-
1
-
-
84857843743
-
-
Wired [Online].Available
-
K. Zetter, "Cisco security hole a whopper, " Wired 2005 [Online].Available: Http://www.wired.com/politics/security/news/2005/07/68328
-
(2005)
Cisco Security Hole A Whopper
-
-
Zetter, K.1
-
2
-
-
84855445451
-
-
[Online]. Available
-
T. Espiner, "Symantec warns of router compromise, " 2008 [Online]. Available: Http://news.cnet.com/Symantec-warns-ofrouter-compromise/ 2100-7349-3-6227502.html
-
(2008)
Symantec Warns of Router Compromise
-
-
Espiner, T.1
-
3
-
-
84907600187
-
-
Online]. Available
-
The Internet2 observatory: Proposal process, " 2008 [Online]. Available: Http://www.internet2.edu/observatory/archive/proposal-process. html
-
(2008)
The Internet2 Observatory: Proposal Process
-
-
-
4
-
-
0034819702
-
Database-friendly random projections
-
D. Achlioptas, "Database-friendly random projections, " in Proc. 20th ACM SIGMOD-SIGACT-SIGART PODS, New York, NY, USA, 2001, pp. 274-281.
-
(2001)
Proc. 20th ACM SIGMOD-SIGACT-SIGART PODS, New York, NY, USA
, pp. 274-281
-
-
Achlioptas, D.1
-
5
-
-
0029719644
-
The space complexity of approximating the frequency moments
-
N. Alon, Y. Matias, andM. Szegedy, "The space complexity of approximating the frequency moments, " in Proc. STOC, 1996, pp. 20-29.
-
(1996)
Proc. STOC
, pp. 20-29
-
-
Alon, N.1
Matias, Y.2
Szegedy, M.3
-
7
-
-
48349100653
-
Loss and delay accountability for the Internet
-
K. Argyraki, P. Maniatis, O. Irzak, S. Ashish, and S. Shenker, "Loss and delay accountability for the Internet, " in Proc. IEEE ICNP, 2007, pp. 194-205.
-
(2007)
Proc. IEEE ICNP
, pp. 194-205
-
-
Argyraki, K.1
Maniatis, P.2
Irzak, O.3
Ashish, S.4
Shenker, S.5
-
8
-
-
84907599401
-
Verifiable network-performance measurements
-
Art.
-
K. Argyraki, P. Maniatis, and A. Singla, "Verifiable network-performance measurements, " in Proc. ACM CoNEXT, 2010, Art. no. 1.
-
(2010)
Proc. ACM CoNEXT
, Issue.1
-
-
Argyraki, K.1
Maniatis, P.2
Singla, A.3
-
9
-
-
8344236729
-
Highly secure and efficient routing
-
I. Avramopoulos, H. Kobayashi, R. Wang, and A. Krishnamurthy, "Highly secure and efficient routing, " in Proc. IEEE Infocom, 2004, pp. 197-208.
-
(2004)
Proc. IEEE Infocom
, pp. 197-208
-
-
Avramopoulos, I.1
Kobayashi, H.2
Wang, R.3
Krishnamurthy, A.4
-
10
-
-
39149117709
-
ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks
-
Art. no.
-
B. Awerbuch, R. Curtmola, D. Holmer, C. Nita-Rotaru, and H. Rubens, "ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks, " Trans. Inf. Syst. Security, vol. 10, no. 4, 2008, Art. no. 6.
-
(2008)
Trans. Inf. Syst. Security
, vol.10
, Issue.4
, pp. 6
-
-
Awerbuch, B.1
Curtmola, R.2
Holmer, D.3
Nita-Rotaru, C.4
Rubens, H.5
-
11
-
-
0036986441
-
An on-demand secure routing protocol resilient to Byzantine failures
-
B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens, "An on-demand secure routing protocol resilient to Byzantine failures, " in Proc. ACM WiSE, 2002, pp. 21-30.
