-
1
-
-
84864267127
-
A framework for the design and evaluation of network resilience management
-
Maui, Hawaii, USA: IEEE Computer Society, April
-
A. Schaeffer-Filho, P. Smith, A. Mauthe, D. Hutchison, Y. Yu, and M. Fry, "A framework for the design and evaluation of network resilience management," in Proceedings of the 13th IEEE/IFIP Network Operations and Management Symposium (NOMS 2012). Maui, Hawaii, USA: IEEE Computer Society, April 2012, pp. 401-408.
-
(2012)
Proceedings of the 13th IEEE/IFIP Network Operations and Management Symposium (NOMS 2012)
, pp. 401-408
-
-
Schaeffer-Filho, A.1
Smith, P.2
Mauthe, A.3
Hutchison, D.4
Yu, Y.5
Fry, M.6
-
2
-
-
51849136554
-
Ponder2-A policy environment for autonomous pervasive systems
-
Palisades, NY, USA: IEEE Computer Society
-
K. Twidle, E. Lupu, N. Dulay, and M. Sloman, "Ponder2-A policy environment for autonomous pervasive systems," in POLICY '08: IEEE Workshop on Policies for Distributed Systems and Networks. Palisades, NY, USA: IEEE Computer Society, 2008, pp. 245-246.
-
(2008)
POLICY '08: IEEE Workshop on Policies for Distributed Systems and Networks
, pp. 245-246
-
-
Twidle, K.1
Lupu, E.2
Dulay, N.3
Sloman, M.4
-
4
-
-
77953248995
-
Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines
-
June
-
J. P. G. Sterbenz, D. Hutchison, E. K. C etinkaya, A. Jabbar, J. P. Rohrer, M. Schöller, and P. Smith, "Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines," Computer Networks: Special Issue on Resilient and Survivable Networks (COMNET), vol. 54, no. 8, pp. 1245-1265, June 2010.
-
(2010)
Computer Networks: Special Issue on Resilient and Survivable Networks (COMNET)
, vol.54
, Issue.8
, pp. 1245-1265
-
-
Sterbenz, J.P.G.1
Hutchison, D.2
Etinkaya, E.K.C.3
Jabbar, A.4
Rohrer, J.P.5
Schöller, M.6
Smith, P.7
-
5
-
-
34147099073
-
Survey of network-based defense mechanisms countering the dos and ddos problems
-
T. Peng, C. Leckie, and K. Ramamohanarao, "Survey of network-based defense mechanisms countering the DoS and DDoS problems," ACM Comput. Surv., vol. 39, no. 1, p. 3, 2007.
-
(2007)
ACM Comput. Surv.
, vol.39
, Issue.1
, pp. 3
-
-
Peng, T.1
Leckie, C.2
Ramamohanarao, K.3
-
6
-
-
77953145744
-
A survey of internet worm detection and containment
-
P. Li, M. Salour, and X. Su, "A survey of internet worm detection and containment," IEEE Communications Surveys Tutorials, vol. 10, no. 1, pp. 20-35, 2008.
-
(2008)
IEEE Communications Surveys Tutorials
, vol.10
, Issue.1
, pp. 20-35
-
-
Li, P.1
Salour, M.2
Su, X.3
-
7
-
-
84883482185
-
-
Panda Security, Tech. Rep
-
PandLabs, "PandaLabs Annual Report 2011 Summary," Panda Security, Tech. Rep., 2011. [Online]. Available: http://press.pandasecurity.com/ wp-content/uploads/2012/01/Annual-Report-PandaLabs-2011.pdf
-
(2011)
PandaLabs Annual Report 2011 Summary
-
-
-
8
-
-
84871573565
-
An adaptive approach to network resilience: Evolving challenge detection and mitigation
-
Krakow, Poland, October
-
Y. Yu, M. Fry, A. Schaeffer-Filho, P. Smith, and D. Hutchison, "An adaptive approach to network resilience: Evolving challenge detection and mitigation," in DRCN'11: 8th International Workshop on Design of Reliable Communication Networks, Krakow, Poland, October 2011, pp. 172-179.
-
(2011)
DRCN'11: 8th International Workshop on Design of Reliable Communication Networks
, pp. 172-179
-
-
Yu, Y.1
Fry, M.2
Schaeffer-Filho, A.3
Smith, P.4
Hutchison, D.5
-
9
-
-
84864669155
-
Openflow: A radical new idea in networking
-
Aug
-
T. A. Limoncelli, "OpenFlow: a radical new idea in networking," Commun. ACM, vol. 55, no. 8, pp. 42-47, Aug. 2012.
-
(2012)
Commun. ACM
, vol.55
, Issue.8
, pp. 42-47
-
-
Limoncelli, T.A.1
-
10
-
-
77954875624
-
Strategies for network resilience: Capitalising on policies
-
Zurich, Switzerland: LNCS, June
-
P. Smith, A. Schaeffer-Filho, A. Ali, M. Scholler, N. Kheir, A. Mauthe, and D. Hutchison, "Strategies for network resilience: Capitalising on policies," in 4th International Conference on Autonomous Infrastructure, Management and Security (AIMS). Zurich, Switzerland: LNCS, June 2010, pp. 118-122.
