-
1
-
-
84870367090
-
Live migration of an entire network (and its hosts)
-
ACM
-
E.Keller, S. Ghorbani, M. Caesar, and J. Rexford, "Live migration of an entire network (and its hosts)," in Proceedings of the 11th ACM Workshop on Hot Topics in Networks, pp. 109-114,ACM, 2012.
-
(2012)
Proceedings of the 11th ACM Workshop on Hot Topics in Networks
, pp. 109-114
-
-
Keller, E.1
Ghorbani, S.2
Caesar, M.3
Rexford, J.4
-
2
-
-
84866482687
-
Logically centralized: State distribution trade-offs in software defined networks
-
ACM
-
D. Levin, A.Wundsam, B. Heller, N. Handigol, and A. Feldmann, "Logically centralized: state distribution trade-offs in software defined networks," in Proceedings of the first workshop on Hot topics in software defined networks, pp. 1-6,ACM, 2012.
-
(2012)
Proceedings of the First Workshop on Hot Topics in Software Defined Networks
, pp. 1-6
-
-
Levin, D.1
Wundsam, A.2
Heller, B.3
Handigol, N.4
Feldmann, A.5
-
6
-
-
85077707798
-
Highly predictive blacklisting
-
J. Zhang, P. A. Porras, and J. Ullrich, "Highly predictive blacklisting.," in USENIX Security Symposium, pp. 107-122, 2008.
-
(2008)
USENIX Security Symposium
, pp. 107-122
-
-
Zhang, J.1
Porras, P.A.2
Ullrich, J.3
-
7
-
-
80051960199
-
Click trajectories: End-To-end analysis of the spam value chain
-
IEEE
-
K. Levchenko, A. Pitsillidis, N. Chachra, B. Enright, M. Félegyházi, C. Grier, T. Halvorson, C. Kanich, C. Kreibich, H. Liu, et al., "Click trajectories: End-To-end analysis of the spam value chain," in Security and Privacy (SP), 2011 IEEE Symposium on, pp. 431-446, IEEE, 2011.
-
(2011)
Security and Privacy (SP), 2011 IEEE Symposium on
, pp. 431-446
-
-
Levchenko, K.1
Pitsillidis, A.2
Chachra, N.3
Enright, B.4
Félegyházi, M.5
Grier, C.6
Halvorson, T.7
Kanich, C.8
Kreibich, C.9
Liu, H.10
-
8
-
-
85076490024
-
Show me the money: Characterizing spam-Advertised revenue
-
C. Kanich, N.Weaver, D. McCoy, T. Halvorson, C. Kreibich, K. Levchenko,V. Paxson, G. M.Voelker, and S. Savage, "Show me the money: Characterizing spam-Advertised revenue.," in USENIX Security Symposium, pp. 15-15, 2011.
-
(2011)
USENIX Security Symposium
, pp. 15
-
-
Kanich, C.1
Weaver, N.2
McCoy, D.3
Halvorson, T.4
Kreibich, C.5
Levchenko, K.6
Paxson, V.7
Voelker, G.M.8
Savage, S.9
-
9
-
-
84890039053
-
A fistful of bitcoins: Characterizing payments among men with no names
-
ACM
-
S. Meiklejohn, M. Pomarole, G. Jordan, K. Levchenko, D. McCoy, G. M.Voelker, and S. Savage, "A fistful of bitcoins: characterizing payments among men with no names," in Proceedings of the 2013 conference on Internet measurement conference, pp. 127-140,ACM, 2013.
-
(2013)
Proceedings of the 2013 Conference on Internet Measurement Conference
, pp. 127-140
-
-
Meiklejohn, S.1
Pomarole, M.2
Jordan, G.3
Levchenko, K.4
McCoy, D.5
Voelker, G.M.6
Savage, S.7
-
12
-
-
84903516313
-
-
"Shadowserver." https://www.shadowserver.org/wiki/.
-
Shadowserver
-
-
-
13
-
-
32144443127
-
Mob: Amobile bazaar for wide-Area wireless services
-
ACM
-
R. Chakravorty, S. Agarwal, S. Banerjee, and I. Pratt, "Mob: Amobile bazaar for wide-Area wireless services," in Proceedings of the 11th annual international conference on Mobile computing and networking, pp. 228-242,ACM, 2005.
-
(2005)
Proceedings of the 11th Annual International Conference on Mobile Computing and Networking
, pp. 228-242
-
-
Chakravorty, R.1
Agarwal, S.2
Banerjee, S.3
Pratt, I.4
-
15
-
-
84889062725
-
Avant-guard: Scalable and vigilant switch flowmanagement in software-defined networks
-
ACM
-
S. Shin,V.Yegneswaran, P. Porras, and G. Gu, "Avant-guard: Scalable and vigilant switch flowmanagement in software-defined networks," in Proceedings of the 2013ACMSIGSACconference on Computer&communications security, pp. 413-424, ACM, 2013.
-
(2013)
Proceedings of the 2013 ACMSIGSAC Conference on Computer&Communications Security
, pp. 413-424
-
-
Shin, S.1
Porras, P.2
Gu, G.3
-
16
-
-
84872064821
-
-
Dionaea
-
Dionaea, "Dionaea -catches bugs." http://dionaea.carnivore.it/.