-
(2002)
Proc. ACM WiSE
, pp. 21-30
-
-
Awerbuch, B.1
Holmer, D.2
Nita-Rotaru, C.3
Rubens, H.4
-
12
-
-
44449117412
-
Protocols and lower bounds for failure localization in the Internet
-
B. Barak, S. Goldberg, and D. Xiao, "Protocols and lower bounds for failure localization in the Internet, " in Proc. EUROCRYPT, 2008, pp. 341-360.
-
(2008)
Proc. EUROCRYPT
, pp. 341-360
-
-
Barak, B.1
Goldberg, S.2
Xiao, D.3
-
13
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
B. H. Bloom, "Space/time trade-offs in hash coding with allowable errors, " Commun. ACM, vol. 13, no. 7, pp. 422-426, 1970.
-
(1970)
Commun. ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.H.1
-
14
-
-
0031703272
-
Detecting disruptive routers: A distributed network monitoring approach
-
K. A. Bradley, S. Cheung, N. Puketza, B. Mukherjee, and R. A. Olsson, "Detecting disruptive routers: A distributed network monitoring approach, " in Proc. IEEE Symp. Security Privacy, May 1998, pp. 115-124.
-
(1998)
Proc. IEEE Symp. Security Privacy, May
, pp. 115-124
-
-
Bradley, K.A.1
Cheung, S.2
Puketza, N.3
Mukherjee, B.4
Olsson, R.A.5
-
15
-
-
44249126961
-
SANE: A protection architecture for enterprise networks
-
Art.
-
M. Casado, T. Garfinkel, A. Akella, M. Freedman, D. Boneh, N. McKeown, and S. Shenker, "SANE: A protection architecture for enterprise networks, " in Proc. USENIX Security, 2006, Art. no 10.
-
(2006)
Proc. USENIX Security
, Issue.10
-
-
Casado, M.1
Garfinkel, T.2
Akella, A.3
Freedman, M.4
Boneh, D.5
McKeown, N.6
Shenker, S.7
-
16
-
-
0348230637
-
Finding frequent items in data streams
-
M. Charikar, K. Chen, and M. Farach-Colton, "Finding frequent items in data streams, " Theoret. Comput. Sci., vol. 312, no. 1, pp. 3-15, 2004.
-
(2004)
Theoret. Comput. Sci.
, vol.312
, Issue.1
, pp. 3-15
-
-
Charikar, M.1
Chen, K.2
Farach-Colton, M.3
-
17
-
-
79960627456
-
Survey on routing in data centers: Insights and future directions
-
Jul.-Aug.
-
K. Chen, C. Hu, X. Zhang, K. Zheng, Y. Chen, and T. Vasilakos, "Survey on routing in data centers: Insights and future directions, " IEEE Netw., vol. 25, no. 4, pp. 6-10, Jul.-Aug. 2011.
-
(2011)
IEEE Netw.
, vol.25
, Issue.4
, pp. 6-10
-
-
Chen, K.1
Hu, C.2
Zhang, X.3
Zheng, K.4
Chen, Y.5
Vasilakos, T.6
-
18
-
-
79952915989
-
Measuring and characterizing end-To-end route dynamics in the presence of load balancing
-
I. Cunha, R. Teixeira, and C. Diot, "Measuring and characterizing end-To-end route dynamics in the presence of load balancing, " in Proc. PAM, 2011, pp. 235-244.
-
(2011)
Proc. PAM
, pp. 235-244
-
-
Cunha, I.1
Teixeira, R.2
Diot, C.3
-
19
-
-
0000891810
-
Algorithm for solution of a problem of maximum flow in a network with power estimation
-
E. Dinic, "Algorithm for solution of a problem of maximum flow in a network with power estimation, " Soviet Math. Dokl, vol. 11, pp. 1277-1280, 1970.