-
(2010)
4th International Conference on Autonomous Infrastructure, Management and Security (AIMS)
, pp. 118-122
-
-
Smith, P.1
Schaeffer-Filho, A.2
Ali, A.3
Scholler, M.4
Kheir, N.5
Mauthe, A.6
Hutchison, D.7
-
11
-
-
74949125916
-
Ns-3 project goals
-
New York, NY, USA: ACM
-
T. R. Henderson, S. Roy, S. Floyd, and G. F. Riley, "ns-3 project goals," in WNS2 '06: Proceeding from the 2006 workshop on ns-2: the IP network simulator. New York, NY, USA: ACM, 2006, p. 13.
-
(2006)
WNS2 '06: Proceeding from the 2006 Workshop on ns-2: The IP Network Simulator
, pp. 13
-
-
Henderson, T.R.1
Roy, S.2
Floyd, S.3
Riley, G.F.4
-
12
-
-
79959300100
-
Policy-driven network simulation: A resilience case study
-
Taichung, Taiwan: ACM, March
-
A. Schaeffer-Filho, P. Smith, and A. Mauthe, "Policy-driven network simulation: a resilience case study," in SAC'11: 26th Symposium on Applied Computing. Taichung, Taiwan: ACM, March 2011, pp. 492-497.
-
(2011)
SAC'11: 26th Symposium on Applied Computing
, pp. 492-497
-
-
Schaeffer-Filho, A.1
Smith, P.2
Mauthe, A.3
-
13
-
-
0036506787
-
Security and management policy specification
-
Mar.-Apr
-
M. Sloman and E. Lupu, "Security and management policy specification," IEEE Network, vol. 16, no. 2, pp. 10-19, Mar.-Apr. 2002.
-
(2002)
IEEE Network
, vol.16
, Issue.2
, pp. 10-19
-
-
Sloman, M.1
Lupu, E.2
-
14
-
-
34249800566
-
-
NS-2 Website. Accessed in August
-
NS-2 Website, "The Network Simulator-NS-2," http://www.isi.edu/nsnam/ns/. Accessed in August 2012.
-
(2012)
The Network Simulator-NS-2
-
-
-
15
-
-
77957550378
-
-
NS-3 Website. Accessed in August
-
NS-3 Website, "The NS-3 network simulator," http://www.nsnam.org/. Accessed in August 2012.
-
(2012)
The NS-3 Network Simulator
-
-
-
16
-
-
84883476518
-
-
Accessed in August
-
OMNeT++ Website, "OMNeT++," http://www.omnetpp.org/. Accessed in August 2012.
-
(2012)
OMNeT++
-
-
-
17
-
-
84883470782
-
-
Accessed in August
-
SSFNet Website, "Modeling the Global Internet," http://www.ssfnet.org/. Accessed in August 2012.
-
(2012)
Modeling the Global Internet
-
-
-
19
-
-
84883477056
-
-
QualNet Website. Accessed in January
-
QualNet Website, "QualNet," http://www.scalablenetworks. com/content/products/qualnet. Accessed in January 2013.
-
(2013)
QualNet
-
-
-
20
-
-
0141426531
-
On the accuracy of manet simulators
-
New York, NY, USA: ACM
-
D. Cavin, Y. Sasson, and A. Schiper, "On the accuracy of MANET simulators," in POMC '02: Proceedings of the second ACM international workshop on Principles of mobile computing. New York, NY, USA: ACM, 2002, pp. 38-43.
-
(2002)
POMC '02: Proceedings of the Second ACM International Workshop on Principles of Mobile Computing
, pp. 38-43
-
-
Cavin, D.1
Sasson, Y.2
Schiper, A.3
-
21
-
-
80655129208
-
Large-scale evaluation of distributed attack detection
-
Brussels, Belgium, Belgium: ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)
-
T. Gamer and C. P. Mayer, "Large-scale evaluation of distributed attack detection," in Simutools '09: Proceedings of the 2nd International Conference on Simulation Tools and Techniques. ICST, Brussels, Belgium, Belgium: ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), 2009, pp. 1-8.
-
(2009)
Simutools '09: Proceedings of the 2nd International Conference on Simulation Tools and Techniques. ICST
, pp. 1-8
-
-
Gamer, T.1
Mayer, C.P.2
-
22
-
-
77958537302
-
-
Institute of Telematics, Universität Karlsruhe (TH), Telematics Technical Report TM-2008-2, Feb
-
C. P. Mayer and T. Gamer, "Integrating real world applications into OMNeT++," Institute of Telematics, Universität Karlsruhe (TH), Telematics Technical Report TM-2008-2, Feb. 2008. [Online]. Available: http://doc.tm.uka.de/2008/TM-2008-2.pdf
-
(2008)
Integrating Real World Applications into OMNeT++
-
-
Mayer, C.P.1
Gamer, T.2
-
23
-
-
69749100394
-
An information-Theoretic view of network-Aware malware attacks
-
September
-
Z. Chen and C. Ji, "An information-Theoretic view of network-Aware malware attacks," IEEE Transactions on Information Forensics and Security, vol. 4, no. 3, pp. 530-541, September 2009.