-
Dionaea -Catches Bugs
-
-
-
18
-
-
84891429894
-
Modeling botnet propagation using time zones
-
D. Dagon, C. C. Zou, andW. Lee, "Modeling botnet propagation using time zones.," in NDSS, vol. 6, pp. 2-13, 2006.
-
(2006)
NDSS
, vol.6
, pp. 2-13
-
-
Dagon, D.1
Zou, C.C.2
Lee, W.3
-
20
-
-
84945434374
-
-
"Floodlight rest api." http://www.openflowhub. org/display/floodlightcontroller/Floodlight+REST+API.
-
Floodlight Rest Api
-
-
-
21
-
-
85071935677
-
Enforcing network-wide policies in the presence of dynamic middlebox actions using flowtags
-
S. K. Fayazbakhsh, L. Chiang,V. Sekar, M.Yu, and J. C. Mogul, "Enforcing network-wide policies in the presence of dynamic middlebox actions using flowtags," in Proc. USENIX NSDI, 2014.
-
(2014)
Proc. USENIX NSDI
-
-
Fayazbakhsh, S.K.1
Chiang, L.2
Sekar, V.3
Yu, M.4
Mogul, J.C.5
-
23
-
-
85049403057
-
Securing the software-defined network control layer
-
P. Porras, S. Cheung, M. Fong, K. Skinner, and V. Yegneswaran, "Securing the software-defined network control layer," in NDSS, 2015.
-
(2015)
NDSS
-
-
Porras, P.1
Cheung, S.2
Fong, M.3
Skinner, K.4
Yegneswaran, V.5
-
25
-
-
84966513215
-
Inferring internet denial-of-service activity
-
D. Moore, C. Shannon, D. J. Brown, G. M. Voelker, and S. Savage, "Inferring internet denial-of-service activity," ACMTransactions on Computer Systems.
-
ACMTransactions on Computer Systems
-
-
Moore, D.1
Shannon, C.2
Brown, D.J.3
Voelker, G.M.4
Savage, S.5
-
26
-
-
0242314805
-
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Stanford, and N.Weaver, "The spread of the sapphire/slammerworm." http://www.caida.org/publications/papers/2003/sapphire/sapphire.html.
-
The Spread of the Sapphire/Slammerworm
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Stanford, S.5
Weaver, N.6
-
27
-
-
14944369649
-
Characteristics of internet background radiation
-
ACM
-
R. Pang,V.Yegneswaran, P. Barford, V. Paxson, and L. Peterson, "Characteristics of internet background radiation," in Proceedings of the 4th ACMSIGCOMM conference on Internet measurement, pp. 27-40,ACM, 2004.
-
(2004)
Proceedings of the 4th ACMSIGCOMM Conference on Internet Measurement
, pp. 27-40
-
-
Pang, R.1
Yegneswaran, V.2
Barford, P.3
Paxson, V.4
Peterson, L.5
-
28
-
-
82955161573
-
Analysis of country-wide internet outages caused by censorship
-
A. Dainotti, K. C. Claffy, M. Russo, C. Squarcella, M. Chiesa, A. Pescap, and E. Aben, "Analysis of country-wide internet outages caused by censorship," in In ACMSIGCOMM conference on Internet measurement, 2011.
-
(2011)
ACMSIGCOMM Conference on Internet Measurement
-
-
Dainotti, A.1
Claffy, K.C.2
Russo, M.3
Squarcella, C.4
Chiesa, M.5
Pescap, A.6
Aben, E.7
-
29
-
-
85081770459
-
The internet motion sensor-A distributed blackhole monitoring system
-
M. Bailey, E. Cooke, F. Jahanian, J. Nazario, D.Watson, et al., "The internet motion sensor-A distributed blackhole monitoring system.," in NDSS, 2005.
-
(2005)
NDSS
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
Nazario, J.4
Watson, D.5
-
30
-
-
82955197334
-
Gq: Practical containment for measuring modern malware systems
-
ACM
-
C. Kreibich, N.Weaver, C. Kanich, "Gq: Practical containment for measuring modern malware systems," in Proceedings of the 2011 ACMSIGCOMM conference on Internet measurement conference, pp. 397-412,ACM, 2011.
-
(2011)
Proceedings of the 2011 ACMSIGCOMM Conference on Internet Measurement Conference
, pp. 397-412
-
-
Kreibich, C.1
Weaver, N.2
Kanich, C.3
-
31
-
-
33750376717
-
Scalability, fidelity, and containment in the potemkin virtual honeyfarm
-
M. Vrable, J. Ma, J. Chen, D. Moore, E.Vandekieft, A. C. Snoeren, G. M.Voelker, and S. Savage, "Scalability, fidelity, and containment in the potemkin virtual honeyfarm," ACMSIGOPS Operating Systems Review, vol. 39, no. 5, pp. 148-162, 2005.
-
(2005)
ACMSIGOPS Operating Systems Review
, vol.39
, Issue.5
, pp. 148-162
-
-
Vrable, M.1
Ma, J.2
Chen, J.3
Moore, D.4
Vandekieft, E.5
Snoeren, A.C.6
Voelker, G.M.7
Savage, S.8
|