-
(1970)
Soviet Math. Dokl
, vol.11
, pp. 1277-1280
-
-
Dinic, E.1
-
20
-
-
57349083089
-
Pathquality monitoring in the presence of adversaries
-
S. Goldberg, D. Xiao, E. Tromer, B. Barak, and J. Rexford, "Pathquality monitoring in the presence of adversaries, " in Proc. Sigmetrics, 2008, pp. 193-204.
-
(2008)
Proc. Sigmetrics
, pp. 193-204
-
-
Goldberg, S.1
Xiao, D.2
Tromer, E.3
Barak, B.4
Rexford, J.5
-
21
-
-
33750037341
-
A clean slate 4D approach to network control and management
-
A. Greenberg, G. Hjalmtysson, D. A. Maltz, A. Myers, J. Rexford, G. Xie, H. Yan, J. Zhan, and H. Zhang, "A clean slate 4D approach to network control and management, " Comput. Commun. Rev., vol. 35, no. 5, pp. 41-54, 2005.
-
(2005)
Comput. Commun. Rev.
, vol.35
, Issue.5
, pp. 41-54
-
-
Greenberg, A.1
Hjalmtysson, G.2
Maltz, D.A.3
Myers, A.4
Rexford, J.5
Xie, G.6
Yan, H.7
Zhan, J.8
Zhang, H.9
-
22
-
-
70450263497
-
VL2: A scalable and flexible data center network
-
A.Greenberg, N. Jain, S.Kandula, C. Kim, P. Lahiri, D.Maltz, P. Patel, and S. Sengupta, "VL2: A scalable and flexible data center network, " in Proc. ACM Sigcomm, 2009, pp. 51-62.
-
(2009)
Proc. ACM Sigcomm
, pp. 51-62
-
-
Greenberg, A.1
Jain, N.2
Kandula, S.3
Kim, C.4
Lahiri, P.5
Maltz, D.6
Patel, P.7
Sengupta, S.8
-
23
-
-
70450255244
-
BCube: A high performance, server-centric network architecture for modular data centers
-
C. Guo, G. Lu, D. Li, H. Wu, X. Zhang, Y. Shi, C. Tian, Y. Zhang, and S. Lu, "BCube: A high performance, server-centric network architecture for modular data centers, " in Proc. ACM Sigcomm, 2009, pp. 63-74.
-
(2009)
Proc. ACM Sigcomm
, pp. 63-74
-
-
Guo, C.1
Lu, G.2
Li, D.3
Wu, H.4
Zhang, X.5
Shi, Y.6
Tian, C.7
Zhang, Y.8
Lu, S.9
-
24
-
-
65249177665
-
Dcell: A scalable and fault-Tolerant network structure for data centers
-
C. Guo, H. Wu, K. Tan, L. Shiy, Y. Zhang, and S. Luz, "Dcell: A scalable and fault-Tolerant network structure for data centers, " in Proc. ACM Sigcomm, 2008, pp. 75-86.
-
(2008)
Proc. ACM Sigcomm
, pp. 75-86
-
-
Guo, C.1
Wu, H.2
Tan, K.3
Shiy, L.4
Zhang, Y.5
Luz, S.6
-
25
-
-
0033702951
-
Using conservation of flow as a security mechanism in network protocols
-
J. R. Hughes, T. Aura, and M. Bishop, "Using conservation of flow as a security mechanism in network protocols, " in Proc. IEEE Symp. Security Privacy, 2000, pp. 132-141.
-
(2000)
Proc. IEEE Symp. Security Privacy
, pp. 132-141
-
-
Hughes, J.R.1
Aura, T.2
Bishop, M.3
-
26
-
-
70450270822
-
Detailed diagnosis in enterprise networks
-
S. Kandula, R. Mahajan, P.Verkaik, S.Agarwal, J. Padhye, and P. Bahl, "Detailed diagnosis in enterprise networks, " in Proc. ACMSIGCOMM, 2009, pp. 243-254.
