-
1
-
-
33846200876
-
Entropy based worm and anomaly detection in fast ip networks
-
Wagner, A., Plattner, B.: Entropy based worm and anomaly detection in fast ip networks. In: WETICE (2005)
-
(2005)
WETICE
-
-
Wagner, A.1
Plattner, B.2
-
2
-
-
84857332705
-
Cross-domain collaborative anomaly detection: So far yet so close
-
In: Sommer, R., Balzarotti, D., Maier, G. (eds.) Springer, Heidelberg
-
Boggs, N., Hiremagalore, S., Stavrou, A., Stolfo, S.J.: Cross-domain collaborative anomaly detection: so far yet so close. In: Sommer, R., Balzarotti, D., Maier, G. (eds.) RAID 2011. LNCS, vol. 6961, pp. 142-160. Springer, Heidelberg (2011)
-
(2011)
RAID 2011. LNCS
, vol.6961
, pp. 142-160
-
-
Boggs, N.1
Hiremagalore, S.2
Stavrou, A.3
Stolfo, S.J.4
-
3
-
-
85077707798
-
Highly predictive blacklisting
-
Zhang, J., Porras, P., Ullrich, J.: Highly predictive blacklisting. In: USENIX Security, vol. 8, pp. 107-122 (2008)
-
(2008)
USENIX Security
, vol.8
, pp. 107-122
-
-
Zhang, J.1
Porras, P.2
Ullrich, J.3
-
7
-
-
85084161642
-
Challenges in experimenting with botnet detection systems
-
Aviv, A.J., Haeberlen, A.: Challenges in experimenting with botnet detection systems. In: USENIX 4th CSET Workshop (2011)
-
(2011)
USENIX 4th CSET Workshop
-
-
Aviv, A.J.1
Haeberlen, A.2
-
10
-
-
84865538933
-
A network in a laptop: Rapid prototyping for software-defined networks
-
ACM
-
Lantz, B., Heller, B., McKeown, N.: A network in a laptop: rapid prototyping for software-defined networks. In: Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks, p. 19. ACM (2010)
-
(2010)
Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks
, pp. 19
-
-
Lantz, B.1
Heller, B.2
McKeown, N.3
-
11
-
-
33746144908
-
Tmix: A tool for generating realistic tcp application workloads in ns-2
-
Weigle, M.C., Adurthi, P., Hernandez-Campos, F., Jeffay, K., Smith, F.D.: Tmix: a tool for generating realistic tcp application workloads in ns-2. ACM SIGCOMM Computer Communication Review 36(3), 65-76 (2006)
-
(2006)
ACM SIGCOMM Computer Communication Review
, vol.36
, Issue.3
, pp. 65-76
-
-
Weigle, M.C.1
Adurthi, P.2
Hernandez-Campos, F.3
Jeffay, K.4
Smith, F.D.5
-
12
-
-
70349671163
-
Rapid: Shrinking the congestion-control timescale
-
IEEE
-
Konda, V., Kaur, J.: Rapid: Shrinking the congestion-control timescale. In: IEEE INFOCOM 2009, pp. 1-9. IEEE (2009)
-
(2009)
IEEE INFOCOM 2009
, pp. 1-9
-
-
Konda, V.1
Kaur, J.2
-
13
-
-
8344272005
-
Stochastic models for generating synthetic http source traffic
-
IEEE
-
Cao, J., Cleveland, W.S., Gao, Y., Jeffay, K., Smith, F.D., Weigle, M.: Stochastic models for generating synthetic http source traffic. In: INFOCOM 2004, vol. 3, pp. 1546-1557. IEEE (2004)
-
(2004)
INFOCOM 2004
, vol.3
, pp. 1546-1557
-
-
Cao, J.1
Cleveland, W.S.2
Gao, Y.3
Jeffay, K.4
Smith, F.D.5
Weigle, M.6
-
14
-
-
0042474173
-
Internet quarantine: Requirements for containing self-propagating code
-
IEEE
-
Moore, D., Shannon, C., Voelker, G.M., Savage, S.: Internet quarantine: Requirements for containing self-propagating code. In: IEEE INFOCOM 2003, pp. 1901-1910. IEEE (2003)
-
(2003)
IEEE INFOCOM 2003
, pp. 1901-1910
-
-
Moore, D.1
Shannon, C.2
Voelker, G.M.3
Savage, S.4
-
15
-
-
85093847546
-
Peer-to-peer botnets: Overview and case study
-
Grizzard, J.B., Sharma, V., Nunnery, C., Kang, B.B., Dagon, D.: Peer-to-peer botnets: Overview and case study. In: HOTBOTS, pp. 1-8 (2007)
-
(2007)
HOTBOTS
, pp. 1-8
-
-
Grizzard, J.B.1
Sharma, V.2
Nunnery, C.3
Kang, B.B.4
Dagon, D.5
-
16
-
-
44049089796
-
Recent advances in network intrusion detection system tuning
-
Sommers, J., Yegneswaran, V., Barford, P.: Recent advances in network intrusion detection system tuning. In: IEEE 40th Annual CISS, pp. 1490-1495 (2006)
-
(2006)
IEEE 40th Annual CISS
, pp. 1490-1495
-
-
Sommers, J.1