-
(2009)
IEEE Transactions on Information Forensics and Security
, vol.4
, Issue.3
, pp. 530-541
-
-
Chen, Z.1
Ji, C.2
-
24
-
-
72849130144
-
Realistic simulation environments for ipbased networks
-
Brussels, Belgium, Belgium: ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)
-
T. Gamer and M. Scharf, "Realistic simulation environments for ipbased networks," in Simutools '08: Proceedings of the 1st international conference on Simulation tools and techniques for communications, networks and systems & workshops. ICST, Brussels, Belgium, Belgium: ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), 2008, pp. 1-7.
-
(2008)
Simutools '08: Proceedings of the 1st International Conference on Simulation Tools and Techniques for Communications, Networks and Systems & Workshops. ICST
, pp. 1-7
-
-
Gamer, T.1
Scharf, M.2
-
26
-
-
0038349210
-
Code red worm propagation modeling and analysis
-
ser. CCS '02. New York, NY, USA: ACM
-
C. C. Zou, W. Gong, and D. Towsley, "Code red worm propagation modeling and analysis," in Proceedings of the 9th ACM conference on Computer and communications security, ser. CCS '02. New York, NY, USA: ACM, 2002, pp. 138-147. [Online]. Available: http://doi.acm.org/10.1145/586110.586130
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 138-147
-
-
Zou, C.C.1
Gong, W.2
Towsley, D.3
-
27
-
-
0742276097
-
Inside the slammer worm
-
July-Aug
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver, "Inside the Slammer worm," IEEE Security & Privacy, vol. 1, no. 4, pp. 33-39, July-Aug. 2003.
-
(2003)
IEEE Security & Privacy
, vol.1
, Issue.4
, pp. 33-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
28
-
-
84871543192
-
Resilience strategies for networked malware detection and remediation (to appear)
-
Wu Yi Shan, Fujian, China: Springer, November
-
Y. Yu, M. Fry, B. Plattner, P. Smith, and A. Schaeffer-Filho, "Resilience strategies for networked malware detection and remediation (to appear)," in 6th International Conference on Network and System Security (NSS 2012). Wu Yi Shan, Fujian, China: Springer, November 2012.
-
(2012)
6th International Conference on Network and System Security (NSS 2012)
-
-
Yu, Y.1
Fry, M.2
Plattner, B.3
Smith, P.4
Schaeffer-Filho, A.5
-
29
-
-
84880028758
-
A mixed abstraction level simulation model of large-scale internet worm infestations
-
Washington, DC, USA: IEEE Computer Society
-
M. Liljenstam, Y. Yuan, B. J. Premore, and D. Nicol, "A Mixed Abstraction Level Simulation Model of Large-Scale Internet Worm Infestations," in MASCOTS '02: Proceedings of the 10th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems. Washington, DC, USA: IEEE Computer Society, 2002, p. 109.
-
(2002)
MASCOTS '02: Proceedings of the 10th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems
, pp. 109
-
-
Liljenstam, M.1
Yuan, Y.2
Premore, B.J.3
Nicol, D.4
-
30
-
-
55849097730
-
Distack-A framework for anomaly-based large-scale attack detection
-
Washington, DC, USA: IEEE Computer Society
-
T. Gamer, C. P. Mayer, and M. Zitterbart, "Distack-A framework for anomaly-based large-scale attack detection," in SECURWARE '08: Proceedings of the 2008 Second International Conference on Emerging Security Information, Systems and Technologies. Washington, DC, USA: IEEE Computer Society, 2008, pp. 34-40.
-
(2008)
SECURWARE '08: Proceedings of the 2008 Second International Conference on Emerging Security Information, Systems and Technologies
, pp. 34-40
-
-
Gamer, T.1
Mayer, C.P.2
Zitterbart, M.3
-
31
-
-
79951483278
-
A comprehensive framework to simulate network attacks and challenges
-
Moscow, Russia, October
-
E. K. C etinkaya, D. Broyles, A. Dandekar, S. Srinivasan, and J. P. Sterbenz, "A Comprehensive Framework to Simulate Network Attacks and Challenges," in RNDM'10-Second International Workshop on Reliable Networks Design and Modeling, Moscow, Russia, October 2010, pp. 538-544.
-
(2010)
RNDM'10-Second International Workshop on Reliable Networks Design and Modeling
, pp. 538-544
-
-
Etinkaya, E.K.C.1
Broyles, D.2
Dandekar, A.3
Srinivasan, S.4
Sterbenz, J.P.5
-
32
-
-
82155173457
-
Scadasim-A framework for building scada simulations
-
dec
-
C. Queiroz, A. Mahmood, and Z. Tari, "SCADASim-A Framework for Building SCADA Simulations," Smart Grid, IEEE Transactions on, vol. 2, no. 4, pp. 589-597, dec. 2011.
-
(2011)
Smart Grid, IEEE Transactions on
, vol.2
, Issue.4
, pp. 589-597
-
-
Queiroz, C.1
Mahmood, A.2
Tari, Z.3
|