-
1
-
-
79951613635
-
Risk rank: Security risk ranking for IP flow records
-
oct
-
S. Wang, R. State, M. Ourdane, and T. Engel, "Risk Rank: Security risk ranking for IP flow records," in Network and Service Management (CNSM), 2010 International Conference on, oct. 2010, pp. 56-63.
-
(2010)
Network and Service Management (CNSM), 2010 International Conference on
, pp. 56-63
-
-
Wang, S.1
State, R.2
Ourdane, M.3
Engel, T.4
-
2
-
-
16244369398
-
Link analysis ranking: Algorithms, theory, and experiments
-
Feb.
-
A. Borodin, G. O. Roberts, J. S. Rosenthal, and P. Tsaparas, "Link analysis ranking: algorithms, theory, and experiments," ACM Trans. Internet Technol., vol. 5, no. 1, pp. 231-297, Feb. 2005.
-
(2005)
ACM Trans. Internet Technol.
, vol.5
, Issue.1
, pp. 231-297
-
-
Borodin, A.1
Roberts, G.O.2
Rosenthal, J.S.3
Tsaparas, P.4
-
3
-
-
4243148480
-
Authoritative sources in a hyperlinked environment
-
Sep.
-
J. M. Kleinberg, "Authoritative sources in a hyperlinked environment," J. ACM, vol. 46, no. 5, pp. 604-632, Sep. 1999.
-
(1999)
J. ACM
, vol.46
, Issue.5
, pp. 604-632
-
-
Kleinberg, J.M.1
-
4
-
-
77954870415
-
Mining netflow records for critical network activities
-
ser. AIMS'10
-
S. Wang, R. State, M. Ourdane, and T. Engel, "Mining netflow records for critical network activities," in Proceedings of the Mechanisms for autonomous management of networks and services, and 4th international conference on Autonomous infrastructure, management and security, ser. AIMS'10, 2010, pp. 135-146.
-
(2010)
Proceedings of the Mechanisms for Autonomous Management of Networks and Services, and 4th International Conference on Autonomous Infrastructure, Management and Security
, pp. 135-146
-
-
Wang, S.1
State, R.2
Ourdane, M.3
Engel, T.4
-
5
-
-
78149345705
-
Provenance-based trustworthiness assessment in sensor networks
-
ser. DMSN '10
-
H.-S. Lim, Y.-S. Moon, and E. Bertino, "Provenance-based trustworthiness assessment in sensor networks," in Proceedings of the Seventh International Workshop on Data Management for Sensor Networks, ser. DMSN '10, 2010, pp. 2-7.
-
(2010)
Proceedings of the Seventh International Workshop on Data Management for Sensor Networks
, pp. 2-7
-
-
Lim, H.-S.1
Moon, Y.-S.2
Bertino, E.3
-
8
-
-
84904216477
-
-
[Online; accessed 1-October]
-
"The Honeynet project, scan 18," http://old.honeynet.org/scans/ scan18/, [Online; accessed 1-October-2012].
-
(2012)
The Honeynet Project, Scan 18
-
-
-
10
-
-
85090433665
-
Snort - Lightweight intrusion detection for networks
-
ser. LISA '99. Berkeley, CA, USA: USENIX Association, [Online]
-
M. Roesch, "Snort - lightweight intrusion detection for networks," in Proceedings of the 13th USENIX conference on System administration, ser. LISA '99. Berkeley, CA, USA: USENIX Association, 1999, pp. 229-238. [Online]. Available: http://dl.acm.org/citation.cfm?id= 1039834.1039864
-
(1999)
Proceedings of the 13th USENIX Conference on System Administration
, pp. 229-238
-
-
Roesch, M.1
-
11
-
-
77954235092
-
A survey on page rank computing
-
P. Berkhin, "A survey on Page Rank computing," Internet Mathematics, vol. 2, no. 1, pp. 73-120, 2005.
-
(2005)
Internet Mathematics
, vol.2
, Issue.1
, pp. 73-120
-
-
Berkhin, P.1
-
12
-
-
85076921594
-
Automating network application dependency discovery: Experiences, limitations, and new solutions
-
ser. OSDI'08
-
X. Chen, M. Zhang, Z. M. Mao, and P. Bahl, "Automating network application dependency discovery: experiences, limitations, and new solutions," in Proceedings of the 8th USENIX conference on Operating systems design and implementation, ser. OSDI'08, 2008, pp. 117-130.
-
(2008)
Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation
, pp. 117-130
-
-
Chen, X.1
Zhang, M.2
Mao, Z.M.3
Bahl, P.4
-
13
-
-
42149143451
-
Network monitoring using traffic dispersion graphs (TDGs)
-
ser. IMC '07
-
M. Iliofotou, P. Pappu, M. Faloutsos, M. Mitzenmacher, S. Singh, and G. Varghese, "Network monitoring using traffic dispersion graphs (TDGs)," in Proceedings of the 7th ACM SIGCOMM conference on Internet measurement, ser. IMC '07, 2007, pp. 315-320.
-
(2007)
Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement
, pp. 315-320
-
-
Iliofotou, M.1
Pappu, P.2
Faloutsos, M.3
Mitzenmacher, M.4
Singh, S.5
Varghese, G.6
-
14
-
-
65249128484
-
What's going on?: Learning communication rules in edge networks
-
Aug.
-
S. Kandula, R. Chandra, and D. Katabi, "What's going on?: learning communication rules in edge networks," SIGCOMM Comput. Commun. Rev., vol. 38, no. 4, pp. 87-98, Aug. 2008.
-
(2008)
SIGCOMM Comput. Commun. Rev.
, vol.38
, Issue.4
, pp. 87-98
-
-
Kandula, S.1
Chandra, R.2
Katabi, D.3
-
16
-
-
77955127303
-
Flow rank: Ranking net flow records
-
ser. IWCMC '10
-
S. Wang, R. State, M. Ourdane, and T. Engel, "Flow Rank: ranking Net Flow records," in Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, ser. IWCMC '10, 2010, pp. 484-488.
-
(2010)
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference
, pp. 484-488
-
-
Wang, S.1
State, R.2
Ourdane, M.3
Engel, T.4
-
17
-
-
68649129121
-
Open flow: Enabling innovation in campus networks
-
Mar.
-
N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, and J. Turner, "Open Flow: enabling innovation in campus networks," SIGCOMM Comput. Commun. Rev., vol. 38, no. 2, pp. 69-74, Mar. 2008.
-
(2008)
SIGCOMM Comput. Commun. Rev.
, vol.38
, Issue.2
, pp. 69-74
-
-
McKeown, N.1
Anderson, T.2
Balakrishnan, H.3
Parulkar, G.4
Peterson, L.5
Rexford, J.6
Shenker, S.7
Turner, J.8
|