-
1
-
-
0036947597
-
Single-packet IP traceback
-
A.C. Snoeren, C. Partridge, L.A. Sanchez, C.E. Jones, F. Tchakountio, B. Schwartz, S.T. Kent, and W.T. Strayer Single-packet IP traceback IEEE/ACM Transactions on Networking 10 6 2002 721 734
-
(2002)
IEEE/ACM Transactions on Networking
, vol.10
, Issue.6
, pp. 721-734
-
-
Snoeren, A.C.1
Partridge, C.2
Sanchez, L.A.3
Jones, C.E.4
Tchakountio, F.5
Schwartz, B.6
Kent, S.T.7
Strayer, W.T.8
-
3
-
-
84892966553
-
Analysis of traceback techniques
-
January 16-19, Hobart, Australasia
-
U.K. Tupakula, V. Varadharajan, Analysis of traceback techniques, in: Proceeding ACSW Frontiers'06 Proceedings of the 2006 Australasian Workshops on Grid Computing and e-Research, January 16-19, Hobart, Australasia, 2006.
-
(2006)
Proceeding ACSW Frontiers'06 Proceedings of the 2006 Australasian Workshops on Grid Computing and E-Research
-
-
Tupakula, U.K.1
Varadharajan, V.2
-
5
-
-
80655134667
-
Proposal for and evaluation of improved method of hash-based IP traceback system
-
10-12 December
-
T. Kai, A. Hashiguchi, H. Nakatani, Proposal for and evaluation of improved method of hash-based IP traceback system, in: CSA'09, 2nd International Conference, 10-12 December 2009, pp. 1-7.
-
(2009)
CSA'09, 2nd International Conference
, pp. 1-7
-
-
Kai, T.1
Hashiguchi, A.2
Nakatani, H.3
-
8
-
-
85011016678
-
Tracing anonymous packets to their approximate source
-
December 3-8, New Orleans, Louisiana, USA
-
H. Burch, B. Cheswick, Tracing anonymous packets to their approximate source, in: Proceedings of Usenix LISA'00, December 3-8, New Orleans, Louisiana, USA, 2000.
-
(2000)
Proceedings of Usenix LISA'00
-
-
Burch, H.1
Cheswick, B.2
-
9
-
-
0033650584
-
Practical network support for IP traceback
-
August
-
S. Savage, D. Wetherall, A. Karlin, T. Anderson, Practical network support for IP traceback, in: Proceedings of ACM SIGCOMM 2000, August 2000, pp. 295-306.
-
(2000)
Proceedings of ACM SIGCOMM 2000
, pp. 295-306
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
10
-
-
0036036842
-
Tradeoffs in probabilistic packet marking for IP traceback
-
M. Adler, Tradeoffs in probabilistic packet marking for IP traceback, in: STOC'02, Montreal, Quebec, Canada, May 19-21, 2002, pp. 407-418. (Pubitemid 35009401)
-
(2002)
Conference Proceedings of the Annual ACM Symposium on Theory of Computing
, pp. 407-418
-
-
Adler, M.1
-
11
-
-
51649130217
-
A more practical approach for single-packet IP traceback using packet logging and marking
-
C. Gong, and K. Sarac A more practical approach for single-packet IP traceback using packet logging and marking IEEE Transactions on Parallel and Distributed Systems 19 10 2008 1310 1324
-
(2008)
IEEE Transactions on Parallel and Distributed Systems
, vol.19
, Issue.10
, pp. 1310-1324
-
-
Gong, C.1
Sarac, K.2
-
12
-
-
0014814325
-
Space/time trade-offs in Hash coding with allowable errors
-
B.H. Bloom Space/time trade-offs in Hash coding with allowable errors Communications of the ACM 13 7 1970 422 426
-
(1970)
Communications of the ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.H.1
-
13
-
-
0025432881
-
Optimal semi-joins for distributed database systems
-
J.K. Mullin Optimal semi-joins for distributed database systems IEEE Transactions on Software Engineering 16 5 1990 558 560
-
(1990)
IEEE Transactions on Software Engineering
, vol.16
, Issue.5
, pp. 558-560
-
-
Mullin, J.K.1
-
14
-
-
0034440650
-
OceanStore: An architecture for global-scale persistent storage
-
J. Kubiatowicz, D. Bindel, Y. Chen, S. Czerwinski, P. Eaton, and D. Geels OceanStore: an architecture for global-scale persistent storage ACM SIGPLAN Notices 35 11 2000 190 201 (Pubitemid 32470898)
-
(2000)
International Conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS
, pp. 190-201
-
-
Kubiatowicz, J.1
Bindel, D.2
Chen, Y.3
Czerwinski, S.4
Eaton, P.5
Geels, D.6
Gummadi, R.7
Rhea, S.8
Weatherspoon, H.9
Weimer, W.10
Wells, C.11
Zhao, B.12
-
15
-
-
77954478896
-
Self-organization in peer-to-peer systems
-
Saint-Emilion, France, September
-
J. Li, J. Taylor, L. Serban, M. Seltzer, Self-organization in peer-to-peer systems, in: Proc. the 10th ACM SIGOPS European Workshop, Saint-Emilion, France, September 2002, pp. 125-132.