-
(2009)
Proc. ACMSIGCOMM
, pp. 243-254
-
-
Kandula, S.1
Mahajan, R.2
Verkaik, P.3
Agarwal, S.4
Padhye, J.5
Bahl, P.6
-
27
-
-
0141440838
-
Shining light on dark address space
-
C. Labovitz, A. Ahuja, and M. Bailey, "Shining light on dark address space, " Arbor Networks, Waltham, MA, USA, Tech. rep., 2001.
-
(2001)
Arbor Networks, Waltham, MA, USA, Tech. Rep.
-
-
Labovitz, C.1
Ahuja, A.2
Bailey, M.3
-
28
-
-
33947624156
-
An acknowledgment-based approach for the detection of routing misbehavior in MANETs
-
May
-
K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, "An acknowledgment-based approach for the detection of routing misbehavior in MANETs, " IEEE Trans. Mobile Comput., vol. 6, no. 5, pp. 536-550, May 2007.
-
(2007)
IEEE Trans. Mobile Comput.
, vol.6
, Issue.5
, pp. 536-550
-
-
Liu, K.1
Deng, J.2
Varshney, P.K.3
Balakrishnan, K.4
-
29
-
-
80051768284
-
Sustaining cooperation in multi-hop wireless networks
-
R. Mahajan, M. Rodrig, D.Wetherall, and J. Zahorjan, "Sustaining cooperation in multi-hop wireless networks, " in Proc. USENIX NSDI, 2005, pp. 231-244.
-
(2005)
Proc. USENIX NSDI
, pp. 231-244
-
-
Mahajan, R.1
Rodrig, M.2
Wetherall, D.3
Zahorjan, J.4
-
30
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks, " in Proc. ACM MobiCom, 2000, pp. 255-265.
-
(2000)
Proc. ACM MobiCom
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
31
-
-
68649129121
-
OpenFlow: Enabling innovation in campus networks
-
N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, and J. Turner, "OpenFlow: Enabling innovation in campus networks, " Comput. Commun. Rev., vol. 38, no. 2, pp. 69-74, 2008.
-
(2008)
Comput. Commun. Rev.
, vol.38
, Issue.2
, pp. 69-74
-
-
McKeown, N.1
Anderson, T.2
Balakrishnan, H.3
Parulkar, G.4
Peterson, L.5
Rexford, J.6
Shenker, S.7
Turner, J.8
-
32
-
-
33748117052
-
Fatih: Detecting and isolating malicious routers
-
Sep.
-
A. T. Mizrak, Y. c. Cheng, K. Marzullo, and S. Savage, "Fatih: Detecting and isolating malicious routers, " IEEE Trans. Depend. Secure Comput., vol. 3, no. 3, pp. 230-244, Jul.-Sep. 2005.
-
(2005)
IEEE Trans. Depend. Secure Comput.
, vol.3
, Issue.3
, pp. 230-244
-
-
Mizrak, A.T.1
Cheng, Y.C.2
Marzullo, K.3
Savage, S.4
-
33
-
-
70450278903
-
PortLand: A scalable fault-Tolerant layer 2 data center network fabric
-
R. N. Mysore, A. Pamboris, N. Farrington, N. Huang, P. Miri, S. Radhakrishnan, and V. Subram, "PortLand: A scalable fault-Tolerant layer 2 data center network fabric, " in Proc. ACM Sigcomm, 2009, pp. 39-50.
-
(2009)
Proc. ACM Sigcomm
, pp. 39-50
-
-
Mysore, R.N.1
Pamboris, A.2
Farrington, N.3
Huang, N.4
Miri, P.5
Radhakrishnan, S.6
Subram, V.7
-
34
-
-
78650227146
-
Complexity results for the spanning tree congestion problem
-
Y.Otachi, H. L. Bodlaender, and E. J. v. Leeuwen, "Complexity results for the spanning tree congestion problem, " in Proc. Workshop Graph Theoret. Concept Comput. Sci., 2010, pp. 3-14.
-
(2010)
Proc. Workshop Graph Theoret. Concept Comput. Sci.
