-
1
-
-
0020849266
-
Maintaining knowledge about temporal intervals
-
Nov.
-
ALLEN, J. Maintaining Knowledge about Temporal Intervals. Communications of the ACM 26, 11 (Nov. 1983), 832-843.
-
(1983)
Communications of the ACM
, vol.26
, Issue.11
, pp. 832-843
-
-
Allen, J.1
-
2
-
-
33847123551
-
Experience with DETER: A testbed for security research
-
BENZEL, T., BRADEN, R., KIM, D., NEUMAN, C., JOSEPH, A., SKLOWER, K., OSTRENGA, R., AND SCHWAB, S. Experience with DETER: A Testbed for Security Research. In 2nd Intl. Conf. on Testbeds and Research Infrastructures for the Devel. of Networks and Communities - TRIDENTCOM (2006), p. 10.
-
(2006)
2nd Intl. Conf. On Testbeds and Research Infrastructures for the Devel. On Networks and Communities - TRIDENTCOM
, pp. 10
-
-
Benzel, T.1
Braden, R.2
Kim, D.3
Neuman, C.4
Joseph, A.5
Sklower, K.6
Ostrenga, R.7
Schwab, S.8
-
4
-
-
14944379887
-
A behavioral approach to worm detection
-
ELLIS, D. R., AIKEN, J. G., ATTWOOD, K. S., AND TENAGLIA, S. D. A Behavioral Approach to Worm Detection. In Proc. of the ACM workshop on Rapid malcode (2004), pp. 43-53.
-
(2004)
Proc.ofthe ACM Workshop on Rapid Malcode
, pp. 43-53
-
-
Ellis, D.R.1
Aiken, J.G.2
Attwood, K.S.3
Tenaglia, S.D.4
-
5
-
-
1242287724
-
A framework for classifying denial of service attacks
-
HUSSAIN, A., HEIDEMANN, J., AND PAPADOPOULOS, C. A Framework For Classifying Denial of Service Attacks. Proc. of the Conf. on Applications, Technologies, Architectures, and Protocols for Comp. Comm. - SIGCOMM (2003), 99.
-
(2003)
Proc.ofthe Conf.ofApplications, Technologies, Architectures, and Protocols for Comp. Comm. - SIGCOMM
, pp. 99
-
-
Hussain, A.1
Heidemann, J.2
Papadopoulos, C.3
-
6
-
-
70350595344
-
Towards a streaming SQL standard
-
August
-
JAIN, N., MISHRA, S., SRINIVASAN, A., GEHRKE, J., WIDOM, J., BALAKRISHNAN, H., ÇETINTEMEL, U., CHERNIACK, M., TIBBETTS, R., AND ZDONIK, S. Towards a Streaming SQL Standard. Proc. VLDB Endow. 1 (August 2008), 1379-1390.
-
(2008)
Proc. VLDB Endow.
, vol.1
, pp. 1379-1390
-
-
Jain, N.1
Mishra, S.2
Srinivasan, A.3
Gehrke, J.4
Widom, J.5
Balakrishnan, H.6
Çetintemel, U.7
Cherniack, M.8
Tibbetts, R.9
Zdonik, S.10
-
8
-
-
26444526878
-
Detecting malicious code by model checking
-
K. Julisch and C. Kruegel, Eds., of Lecture Notes in Computer Science. Springer Berlin/Heidelberg
-
KINDER, J., KATZENBEISSER, S., SCHALLHART, C., AND VEITH, H. Detecting Malicious Code by Model Checking. In Intrusion and Malware Detection and Vuln. Assessment, K. Julisch and C. Kruegel, Eds., vol. 3548 of Lecture Notes in Computer Science. Springer Berlin/Heidelberg, 2005, pp. 174-187.
-
(2005)
Intrusion and Malware Detection and Vuln. Assessment
, vol.3548
, pp. 174-187
-
-
Kinder, J.1
Katzenbeisser, S.2
Schallhart, C.3
Veith, H.4
-
9
-
-
0028424892
-
The temporal logic of actions
-
LAMPORT, L. The Temporal Logic of Actions. ACM Trans. Program. Lang. Syst. 16, 3 (1994), 872-923.
-
(1994)
ACM Trans. Program. Lang. Syst.
, vol.16
, Issue.3
, pp. 872-923
-
-
Lamport, L.1
-
10
-
-
34250652156
-
Declarative networking: Language, execution and optimization
-
LOO, B. T., CONDIE, T., GAROFALAKIS, M., GAY, D. E., HELLERSTEIN, J. M., MANIATIS, P., RAMAKRISHNAN, R., ROSCOE, T., AND STOICA, I. Declarative Networking: Language, Execution and Optimization. In Proc. of ACM SIGMOD (2006), pp. 97-108.
-
(2006)
Proc.ofACM SIGMOD
, pp. 97-108
-
-
Loo, B.T.1
Condie, T.2
Garofalakis, M.3
Gay, D.E.4
Hellerstein, J.M.5
Maniatis, P.6
Ramakrishnan, R.7
Roscoe, T.8
Stoica, I.9
-
12
-
-
85084163457
-
Managing the health of security experiments
-
MIRKOVIC, J., SOLLINS, K., AND WROCLAWSKI, J. Managing the Health of Security Experiments. In Proc. of the conf. on Cyber Security Experimentation and Test (2008), USENIX, pp. 7:1-7:6.
-
(2008)
Proc.ofthe Conf.ofCyber Security Experimentation and Test
, pp. 1-6
-
-
Mirkovic, J.1
Sollins, K.2
Wroclawski, J.3
-
14
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
PAXSON, V. Bro: A System for Detecting Network Intruders in Real-time. Comput. Networks 31, 23-24 (1999), 2435-2463.
-
(1999)
Comput. Networks
, vol.31
, Issue.23-24
, pp. 2435-2463
-
-
Paxson, V.1
|