-
2
-
-
3142619105
-
Host Identity Protocol (HIP) Architecture
-
May
-
Moskowitz, R. and P. Nikander, "Host Identity Protocol (HIP) Architecture, " RFC 4423, May, 2006.
-
(2006)
RFC 4423
-
-
Moskowitz, R.1
Nikander, P.2
-
4
-
-
0003899818
-
The Kerberos Network Authentication Service (V5)
-
July
-
Neuman, C., T. Yu, S. Hartman, and K. Raeburn, "The Kerberos Network Authentication Service (V5), " RFC 4120, July, 2005.
-
(2005)
RFC 4120
-
-
Neuman, C.1
Yu, T.2
Hartman, S.3
Raeburn, K.4
-
6
-
-
84890932071
-
Visual Analysis of Network Flow Data with Timelines and Event Plots
-
Sacramento, CA, October 29
-
Pham, D., J. Gerth, M. Lee, A. Paepcke, and T. Winograd, "Visual Analysis of Network Flow Data with Timelines and Event Plots, " Workshop on Visualization for Computer Security (VizSEC), Sacramento, CA, pp. 85-99, October 29, 2007.
-
(2007)
Workshop on Visualization for Computer Security (VizSEC)
, pp. 85-99
-
-
Pham, D.1
Gerth, J.2
Lee, M.3
Paepcke, A.4
Winograd, T.5
-
7
-
-
38149097985
-
Visualizing Netflows for Security at Line Speed: The SIFT Tool Suite
-
San Diego, CA, December 4-9
-
Yurcik, W., "Visualizing Netflows for Security at Line Speed: The SIFT Tool Suite, " 19th Large Installation System Administration Conference (LISA '05), San Diego, CA, p. 16. December 4-9, 2005.
-
(2005)
19th Large Installation System Administration Conference (LISA '05)
, pp. 16
-
-
Yurcik, W.1
-
8
-
-
85094574423
-
MieLog: A Highly Interactive Visual Log Browser Using Information Visualization and Statistical Analysis
-
Philadelphia, PA, November 3-8
-
Takada, T. and H. Koike, "MieLog: A Highly Interactive Visual Log Browser Using Information Visualization and Statistical Analysis, " Proceedings of the 16th USENIX Conference on System Administration (LISA '02), Philadelphia, PA, pp. 133-144, November 3-8, 2002.
-
(2002)
Proceedings of the 16th USENIX Conference on System Administration (LISA '02)
, pp. 133-144
-
-
Takada, T.1
Koike, H.2
-
9
-
-
0004116989
-
-
second edition, MIT Press and McGraw-Hill
-
Cormen, T. H., C. E. Leiserson, R. L. Rivest, and C. Stein, Introduction to Algorithms, second edition, MIT Press and McGraw-Hill, 2001.
-
(2001)
Introduction to Algorithms
-
-
Cormen, T. H.1
Leiserson, C. E.2
Rivest, R. L.3
Stein, C.4
-
13
-
-
85028538564
-
PolicyVis: Firewall Security Policy Visualization and Inspection
-
Dallas, TX, November 11-16
-
Tran, T., E. Al-Shaer, and R. Boutaba, "PolicyVis: Firewall Security Policy Visualization and Inspection, " 21st Large Installation System Administration Conference (LISA '07), Dallas, TX, pp. 1-16, November 11-16, 2007.
-
(2007)
21st Large Installation System Administration Conference (LISA '07)
, pp. 1-16
-
-
Tran, T.1
Al-Shaer, E.2
Boutaba, R.3
-
14
-
-
85094823810
-
-
JFreeChart
-
JFreeChart, "Free Java Chart Library, " http://www.jfree.org/jfreechart/.
-
Free Java Chart Library
-
-
-
18
-
-
85094850214
-
MRTG - The Multi Router Traffic Grapher
-
Boston, MA, December 6-11
-
Oetiker, T., "MRTG - The Multi Router Traffic Grapher, " 12th Systems Administration Conference (LISA '98), Boston, MA, pp. 141-147, December 6-11, 1998.
-
(1998)
12th Systems Administration Conference (LISA '98)
, pp. 141-147
-
-
Oetiker, T.1
-
19
-
-
44249126961
-
SANE: A Protection Architecture for Enterprise Networks
-
Vancouver, Canada, July
-
Casado, M., T. Garfinkel, A. Akella, M. J. Freedman, D. Boneh, N. McKeown, and S. Shenker, "SANE: A Protection Architecture for Enterprise Networks, " 15th USENIX Security Symposium, Vancouver, Canada, p. 10, July, 2006.
-
(2006)
15th USENIX Security Symposium
, pp. 10
-
-
Casado, M.1
Garfinkel, T.2
Akella, A.3
Freedman, M. J.4
Boneh, D.5
McKeown, N.6
Shenker, S.7
-
20
-
-
84865532309
-
Ethane: Taking Control of the Enterprise
-
Kyoto, Japan
-
Casado, M., M. Freedman, J. Pettit, J. Luo, N. McKeown, and S. Shenker, "Ethane: Taking Control of the Enterprise, " Proceedings of ACM SIGCOMM, Kyoto, Japan, pp. 1-12, 2007.
-
(2007)
Proceedings of ACM SIGCOMM
, pp. 1-12
-
-
Casado, M.1
Freedman, M.2
Pettit, J.3
Luo, J.4
McKeown, N.5
Shenker, S.6
-
21
-
-
77954343314
-
Discovering Dependencies for Network Management
-
Irvine, California, November 29 and 30
-
Bahl, P., P. Barham, R. Black, R. Chandra, M. Goldszmidt, R. Isaacs, S. Kandula, L. Li, J. Mac-Cormick, D. A. Maltz, R. Mortier, M. Wawrzoniak, and M. Zhang, "Discovering Dependencies for Network Management, " ACM SIGCOMM 5th Workshop on Hot Topics in Networks (Hotnets-V), Irvine, California, pp. 97-102, November 29 and 30, 2006.
-
(2006)
ACM SIGCOMM 5th Workshop on Hot Topics in Networks (Hotnets-V)
, pp. 97-102
-
-
Bahl, P.1
Barham, P.2
Black, R.3
Chandra, R.4
Goldszmidt, M.5
Isaacs, R.6
Kandula, S.7
Li, L.8
Mac-Cormick, J.9
Maltz, D. A.10
Mortier, R.11
Wawrzoniak, M.12
Zhang, M.13
-
22
-
-
84876261476
-
Towards Highly Reliable Enterprise Network Services via Inference of Multi-Level Dependencies
-
Bahl, P., R. Chandra, A. Greenberg, S. Kandula, D. A. Maltz, and M. Zhang, "Towards Highly Reliable Enterprise Network Services via Inference of Multi-Level Dependencies." ACM SIGCOMM Computer Communication Review, Vol. 37, Num. 4, pp. 13-24, 2007.
-
(2007)
ACM SIGCOMM Computer Communication Review
, vol.37
, Issue.4
, pp. 13-24
-
-
Bahl, P.1
Chandra, R.2
Greenberg, A.3
Kandula, S.4
Maltz, D. A.5
Zhang, M.6
|