-
(2002)
Proc.The 10th ACM SIGOPS European Workshop
, pp. 125-132
-
-
Li, J.1
Taylor, J.2
Serban, L.3
Seltzer, M.4
-
16
-
-
84942308524
-
Plantp: Using gossiping to build content addressable peer-to-peer information sharing communities
-
Seattle, WA, USA, June
-
F.M. Cuena-Acuna, C. Peery, R.P. Martin, T.D. Nguyen, Plantp: using gossiping to build content addressable peer-to-peer information sharing communities, in: Proc. the 12th IEEE International Symposium on High Performance Distributed Computing, Seattle, WA, USA, June 2003, pp. 236-249.
-
(2003)
Proc.The 12th IEEE International Symposium on High Performance Distributed Computing
, pp. 236-249
-
-
Cuena-Acuna, F.M.1
Peery, C.2
Martin, R.P.3
Nguyen, T.D.4
-
17
-
-
0036349210
-
Probabilistic location and routing
-
New York, NY, United States, June
-
S.C. Rhea, J. Kubiatowicz, Probabilistic location and routing, in: Proc. IEEE INFOCOM, New York, NY, United States, June 2004, pp. 1248-1257.
-
(2004)
Proc. IEEE INFOCOM
, pp. 1248-1257
-
-
Rhea, S.C.1
Kubiatowicz, J.2
-
18
-
-
0036498835
-
An architecture for secure wide-area service discovery
-
DOI 10.1023/A:1013772027164, Selected Paper from MobiCom 99
-
T.D. Hodes, S.E. Czerwinski, and B.Y. Zhao An architecture for secure wide-area service discovery Wireless Networks 8 2-3 2002 213 230 (Pubitemid 34168128)
-
(2002)
Wireless Networks
, vol.8
, Issue.2-3
, pp. 213-230
-
-
Hodes, T.D.1
Czerwinski, S.E.2
Zhao, B.Y.3
Joseph, A.D.4
Katz, R.H.5
-
19
-
-
35248834503
-
Efficient peer-to-peer keyword searching
-
Rio de Janeiro, Brazil, June
-
P. Reynolds, A. Vahdat, Efficient peer-to-peer keyword searching, in: Proc. ACM International Middleware Conference, Rio de Janeiro, Brazil, June 2003, pp. 21-40.
