-
5
-
-
0033890508
-
Transport and Application Protocol Scrubbing
-
Tel Aviv, Israel, March
-
G. R. Malan, D. Watson, F. Jahanian, and P. Howell. Transport and Application Protocol Scrubbing. In Proceedings of the IEEE INFOCOMM 2000 Conference, Tel Aviv, Israel, March 2000.
-
(2000)
Proceedings of the IEEE INFOCOMM 2000 Conference
-
-
Malan, G.R.1
Watson, D.2
Jahanian, F.3
Howell, P.4
-
8
-
-
0028430224
-
Network Intrusion Detection
-
May and June
-
B. Mukherjee, L. T. Heberlein, and K. N. Levitt. Network Intrusion Detection. IEEE Network, 8(3):26-41, May and June 1994.
-
(1994)
IEEE Network
, vol.8
, Issue.3
, pp. 26-41
-
-
Mukherjee, B.1
Heberlein, L.T.2
Levitt, K.N.3
-
10
-
-
0000579968
-
Automated Packet Trace Analysis of TCP Implementations
-
Cannes, France, September
-
V. Paxson. Automated Packet Trace Analysis of TCP Implementations. In Proceedings of ACM SIGCOMM '97, Cannes, France, September 1997.
-
(1997)
Proceedings of ACM SIGCOMM '97
-
-
Paxson, V.1
-
11
-
-
85084164413
-
Bro: A System for Detecting Network Intruders in Real-Time
-
San Antonio, Texas, January
-
V. Paxson. Bro: A System for Detecting Network Intruders in Real-Time. In Proceedings of the 7th USENIX Security Symposium, San Antonio, Texas, January 1998.
-
(1998)
Proceedings of the 7th USENIX Security Symposium
-
-
Paxson, V.1
-
12
-
-
0004145058
-
-
Originally Secure Networks, Inc., now available as a white paper at the Network Associates Inc., January
-
T. H. Ptacek and T. N. Newsham. Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection. Originally Secure Networks, Inc., now available as a white paper at the Network Associates Inc., http://www.nai.com/, January 1998.
-
(1998)
Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection
-
-
Ptacek, T.H.1
Newsham, T.N.2
-
13
-
-
0033871228
-
The Phoenix Framework: A Practical Architecture for Programmable Networks
-
March
-
D. Putzolu, S. Bakshi, S. Yadav, and R. Yavatkar. The Phoenix Framework: A Practical Architecture for Programmable Networks. IEEE Communications, 38(3):160-165, March 2000.
-
(2000)
IEEE Communications
, vol.38
, Issue.3
, pp. 160-165
-
-
Putzolu, D.1
Bakshi, S.2
Yadav, S.3
Yavatkar, R.4
-
14
-
-
84964454852
-
-
Queso Homepage, http://www.apostols.org/projectz/queso/.
-
Queso Homepage
-
-
-
16
-
-
80051517712
-
Implementing a Generalized Tool for Network Monitoring
-
San Diego, CA, October
-
M. J. Ranum, K. Landfield, M. Stolarchuk, M. Sienkiewicz, A. Lambeth, and E. Wall. Implementing a Generalized Tool for Network Monitoring. In Proceedings of the Eleventh Systems Administration Conference (LISA '97), San Diego, CA, October 1997.
-
(1997)
Proceedings of the Eleventh Systems Administration Conference (LISA '97)
-
-
Ranum, M.J.1
Landfield, K.2
Stolarchuk, M.3
Sienkiewicz, M.4
Lambeth, A.5
Wall, E.6
-
17
-
-
0030832833
-
Dummynet: A simple approach to the evaluation of network protocols
-
January
-
L. Rizzo. Dummynet: a simple approach to the evaluation of network protocols. ACM Computer Communication Review, January 1997.
-
(1997)
ACM Computer Communication Review
-
-
Rizzo, L.1
-
18
-
-
84962297375
-
-
I. S. Services. RealSecure™. http://www.iss.net/prod/rs.html.
-
RealSecure™
-
-
-
19
-
-
85084160906
-
Defeating TCP/IP Stack Fingerprinting
-
Denver, Colorado, August
-
M. Smart, G. R. Malan, and F. Jahanian. Defeating TCP/IP Stack Fingerprinting. In Proceedings of 9th USENIX Security Symposium, Denver, Colorado, August 2000.
-
(2000)
Proceedings of 9th USENIX Security Symposium
-
-
Smart, M.1
Malan, G.R.2
Jahanian, F.3
-
20
-
-
14344270674
-
-
Technical Report Dept. of Computer Science, University of Arizona, February
-
O. Spatscheck, J. S. Hansen, J. H. Hartman, and L. L. Peterson. Optimizing TCP Forwarder Performance. Technical Report TR98-01, Dept. of Computer Science, University of Arizona, February 1998.
-
(1998)
Optimizing TCP Forwarder Performance
-
-
Spatscheck, O.1
Hansen, J.S.2
Hartman, J.H.3
Peterson, L.L.4
-
21
-
-
0344523548
-
The Protocols
-
Addison-Wesley
-
W. R. Stevens. TCP/IP Illustrated, Volume 1: The Protocols. Addison-Wesley, 1994.
-
(1994)
TCP/IP Illustrated
, vol.1
-
-
Stevens, W.R.1
-
22
-
-
84890867432
-
-
T. I. Systems. TIS Firewall Toolkit, ftp://ftp.tis.com/pub/firewalls/toolkit.
-
TIS Firewall Toolkit
-
-
-
24
-
-
0029756282
-
Cooperating Security Managers: A Peer-Based Intrusion Detection System
-
January and February
-
G. B. White, E. A. Fisch, and U. W. Pooch. Cooperating Security Managers: A Peer-Based Intrusion Detection System. IEEE Network, 10(1):20-23, January and February 1996.
-
(1996)
IEEE Network
, vol.10
, Issue.1
, pp. 20-23
-
-
White, G.B.1
Fisch, E.A.2
Pooch, U.W.3
|