Yegneswaran, V.2
Barford, P.3
-
17
-
-
34248638605
-
Simulating non-scanning worms on peer-to-peer networks
-
Chen, G., Gray, R.S.: Simulating non-scanning worms on peer-to-peer networks. In: ACM INFOSCALE, p. 29 (2006)
-
(2006)
ACM INFOSCALE
, pp. 29
-
-
Chen, G.1
Gray, R.S.2
-
18
-
-
84879333627
-
Lariat: Lincoln adaptable real-time information assurance testbed
-
IEEE
-
Rossey, L.M., Cunningham, R.K., Fried, D.J., Rabek, J.C., Lippmann, R.P., Haines, J.W., Zissman, M.A.: Lariat: Lincoln adaptable real-time information assurance testbed. In: IEEE Aerospace Conference Proceedings 2002, vol. 6, pp. 6-2671. IEEE (2002)
-
(2002)
IEEE Aerospace Conference Proceedings 2002
, vol.6
, pp. 6-2671
-
-
Rossey, L.M.1
Cunningham, R.K.2
Fried, D.J.3
Rabek, J.C.4
Lippmann, R.P.5
Haines, J.W.6
Zissman, M.A.7
-
19
-
-
0037076425
-
Agent-based modeling: Methods and techniques for simulating human systems
-
Bonabeau, E.: Agent-based modeling: Methods and techniques for simulating human systems. PNAS 99(suppl. 3), 7280-7287 (2002)
-
(2002)
PNAS
, vol.99
, Issue.SUPPL. 3
, pp. 7280-7287
-
-
Bonabeau, E.1
-
21
-
-
84906490384
-
-
Dshield.org, http://www.dshield.org/
-
-
-
-
22
-
-
84906499846
-
-
Caida data overview, http://www.caida.org/data/overview/
-
-
-
-
23
-
-
84906499847
-
-
Argus: Audit records generation and utilization system
-
Argus: Audit records generation and utilization system, http://qosient.com/argus/
-
-
-
-
24
-
-
84861619781
-
Subflow: Towards practical flow-level traffic classification
-
IEEE
-
Xie, G., Iliofotou, M., Keralapura, R., Faloutsos, M., Nucci, A.: Subflow: Towards practical flow-level traffic classification. In: IEEE INFOCOM, 2012 Proceedings, pp. 2541-2545. IEEE (2012)
-
(2012)
IEEE INFOCOM, 2012 Proceedings
, pp. 2541-2545
-
-
Xie, G.1
Iliofotou, M.2
Keralapura, R.3
Faloutsos, M.4
Nucci, A.5
-
25
-
-
85077580912
-
Role classification of hosts within enterprise networks based on connection patterns
-
Tan, G., Poletto, M., Guttag, J.V., Kaashoek, M.F.: Role classification of hosts within enterprise networks based on connection patterns. In: USENIX Annual Technical Conference, General Track, pp. 15-28 (2003)
-
(2003)
USENIX Annual Technical Conference, General Track
, pp. 15-28
-
-
Tan, G.1
Poletto, M.2
Guttag, J.V.3
Kaashoek, M.F.4
-
26
-
-
56349094785
-
Fast unfolding of communities in large networks
-
Blondel, V.D., Guillaume, J.L., Lambiotte, R., Lefebvre, E.: Fast unfolding of communities in large networks. Journal of Statistical Mechanics: Theory and Experiment 2008(10), P10008 (2008)
-
(2008)
Journal of Statistical Mechanics: Theory and Experiment
, vol.2008
, Issue.10
-
-
Blondel, V.D.1
Guillaume, J.L.2
Lambiotte, R.3
Lefebvre, E.4
-
27
-
-
84905692209
-
Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains
-
Hutchins, E.M., Cloppert, M.J., Amin, R.M.: Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains. Leading Issues in Information Warfare & Security Research 1, 80 (2011)
-
(2011)
Leading Issues in Information Warfare & Security Research
, vol.1
, pp. 80
-
-
Hutchins, E.M.1
Cloppert, M.J.2
Amin, R.M.3
-
28
-
-
84906518403
-
-
Plot digitizer, http://plotdigitizer.sourceforge.net/
-
-
-
-
30
-
-
79955519674
-
-
Technical report, Los Alamos National Laboratory, LANL
-
Hagberg, A., Swart, P., Schult, D.: Exploring network structure, dynamics, and function using networkx. Technical report, Los Alamos National Laboratory, LANL (2008)
-
(2008)
Exploring Network Structure, Dynamics, and Function Using Networkx
-
-
Hagberg, A.1
Swart, P.2
Schult, D.3
-
32
-
-
0038483826
-
Emergence of scaling in random networks
-
Barabasi, A.L., Albert, R.: Emergence of scaling in random networks. Science 286(5439), 509-512 (1999)
-
(1999)
Science
, vol.286
, Issue.5439
, pp. 509-512
-
-
Barabasi, A.L.1
Albert, R.2
|