-
(2003)
Proc. ACM International Middleware Conference
, pp. 21-40
-
-
Reynolds, P.1
Vahdat, A.2
-
20
-
-
20544441668
-
Bringing efficient advanced queries to distributed hash tables
-
Proceedings - 29th Annual IEEE International Conference on Local Computer Networks, LCN 2004
-
D. Bauer, P. Hurley, R. Pletka, M. Waldvogel, Bringing efficient advanced queries to distributed hash tables, in: Proc. IEEE Conference on Local Computer Networks, Tampa, FL, United States, November 2004, pp. 6-14. (Pubitemid 40845188)
-
(2004)
Proceedings - Conference on Local Computer Networks, LCN
, pp. 6-14
-
-
Bauer, D.1
Hurley, P.2
Pletka, R.3
Waldvogel, M.4
-
21
-
-
0034206002
-
Summary Cache: A scalable wide-area web cache sharing protocol
-
L. Fan, P. Cao, J. Almeida, and A. Broder Summary Cache: a scalable wide-area web cache sharing protocol IEEE/ACM Transactions on Networking 8 3 2000 281 293
-
(2000)
IEEE/ACM Transactions on Networking
, vol.8
, Issue.3
, pp. 281-293
-
-
Fan, L.1
Cao, P.2
Almeida, J.3
Broder, A.4
-
22
-
-
8644274010
-
Analysis and management of streaming data: A survey
-
C. Jin, W. Qian, and A. Zhou Analysis and management of streaming data: a survey Journal of Software 15 8 2004 1172 1181
-
(2004)
Journal of Software
, vol.15
, Issue.8
, pp. 1172-1181
-
-
Jin, C.1
Qian, W.2
Zhou, A.3
-
23
-
-
26944503580
-
Bloom filters in probabilistic verification
-
Austin, Texas, USA, November
-
C.D. Peter, M. Panagiotis, Bloom filters in probabilistic verification, in: Proc. the 5th International Conference on Formal Methods in Computer-Aided Design, Austin, Texas, USA, November 2004, pp. 367-381.
-
(2004)
Proc.The 5th International Conference on Formal Methods in Computer-Aided Design
, pp. 367-381
-
-
Peter, C.D.1
Panagiotis, M.2
-
24
-
-
0036806148
-
Compressed bloom filters
-
DOI 10.1109/TNET.2002.803864
-
M. Mitzenmacher Compressed bloom filters IEEE/ACM Transactions on Networking 10 5 2002 604 612 (Pubitemid 35312139)
-
(2002)
IEEE/ACM Transactions on Networking
, vol.10
, Issue.5
, pp. 604-612
-
-
Mitzenmacher, M.1
-
27
-
-
8344263038
-
Space-code bloom filter for efficient per-flow traffic measurement
-
Hongkong, China, March
-
A. Kumar, J. Xu, J. Wang, O. Spatschek, L. Li, Space-code bloom filter for efficient per-flow traffic measurement, in: Proc. IEEE INFOCOM, Hongkong, China, March 2004, pp. 1762-1773.
-
(2004)
Proc. IEEE INFOCOM
, pp. 1762-1773
-
-
Kumar, A.1
Xu, J.2
Wang, J.3
Spatschek, O.4
Li, L.5
-
28
-
-
1142279462
-
Spectral bloom filters
-
SIGMOD, San Diego, CA, United States, June
-
S. Cohen, Y. Matias, Spectral bloom filters, in: Proc. ACM International Conference on Management of Data, SIGMOD, San Diego, CA, United States, June 2003, pp. 241-252.
-
(2003)
Proc. ACM International Conference on Management of Data
, pp. 241-252
-
-
Cohen, S.1
Matias, Y.2
-
29
-
-
70450232823
-
Network applications of bloom filters: A survey
-
A. Broder, and M. Mitzenmacher Network applications of bloom filters: a survey Internet Mathematics 1 4 2005 485 509
-
(2005)
Internet Mathematics
, vol.1
, Issue.4
, pp. 485-509
-
-
Broder, A.1
Mitzenmacher, M.2
-
30
-
-
84893007668
-
A forensic based IITN(Improved IP traceback against network attacks) Protocol, IST
-
Shanghai, China
-
E.H. Jeong, B.K. Lee, I.N. Jung, A forensic based IITN(Improved IP traceback against network attacks) Protocol, IST, in: Proceedings International Conference, IST2012, Shanghai, China, 2012, pp. 361-364.
