathan, R.7
Iwata, Y.8
Inoue, H.9
Hama, T.10
Shenker, S.11
-
64
-
-
34547663065
-
An architectural framework for data link layer security with security inter-layering
-
DOI 10.1109/SECON.2007.342975, 4147505, 2007 IEEE SoutheastCon
-
H. Altunbasak and H. Owen, "An architectural framework for data link layer security with security inter-layering," in SoutheastCon, 2007. Proceedings. IEEE. IEEE, Mar 2007, pp. 607-614. (Pubitemid 47208374)
-
(2007)
Conference Proceedings - IEEE SOUTHEASTCON
, pp. 607-614
-
-
Altunbasak, H.1
Owen, H.2
-
65
-
-
26844457949
-
Securing layer 2 in local area networks
-
Networking - ICN 2005 - 4th International Conference on Networking, Proceedings
-
H. Altunbasak, S. Krasser, H. Owen, J. Grimminger, H. Huth, and J. Sokol, "Securing layer 2 in local area networks," Networking-ICN 2005, vol. 3421, pp. 699-706, 2005. (Pubitemid 41452174)
-
(2005)
Lecture Notes in Computer Science
, vol.3421
, Issue.II
, pp. 699-706
-
-
Altunbasak, H.1
Krasser, S.2
Owen, H.L.3
Grimminger, J.4
Huth, H.-P.5
Sokol, J.6
-
66
-
-
84881311260
-
-
white paper, Hewlett-Packard Development Company
-
"Hardening ProCurve swtiches," white paper, Hewlett-Packard Development Company, 2007.
-
(2007)
Hardening ProCurve Swtiches
-
-
-
67
-
-
84944723451
-
S-ARP: A secure address resolution protocol
-
IEEE, Dec
-
D. Bruschi, A. Ornaghi, and E. Rosti, "S-ARP: a secure address resolution protocol," in Computer Security Applications Conference, 2003. Proceedings. 19th Annual. IEEE, Dec 2003, pp. 66-74.
-
(2003)
Computer Security Applications Conference 2003. Proceedings. 19th Annual.
, pp. 66-74
-
-
Bruschi, D.1
Ornaghi, A.2
Rosti, E.3
-
71
-
-
84881315487
-
Remote network monitoring mib extensions for switched networks Version 1.0
-
Jun.
-
R. Waterman, B. Lahaye, D. Romascanu, and S. Waldbusser, "Remote Network Monitoring MIB Extensions for Switched Networks Version 1.0," RFC 2613 (Draft Standard), Internet Engineering Task Force, Jun. 1999.
-
(1999)
RFC 2613 (Draft Standard), Internet Engineering Task Force
-
-
Waterman, R.1
Lahaye, B.2
Romascanu, D.3
Waldbusser, S.4
-
72
-
-
33646823623
-
Detecting ARP spoofing: An active technique
-
DOI 10.1007/11593980-18, Information Systems Security - First International Conference, ICISS 2005, Proceedings
-
V. Ramachandran and S. Nandi, "Detecting ARP spoofing: An active technique," in Information Systems Security, ser. Lecture Notes in Computer Science, S. Jajodia and C. Mazumdar, Eds. Springer Berlin Heidelberg, 2005, vol. 3803, ch. chapter 18, pp. 239-250, 10.1007/11593980 18. (Pubitemid 43775411)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3803 LNCS
, pp. 239-250
-
-
Ramachandran, V.1
Nandi, S.2
-
73
-
-
77954569379
-
An active intrusion detection system for LAN specific attacks
-
Berlin, Heidelberg: Springer-Verlag
-
N. Hubballi, S. Roopa, R. Ratti, F. A. Barbhuiya, S. Biswas, A. Sur, S. Nandi, and V. Ramachandran, "An active intrusion detection system for LAN specific attacks," in Proc. 2010 international conference on Advances in computer science and information technology, ser. AST/UCMA/ISA/ACN'10. Berlin, Heidelberg: Springer-Verlag, 2010, pp. 129-142.
-
(2010)
Proc. 2010 International Conference on Advances in Computer Science and Information Technology, Ser. AST/UCMA/ISA/ACN'10
, pp. 129-142
-
-
Hubballi, N.1
Roopa, S.2
Ratti, R.3
Barbhuiya, F.A.4
Biswas, S.5
Sur, A.6
Nandi, S.7
Ramachandran, V.8
-
75
-
-
65249086073
-
Floodless in SEATTLE, a scalable Ethernet architecture for large enterprises
-
Oct
-
C. Kim, M. Caesar, and J. Rexford, "Floodless in SEATTLE, a scalable Ethernet architecture for large enterprises," SIGCOMM Comput. Commun. Rev., vol. 38, no. 4, pp. 3-14, Oct 2008.
-
(2008)
SIGCOMM Comput. Commun. Rev.
, vol.38
, Issue.4
, pp. 3-14
-
-
Kim, C.1
Caesar, M.2
Rexford, J.3
-
77
-
-
36949009170
-
Network-wide decision making: Toward a wafer-thin control plane
-
J. Rexford, A. Greenberg, G. Hjalmtysson, D. Maltz, A. Myers, G. Xie, J. Zhan, and H. Zhang, "Network-wide decision making: Toward a wafer-thin control plane," in Proc. HotNets. ACM Sigcomm, 2004, pp. 59-64.
-
(2004)
Proc. HotNets. ACM Sigcomm
, pp. 59-64
-
-
Rexford, J.1
Greenberg, A.2
Hjalmtysson, G.3
Maltz, D.4
Myers, A.5
Xie, G.6
Zhan, J.7
Zhang, H.8
-
78
-
-
33749467476
-
Rethinking the service model: Scaling Ethernet to a million nodes
-
A. Myers, E. Ng, and H. Zhang, "Rethinking the service model: Scaling Ethernet to a million nodes," in Proc. HotNets. ACM Sigcomm, 2004.
-
(2004)
Proc. HotNets. ACM Sigcomm
-
-
Myers, A.1
Ng, E.2
Zhang, H.3
-
81
-
-
84947251443
-
The resurrecting duckling: Security issues for ad-hoc wireless networks
-
Security Protocols, ser J. Malcolm, B. Christianson, B. Crispo, and M. Roe, Eds., Springer Berlin/Heidelberg 10.1007/10720107 24
-
F. Stajano and R. Anderson, "The resurrecting duckling: Security issues for ad-hoc wireless networks," in Security Protocols, ser. Lecture Notes in Computer Science, J. Malcolm, B. Christianson, B. Crispo, and M. Roe, Eds. Springer Berlin/Heidelberg, 1999, vol. 1796, pp. 172-182, 10.1007/10720107 24.
-
(1999)
Lecture Notes in Computer Science
, vol.1796
, pp. 172-182
-
-
Stajano, F.1
Anderson, R.2
|