-
1
-
-
84910117604
-
-
Alexa. Alexa. http://alexa.com/2014.
-
(2014)
Alexa
-
-
-
2
-
-
84890077627
-
Next stop, the cloud: Understanding modern web service deployment in ec2 and azure
-
ACM
-
Keqiang He, Alexis Fisher, Liang Wang, Aaron Gember, Aditya Akella, and Thomas Ristenpart. Next stop, the cloud: understanding modern web service deployment in EC2 and Azure. In IMC 2013, pages 177-190. ACM, 2013.
-
(2013)
IMC 2013
, pp. 177-190
-
-
He, K.1
Fisher, A.2
Wang, L.3
Gember, A.4
Akella, A.5
Ristenpart, T.6
-
3
-
-
84910112008
-
-
Whowas project. http://www.cloudwhowas.org/.
-
Whowas Project
-
-
-
4
-
-
84910152447
-
-
Amazon. Amazon EC2 instance IP addressing. http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-instance-addressing.html#MultipleIP 2013.
-
(2013)
Amazon EC2 Instance IP Addressing
-
-
-
5
-
-
84910115034
-
-
Far sight Security. Passive DNS data. https://www.dnsdb.info/2014.
-
(2014)
Far Sight Security
-
-
-
12
-
-
85180631252
-
Cyber probe: Towards internet-scale active detection of malicious servers
-
Antonio Nappa, Zhaoyan Xu, M. Zubair Rafique, Juan Caballero, and Guofei Gu. Cyber probe: Towards internet-scale active detection of malicious servers. In Network and Distributed System Security Symposium, 2014.
-
(2014)
Network and Distributed System Security Symposium
-
-
Nappa, A.1
Xu, Z.2
Rafique, M.Z.3
Caballero, J.4
Gu, G.5
-
13
-
-
84910136202
-
Auto probe: Towards automatic active malicious server probing using dynamic binary analysis
-
Scottsdale, AZ, November
-
Zhaoyan Xu, Antonio Nappa, Robert Baykov, Guangliang Yang, Juan Caballero, and Guofei Gu. Auto Probe: Towards Automatic Active Malicious Server Probing Using Dynamic Binary Analysis. In Proceedings of the 21st ACM Conference on Computer and Communication Security, Scottsdale, AZ, November 2014.
-
(2014)
Proceedings of the 21st ACM Conference on Computer and Communication Security
-
-
Xu, Z.1
Nappa, A.2
Baykov, R.3
Yang, G.4
Caballero, J.5
Gu, G.6
-
15
-
-
85084162258
-
How to own the internet in your spare time
-
San Francisco, CA, August
-
Stuart Staniford, Vern Paxson, and Nicholas Weaver. How to own the internet in your spare time. In USENIX Security Symposium, San Francisco, CA, August 2002.
-
(2002)
USENIX Security Symposium
-
-
Staniford, S.1
Paxson, V.2
Weaver, N.3
-
16
-
-
84866985287
-
Netmap: A novel framework for fast packet i/o
-
Luigi Rizzo. Netmap: A novel framework for fast packet i/o. In usenixatc, 2012.
-
(2012)
Use Nixatc
-
-
Rizzo, L.1
-
18
-
-
78650916363
-
Demystifying service discovery: Implementing an internet-wide scanner
-
ACM
-
D. Leonard and D. Loguinov. Demystifying service discovery: Implementing an internet-wide scanner. In Internet Measurement Conference. ACM, 2010.
-
(2010)
Internet Measurement Conference
-
-
Leonard, D.1
Loguinov, D.2
-
20
-
-
84863590115
-
A security analysis of amazon's elastic compute cloud service
-
ACM
-
Marco Balduzzi, Jonas Zaddach, Davide Balzarotti, Engin Kirda, and Sergio Loureiro. A security analysis of amazon's elastic compute cloud service. In Proceedings of the 27th Annual ACM Symposium on Applied Computing, pages 1427-1434. ACM, 2012.
