-
1
-
-
85032753961
-
"Deleting online extortion"
-
Oct. 25
-
J. Menn, "Deleting online extortion," LA Times, p. 1, Oct. 25, 2004.
-
(2004)
LA Times
, pp. 1
-
-
Menn, J.1
-
2
-
-
0002466989
-
"The use of end-to-end multi-cast measurements for characterizing internal network behavior"
-
May
-
A. Adams, T. Bu, T. Friedman, J. Horowitz, D. Towsley, R. Caceres, N. Duffield, F.L. Presti, S.B. Moon, and V. Paxson, "The use of end-to-end multi-cast measurements for characterizing internal network behavior," IEEE Commun. Mag., vol. 38, pp. 152-159, May 2000.
-
(2000)
IEEE Commun. Mag.
, vol.38
, pp. 152-159
-
-
Adams, A.1
Bu, T.2
Friedman, T.3
Horowitz, J.4
Towsley, D.5
Caceres, R.6
Duffield, N.7
Presti, F.L.8
Moon, S.B.9
Paxson, V.10
-
3
-
-
19544393379
-
"Merging logical toplogies using end-to-end measurements"
-
in Miami Beach, FL, Oct
-
M. Coates, M. Rabbat, and R. Nowak, "Merging logical toplogies using end-to-end measurements," in Proc. ACM Internet Measurement Conf., Miami Beach, FL, Oct. 2003, pp. 192-203.
-
(2003)
Proc. ACM Internet Measurement Conf.
, pp. 192-203
-
-
Coates, M.1
Rabbat, M.2
Nowak, R.3
-
4
-
-
1242265009
-
"An information-theoretic approach to traffic matrix estimation"
-
in Karlsruhe, Germany, Oct
-
Y. Zhang, M. Roughan, C. Lund, and D. Donoho, "An information-theoretic approach to traffic matrix estimation," in Proc. ACM SIGCOMM Conf., Karlsruhe, Germany, Oct. 2003, pp. 301-312.
-
(2003)
Proc. ACM SIGCOMM Conf.
, pp. 301-312
-
-
Zhang, Y.1
Roughan, M.2
Lund, C.3
Donoho, D.4
-
5
-
-
1242287724
-
"A framework for classifying denial of service attacks"
-
in Karlsruhe, Germany, Aug
-
A. Hussain, J. Heidemann, and C. Papadopoulos, "A framework for classifying denial of service attacks," in Proc. ACM SIGCOMM Conf., Karlsruhe, Germany, Aug. 2003, pp. 99-110.
-
(2003)
Proc. ACM SIGCOMM Conf.
, pp. 99-110
-
-
Hussain, A.1
Heidemann, J.2
Papadopoulos, C.3
-
6
-
-
4143128192
-
"Inferring congestion sharing and path characteristics from packet inter-arrival times"
-
MIT, Laboratory Comput. Sci., Tech. Rep. MIT-LCS-TR-828
-
D. Katabi and C. Blake, "Inferring congestion sharing and path characteristics from packet inter-arrival times," MIT, Laboratory Comput. Sci., Tech. Rep. MIT-LCS-TR-828, 2001.
-
(2001)
-
-
Katabi, D.1
Blake, C.2
-
7
-
-
1242310086
-
"Automatically inferring patterns of resource consumption in network traffic"
-
in Karlsruhe, Germany, Aug
-
C. Estan, S. Savage, and G. Varghese, "Automatically inferring patterns of resource consumption in network traffic," in Proc. ACM SIGCOMM Conf., Karlsruhe, Germany, Aug. 2003, pp. 137-149.
-
(2003)
Proc. ACM SIGCOMM Conf.
, pp. 137-149
-
-
Estan, C.1
Savage, S.2
Varghese, G.3
-
8
-
-
0003254064
-
"A non-intrusive, wavelet-based approach to detecting network performance problems"
-
in San Francisco Bay Area, U.S.A., Nov
-
P. Huang, A. Feldmann, and W. Willinger, "A non-intrusive, wavelet-based approach to detecting network performance problems," in Proc. ACM SIGCOMM Internet Measurement Workshop, San Francisco Bay Area, U.S.A., Nov. 2001, pp. 213-227.
-
(2001)
Proc. ACM SIGCOMM Internet Measurement Workshop
, pp. 213-227
-
-
Huang, P.1
Feldmann, A.2
Willinger, W.3
-
9
-
-
0036980251
-
"Using signal processing to analyze wireless data traffic"
-
in Atlanta, GA, U.S.A., Sept
-
C. Partridge, D. Cousins, A.W. Jackson, R. Krishnan, T. Saxena, and W.T. Strayer, "Using signal processing to analyze wireless data traffic," in Proc. ACM Workshop Wireless Security, Atlanta, GA, U.S.A., Sept. 2002, pp. 67-76.
-
(2002)
Proc. ACM Workshop Wireless Security
, pp. 67-76
-
-
Partridge, C.1
Cousins, D.2
Jackson, A.W.3
Krishnan, R.4
Saxena, T.5
Strayer, W.T.6
-
10
-
-
39049161433
-
"Identification of repeated denial of service attacks"
-
in Barcelona, Spain
-
A. Hussain, J. Heidemann, and C. Papadopoulos, "Identification of repeated denial of service attacks," in Proc. IEEE Infocom, Barcelona, Spain, 2006.
-
(2006)
Proc. IEEE Infocom
-
-
Hussain, A.1
Heidemann, J.2
Papadopoulos, C.3
|