-
1
-
-
85180417462
-
Efficient and effective explanations of change in hierarchical summaries
-
D. Agarwal, D. Barman, D. Gunopulous, F. Korn, D. Srivastava, and N. Young. Efficient and effective explanations of change in hierarchical summaries. In Proceedings of KDD'07, 2007.
-
(2007)
Proceedings of KDD'07
-
-
Agarwal, D.1
Barman, D.2
Gunopulous, D.3
Korn, F.4
Srivastava, D.5
Young, N.6
-
4
-
-
34548719249
-
Parsimonious explanations of change in hierarchical data
-
D. Barman, F. Korn, D. Srivastava, D. Gunopulos, N. Yong, and D. Agarwal. Parsimonious explanations of change in hierarchical data. In Proceedings of ICDE 2007, 2007.
-
(2007)
Proceedings of ICDE 2007
-
-
Barman, D.1
Korn, F.2
Srivastava, D.3
Gunopulos, D.4
Yong, N.5
Agarwal, D.6
-
5
-
-
42149173109
-
Using uncleanliness to predict future botnet addresses
-
M. P. Collins, T. J. Shimeall, S. Faber, J. Naies, R. Weaver, and M. D. Shon. Using uncleanliness to predict future botnet addresses. In Proceedings of the Internet Measurement Conference, 2007.
-
(2007)
Proceedings of the Internet Measurement Conference
-
-
Collins, M. P.1
Shimeall, T. J.2
Faber, S.3
Naies, J.4
Weaver, R.5
Shon, M. D.6
-
6
-
-
85180415529
-
-
http://www.confickerworkinggroup.org/wiki/.
-
-
-
-
7
-
-
3142735161
-
Diamond in the rough: finding hierarchical heavy hitters in multi-dimensional data
-
New York, NY, USA, ACM
-
G. Cormode, F. Korn, S. Muthukrishnan, and D. Srivastava. Diamond in the rough: finding hierarchical heavy hitters in multi-dimensional data. In SIGMOD'04: Proceedings of the 2004 ACM SIGMOD international conference on Management of data, pages 155-166, New York, NY, USA, 2004. ACM.
-
(2004)
SIGMOD'04: Proceedings of the 2004 ACM SIGMOD international conference on Management of data
, pp. 155-166
-
-
Cormode, G.1
Korn, F.2
Muthukrishnan, S.3
Srivastava, D.4
-
8
-
-
85180401077
-
-
http://www.fbi.gov/news/stories/2011/november/malware_110911/.
-
-
-
-
10
-
-
14944346102
-
Automatically inferring patterns of resource consumption in network traffic
-
C. Estan, S. Savage, and G. Varghese. Automatically inferring patterns of resource consumption in network traffic. In SIGCOMM, 2003.
-
(2003)
SIGCOMM
-
-
Estan, C.1
Savage, S.2
Varghese, G.3
-
12
-
-
85180414673
-
-
http://blog.fireeye.com/research/2012/07/grum-botnet-no-longer-safe-havens. html.
-
-
-
-
13
-
-
85041447270
-
Detecting spammers with SNARE: Spatiotemporal network-level automatic reputation engine
-
S. Hao, N. A. Syed, N. Feamster, A. Gray, and S. Krasser. Detecting spammers with SNARE: Spatiotemporal network-level automatic reputation engine. In Proceedings of Usenix Security Symposium, 2009.
-
(2009)
Proceedings of Usenix Security Symposium
-
-
Hao, S.1
Syed, N. A.2
Feamster, N.3
Gray, A.4
Krasser, S.5
-
21
-
-
34248379606
-
Analyzing large ddos attacks using multiple data sources
-
Z. M. Mao, V. Sekar, O. Spatscheck, J. van der Merwe, and R. Vasudevan. Analyzing large ddos attacks using multiple data sources. In ACM SIGCOMM Workshop on Large Scale Attack Defense, 2006.
-
(2006)
ACM SIGCOMM Workshop on Large Scale Attack Defense
-
-
Mao, Z. M.1
Sekar, V.2
Spatscheck, O.3
van der Merwe, J.4
Vasudevan, R.5
-
25
-
-
85180411393
-
-
http://www.symantec.com/security_response/writeup.jsp?docid= 2006-011714-3948-99.
-
-
-
-
27
-
-
84968706754
-
Improving spam blacklisting through dynamic thresholding and speculative aggregation
-
S. Sinha, M. Bailey, and F. Jahanian. Improving spam blacklisting through dynamic thresholding and speculative aggregation. In Proceedings of NDSS 2010, 2010.
-
(2010)
Proceedings of NDSS 2010
-
-
Sinha, S.1
Bailey, M.2
Jahanian, F.3
-
28
-
-
70349658385
-
Optimal filtering of source address prefixes: Models and algorithms
-
F. Soldo, A. Markopoulo, and K. Argyraki. Optimal filtering of source address prefixes: Models and algorithms. In INFOCOM, 2009.
-
(2009)
INFOCOM
-
-
Soldo, F.1
Markopoulo, A.2
Argyraki, K.3
-
29
-
-
84858728623
-
Tracking dynamic sources of malicious activity at internet-scale
-
S. Venkataraman, A. Blum, D. Song, S. Sen, and O. Spatscheck. Tracking dynamic sources of malicious activity at internet-scale. In NIPS, 2009.
-
(2009)
NIPS
-
-
Venkataraman, S.1
Blum, A.2
Song, D.3
Sen, S.4
Spatscheck, O.5
-
30
-
-
70350215415
-
Exploiting network structure for proactive spam mitigation
-
S. Venkataraman, S. Sen, O. Spatscheck, P. Haffner, and D. Song. Exploiting network structure for proactive spam mitigation. In Proceedings of Usenix Security'07, 2007.
-
(2007)
Proceedings of Usenix Security'07
-
-
Venkataraman, S.1
Sen, S.2
Spatscheck, O.3
Haffner, P.4
Song, D.5
-
31
-
-
36949011812
-
How dynamic are IP addresses?
-
Y. Xie, F. Yu, K. Achan, E. Gillum, M. Goldszmidt, and T. Wobber. How dynamic are IP addresses? In Proceedings of ACM SIGCOMM, 2007.
-
(2007)
Proceedings of ACM SIGCOMM
-
-
Xie, Y.1
Yu, F.2
Achan, K.3
Gillum, E.4
Goldszmidt, M.5
Wobber, T.6
-
32
-
-
58449122201
-
Spamming botnets: signatures and characteristics
-
Y. Xie, F. Yu, K. Achan, R. Panigrahy, G. Hulten, and I. Osipkov. Spamming botnets: signatures and characteristics. In Proceedings of SIGCOMM 2008, 2008.
-
(2008)
Proceedings of SIGCOMM 2008
-
-
Xie, Y.1
Yu, F.2
Achan, K.3
Panigrahy, R.4
Hulten, G.5
Osipkov, I.6
-
34
-
-
14944356227
-
Online identification of hierarchical heavy hitters: algorithms, evaluation, and applications
-
New York, NY, USA, ACM
-
Y. Zhang, S. Singh, S. Sen, N. Duffield, and C. Lund. Online identification of hierarchical heavy hitters: algorithms, evaluation, and applications. In IMC'04: Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, pages 101-114, New York, NY, USA, 2004. ACM.
-
(2004)
IMC'04: Proceedings of the 4th ACM SIGCOMM conference on Internet measurement
, pp. 101-114
-
-
Zhang, Y.1
Singh, S.2
Sen, S.3
Duffield, N.4
Lund, C.5
|