-
(2012)
Proceedings International Conference, IST2012
, pp. 361-364
-
-
Jeong, E.H.1
Lee, B.K.2
Jung, I.N.3
-
32
-
-
0001882616
-
Fast algorithms for mining association rules
-
Santiago, Chile
-
R. Agrawal, R. Srikant, Fast algorithms for mining association rules, in: Proceedings of the 20th VLDB Conference, Santiago, Chile, 1994. http://rakesh.agrawal-family.com/papers/vldb94apriori.pdf.
-
(1994)
Proceedings of the 20th VLDB Conference
-
-
Agrawal, R.1
Srikant, R.2
-
33
-
-
0031220368
-
Using a hash-based method with transaction trimming for mining association rules
-
J.S. Park, M.S. Chen, and P.S. Yu Using a Hash-based method with transaction trimming for mining association rules The IEEE Transactions on Knowledge and Data Engineering 9 5 1997 813 825 (Pubitemid 127773161)
-
(1997)
IEEE Transactions on Knowledge and Data Engineering
, vol.9
, Issue.5
, pp. 813-825
-
-
Park, J.S.1
Chen, M.-S.2
Yu, P.S.3
-
35
-
-
77951138792
-
Study on application of apriori algorithm in data mining
-
January 22-24
-
Y. Liu, Study on application of apriori algorithm in data mining, in: Computer Modeling and Simulation, ICCMS'10, January 22-24, 2010, pp. 111-114.
-
(2010)
Computer Modeling and Simulation, ICCMS'10
, pp. 111-114
-
-
Liu, Y.1
-
36
-
-
84978638470
-
Association rule generation using apriori Mend algorithm for student's placement
-
D.M.D. Angeline, and I.S.P. James Association rule generation using apriori Mend algorithm for student's placement International Journal of Emerging Sciences 2 1 2012 78 86
-
(2012)
International Journal of Emerging Sciences
, vol.2
, Issue.1
, pp. 78-86
-
-
Angeline, D.M.D.1
James, I.S.P.2
-
38
-
-
84874229972
-
Evaluation of Huffman and arithmetic algorithms for multimedia compression standards
-
A. Shahbahrami, R. Bahrampour, M.S. Rostami, and M.A. Mobarhan Evaluation of Huffman and arithmetic algorithms for multimedia compression standards International Journal of Computer Science, Engineering and Applications (IJCSEA) 1 4 2011 34 47
-
(2011)
International Journal of Computer Science, Engineering and Applications (IJCSEA)
, vol.1
, Issue.4
, pp. 34-47
-
-
Shahbahrami, A.1
Bahrampour, R.2
Rostami, M.S.3
Mobarhan, M.A.4
-
40
-
-
84893012006
-
Draft text of Rec. X.tb-ucr: Traceback use cases and capabilities
-
T. Huirong, R. Brackney, H.Y. Youm, Draft text of Rec. X.tb-ucr: traceback use cases and capabilities, TD4158, ITU-T SG17, 2008.
-
(2008)
TD4158, ITU-T SG17
-
-
Huirong, T.1
Brackney, R.2
Youm, H.Y.3
-
42
-
-
0033650584
-
Practical network support for IP traceback
-
S. Savage, D. Wetherall, A. Karlin, and T. Anderson Practical network support for IP traceback ACM SIGCOMM Computer Communication Review 30 4 2000 295 306
-
(2000)
ACM SIGCOMM Computer Communication Review
, vol.30
, Issue.4
, pp. 295-306
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
43
-
-
84893006037
-
-
Network Simulator (ns-2)
-
Network Simulator (ns-2). http://www.isi.edu/nsnam/ns.
-
-
-
-
44
-
-
84893016967
-
-
Henry C.J. Lee, Vrizlynn L.L. Thing, Y. Xu, M. Ma, ICMP traceback with cumulative path, an efficient solution for IP trace back, https://users.cs.jmu. edu/aboutams/Public/IP%20TraceBack/ICMP%20Traceback%20with%20Cumulative%20Path. pdf.
-
ICMP Traceback with Cumulative Path, An Efficient Solution for IP Trace Back
-
-
Lee, J.H.C.1
Thing, L.V.L.2
Xu, Y.3
Ma, M.4
|