-
3
-
-
85076295047
-
-
Open resolver project. http://openresolverproject.org/.
-
-
-
-
6
-
-
84952784484
-
-
Anonymous Mar.
-
Anonymous. Internet census 2012. http://census2012.sourceforge.net/paper.html, Mar. 2013.
-
(2013)
Internet Census 2012
-
-
-
9
-
-
84916608100
-
Elliptic curve cryptography in practice
-
J. W. Bos, J. A. Halderman, N. Heninger, J. Moore, M. Naehrig, and E. Wustrow. Elliptic curve cryptography in practice. In Proc. 18th International Conference on Financial Cryptography and Data Security (FC), 2014.
-
(2014)
Proc. 18th International Conference on Financial Cryptography and Data Security (FC)
-
-
Bos, J.W.1
Halderman, J.A.2
Heninger, N.3
Moore, J.4
Naehrig, M.5
Wustrow, E.6
-
10
-
-
84942576949
-
-
S. Checkoway, M. Fredrikson, R. Niederhagen, M. Green, T. Lange, T. Ristenpart, D. J. Bernstein, J. Maskiewicz, and H. Shacham. On the practical exploitability of dual EC in TLS implementations.
-
On the Practical Exploitability of Dual EC in TLS Implementations
-
-
Checkoway, S.1
Fredrikson, M.2
Niederhagen, R.3
Green, M.4
Lange, T.5
Ristenpart, T.6
Bernstein, D.J.7
Maskiewicz, J.8
Shacham, H.9
-
13
-
-
14944363571
-
Toward understanding distributed blackhole placement
-
E. Cooke, M. Bailey, Z. M. Mao, D. Watson, F. Jahanian, and D. McPherson. Toward understanding distributed blackhole placement. In Proc. ACM workshop on Rapid malcode, pages 54-64, 2004.
-
(2004)
Proc. ACM Workshop on Rapid Malcode
, pp. 54-64
-
-
Cooke, E.1
Bailey, M.2
Mao, Z.M.3
Watson, D.4
Jahanian, F.5
McPherson, D.6
-
14
-
-
84890105845
-
Understanding IPv6 internet background radiation
-
J. Czyz, K. Lady, S. G. Miller, M. Bailey, M. Kallitsis, and M. Karir. Understanding IPv6 Internet background radiation. In Proc. 13th ACM SIGCOMM Conference on Internet Measurement, 2013.
-
(2013)
Proc. 13th ACM SIGCOMM Conference on Internet Measurement
-
-
Czyz, J.1
Lady, K.2
Miller, S.G.3
Bailey, M.4
Kallitsis, M.5
Karir, M.6
-
20
-
-
80053025624
-
An observatory for the SSLiverse
-
P. Eckersley and J. Burns. An observatory for the SSLiverse. Talk at Defcon 18 (2010). https://www.eff.org/files/DefconSSLiverse.pdf.
-
(2010)
Talk at Defcon
, vol.18
-
-
Eckersley, P.1
Burns, J.2
-
24
-
-
67649650450
-
Analysis techniques for detecting coordinated attacks and probes
-
J. Green, D. J. Marchette, S. Northcutt, and B. Ralph. Analysis techniques for detecting coordinated attacks and probes. In Workshop on Intrusion Detection and Network Monitoring, pages 1-9, 1999.
-
(1999)
Workshop on Intrusion Detection and Network Monitoring
, pp. 1-9
-
-
Green, J.1
Marchette, D.J.2
Northcutt, S.3
Ralph, B.4
-
29
-
-
3543096392
-
Fast portscan detection using sequential hypothesis testing
-
J. Jung, V. Paxson, A. W. Berger, and H. Balakrishnan. Fast portscan detection using sequential hypothesis testing. In Proc. IEEE Symposium on Security and Privacy, pages 211-225, 2004.
-
(2004)
Proc. IEEE Symposium on Security and Privacy
, pp. 211-225
-
-
Jung, J.1
Paxson, V.2
Berger, A.W.3
Balakrishnan, H.4
-
35
-
-
85076296602
-
-
MaxMind, LLC. GeoIP, 2013. http://www.maxmind.com/en/city.
-
(2013)
GeoIP
-
-
-
37
-
-
14944381614
-
-
Department of Computer Science and Engineering, University of California, San Diego
-
D. Moore, C. Shannon, G. M. Voelker, and S. Savage. Network telescopes: Technical report. Department of Computer Science and Engineering, University of California, San Diego, 2004.
-
(2004)
Network Telescopes: Technical Report
-
-
Moore, D.1
Shannon, C.2
Voelker, G.M.3
Savage, S.4
-
38
-
-
84889045587
-
-
Unplug. Don't Play, Jan.
-
H. Moore. Security flaws in universal plug and play. Unplug. Don't Play, Jan. 2013. http://community.rapid7.com/servlet/JiveServlet/download/2150-1-16596/SecurityFlawsUPnP.pdf.
-
(2013)
Security Flaws in Universal Plug and Play
-
-
Moore, H.1
-
39
-
-
14944369649
-
Characteristics of internet background radiation
-
R. Pang, V. Yegneswaran, P. Barford, V. Paxson, and L. Peterson. Characteristics of Internet background radiation. In Proc. 4th ACM SIGCOMM Conference on Internet Measurement, pages 27-40, 2004.
-
(2004)
Proc. 4th ACM SIGCOMM Conference on Internet Measurement
, pp. 27-40
-
-
Pang, R.1
Yegneswaran, V.2
Barford, P.3
Paxson, V.4
Peterson, L.5
-
45
-
-
78650939601
-
Internet background radiation revisited
-
E. Wustrow, M. Karir, M. Bailey, F. Jahanian, and G. Huston. Internet background radiation revisited. In Proc. 10th ACM SIG-COMM Conference on Internet Measurement, pages 62-74. ACM, 2010.
-
(2010)
Proc. 10th ACM SIG-COMM Conference on Internet Measurement
, pp. 62-74
-
-
Wustrow, E.1
Karir, M.2
Bailey, M.3
Jahanian, F.4
Huston, G.5
-
47
-
-
84910148947
-
On the mismanagement and Maliciousness of networks
-
Feb.
-
J. Zhang, Z. Durumeric, M. Bailey, M. Karir, and M. Liu. On the mismanagement and maliciousness of networks. In Proc. Network and Distributed System Security Symposium (NDSS), Feb. 2014.
-
(2014)
Proc. Network and Distributed System Security Symposium (NDSS)
-
-
Zhang, J.1
Durumeric, Z.2
Bailey, M.3
Karir, M.4
Liu, M.5
|