-
(2012)
Proceedings of the 27th Annual ACM Symposium on Applied Computing
, pp. 1427-1434
-
-
Balduzzi, M.1
Zaddach, J.2
Balzarotti, D.3
Kirda, E.4
Loureiro, S.5
-
23
-
-
84910151055
-
-
Amazon. Amazon EC2 public IP ranges. https://forums.aws.amazon.com/ann.jspa?annID=1701, 2013.
-
(2013)
Amazon EC2 Public IP Ranges
-
-
-
24
-
-
84910144437
-
-
Microsoft. Azure datacenter IP ranges. http://msdn.microsoft.com/en-us/library/azure/dn175718.aspx 2013.
-
(2013)
Azure Datacenter IP Ranges
-
-
-
29
-
-
0035532141
-
Estimating the number of clusters in a data set via the gap statistic
-
Robert Tibshirani, Guenther Walther, and Trevor Hastie. Estimating the number of clusters in a data set via the gap statistic. Journal of the Royal Statistical Society: Series B (Statistical Methodology), 63(2):411-423, 2001.
-
(2001)
Journal of the Royal Statistical Society: Series B (Statistical Methodology)
, vol.63
, Issue.2
, pp. 411-423
-
-
Tibshirani, R.1
Walther, G.2
Hastie, T.3
-
30
-
-
35348911985
-
Detecting near-duplicates for web crawling
-
ACM
-
Gurmeet Singh Manku, Arvind Jain, and Anish Das Sarma. Detecting near-duplicates for web crawling. In WWW 2007, pages 141-150. ACM, 2007.
-
(2007)
WWW 2007
, pp. 141-150
-
-
Manku, G.S.1
Jain, A.2
Sarma, A.D.3
-
31
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
ACM
-
Thomas Ristenpart, Eran Tromer, Hovav Shacham, and Stefan Savage. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In CCS 2009, pages 199-212. ACM, 2009.
-
(2009)
CCS 2009
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
33
-
-
84883374524
-
-
Huan Liu. Amazon data center size. http://huanliu.wordpress.com/2012/03/13/amazon-data-center-size/, 2012.
-
(2012)
Amazon Data Center Size
-
-
Liu, H.1
-
34
-
-
84910154135
-
-
Robot exclusion. http://www.robotstxt.org/faq/prevent.html.
-
Robot Exclusion
-
-
-
36
-
-
85040241330
-
Dimensionality reduction for fast similarity search in large time series databases
-
Eamonn Keogh, Kaushik Chakrabarti, Michael Pazzani, and Sharad Mehrotra. Dimensionality reduction for fast similarity search in large time series databases. Knowledge and information Systems, 3(3):263-286, 2001.
-
(2001)
Knowledge and Information Systems
, vol.3
, Issue.3
, pp. 263-286
-
-
Keogh, E.1
Chakrabarti, K.2
Pazzani, M.3
Mehrotra, S.4
-
37
-
-
84881260115
-
Finding the linchpins of the dark web: A study on topologically dedicated hosts on malicious web infrastructures
-
IEEE
-
Zhou Li, Sumayah Alrwais, Yinglian Xie, Fang Yu, and XiaoFeng Wang. Finding the linchpins of the dark web: A study on topologically dedicated hosts on malicious web infrastructures. In S&P 2013, pages 112-126. IEEE, 2013.
-
(2013)
S&P 2013
, pp. 112-126
-
-
Li, Z.1
Alrwais, S.2
Xie, Y.3
Yu, F.4
Wang, X.5
-
39
-
-
84910129831
-
-
tr.im. tr.im. http://tr.im, 2013.
-
(2013)
Tr.im. Tr.im.
-
-
-
41
-
-
84910119058
-
-
CVE. Cve-2013-4338. http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-4338, 2013.
-
(2013)
CVE. Cve-2013-4338
-
-
-
43
-
-
84910137452
-
-
Google. Accounts and views. https://developers.google.com/analytics/resources/concepts/gaConceptsAccounts, 2013.
-
(2013)
Accounts and Views
-
-
|