, pp. 3-14
-
-
Otachi, Y.1
Bodlaender, H.L.2
Leeuwen, E.J.V.3
-
35
-
-
2342630172
-
Secure traceroute to detect faulty or malicious routing
-
V. N. Padmanabhan and D. R. Simon, "Secure traceroute to detect faulty or malicious routing, " Comput. Commun. Rev., vol. 33, no. 1, pp. 77-82, 2003.
-
(2003)
Comput. Commun. Rev.
, vol.33
, Issue.1
, pp. 77-82
-
-
Padmanabhan, V.N.1
Simon, D.R.2
-
36
-
-
0242426103
-
The TESLA broadcast authentication protocol
-
A. Perrig, R. Canetti, D. Song, and D. Tygar, "The TESLA broadcast authentication protocol, " Cryptobytes, vol. 5, no. 2, pp. 2-13, 2002.
-
(2002)
Cryptobytes
, vol.5
, Issue.2
, pp. 2-13
-
-
Perrig, A.1
Canetti, R.2
Song, D.3
Tygar, D.4
-
37
-
-
13944259535
-
Measuring ISP topologies with Rocketfuel
-
N. Spring, R. Mahajan, and D. Wetherall, "Measuring ISP topologies with Rocketfuel, " in Proc. ACM Sigcomm, 2002, pp. 133-145.
-
(2002)
Proc. ACM Sigcomm
, pp. 133-145
-
-
Spring, N.1
Mahajan, R.2
Wetherall, D.3
-
38
-
-
27544480006
-
-
[Online]. Available
-
R. Thomas, "ISP security bof, nanog 28, " 2003 [Online]. Available: Http://www.nanog.org/meetings/nanog28/presentations/thomas.pdf
-
(2003)
ISP Security Bof, Nanog 28
-
-
Thomas, R.1
-
39
-
-
30744449603
-
Tabulation based 4-universal hashing with applications to second moment estimation
-
M. Thorup and Y. Zhang, "Tabulation based 4-universal hashing with applications to second moment estimation, " in Proc. SODA, 2004, pp. 615-624.
-
(2004)
Proc. SODA
, pp. 615-624
-
-
Thorup, M.1
Zhang, Y.2
-
40
-
-
70350757800
-
Packet-dropping adversary identification for data plane security
-
Art.
-
X. Zhang, A. Jain, and A. Perrig, "Packet-dropping adversary identification for data plane security, " in Proc. ACM CoNEXT, 2008, Art. no 24.
-
(2008)
Proc. ACM CoNEXT
, Issue.24
-
-
Zhang, X.1
Jain, A.2
Perrig, A.3
-
41
-
-
84878355953
-
Secure and scalable network fault localization under dynamic traffic patterns
-
X. Zhang, C. Lan, and A. Perrig, "Secure and scalable network fault localization under dynamic traffic patterns, " in Proc. IEEE Symp. Security Privacy, 2012, pp. 317-331.
-
(2012)
Proc. IEEE Symp. Security Privacy
, pp. 317-331
-
-
Zhang, X.1
Lan, C.2
Perrig, A.3
-
42
-
-
84055200941
-
Network fault localization with small TCB
-
X. Zhang, Z. Zhou, G. Hasker, A. Perrig, and V. Gligor, "Network fault localization with small TCB, " in Proc. IEEE ICNP, 2011, pp. 143-154.
-
(2011)
Proc. IEEE ICNP
, pp. 143-154
-
-
Zhang, X.1
Zhou, Z.2
Hasker, G.3
Perrig, A.4
Gligor, V.5
-
43
-
-
85180801198
-
Shortmac: Efficient data plane fault localization
-
X. Zhang, Z. Zhou, H.-C. Hsiao, A. Perrig, and P. Tague, "Shortmac: Efficient data plane fault localization, " in Proc. NDSS, 2012.
-
(2012)
Proc. NDSS
-
-
Zhang, X.1
Zhou, Z.2
Hsiao, H.-C.3
Perrig, A.4
Tague, P.5
|