-
1
-
-
84910109256
-
-
Endace dag network cards. http://www.endace.com/ endace-dag-high-speed-packet-capture-cards. html.
-
Endace Dag Network Cards
-
-
-
2
-
-
85076880198
-
-
Endaceprobes. http://www.endace.com/ endace- high- speed- packet- capture- probes. html.
-
Endaceprobes
-
-
-
4
-
-
85076903579
-
-
Intel Westmere. http://ark.intel.com/products/codename/33174/Westmere-EP.
-
-
-
-
6
-
-
85076921149
-
-
Napatech. http://www.endace.com/ endace- high- speed- packet- capture- probes. html.
-
-
-
-
7
-
-
85076906823
-
-
NAPI. http://linuxfoundation.org/en/Net:NAPI.
-
-
-
-
9
-
-
47249157944
-
-
Wildpackets. http://www.wildpackets.com/products/network_recorders.
-
Wildpackets
-
-
-
10
-
-
0003969633
-
-
Tech. Rep. DOD 5200.28-STD, National Computer Security Center, December
-
Trusted computer system evaluation criteria. Tech. Rep. DOD 5200.28-STD, National Computer Security Center, December 1985.
-
(1985)
Trusted Computer System Evaluation Criteria
-
-
-
11
-
-
38049087058
-
Detection of covert channel encoding in network packet delays
-
Department of Computer Science, Dartmouth College, November
-
BERK, V., GIANI, A., AND CYBENKO, G. Detection of covert channel encoding in network packet delays. Tech. Rep. TR2005-536, Department of Computer Science, Dartmouth College, November 2005.
-
(2005)
Tech. Rep. TR2005-536
-
-
Berk, V.1
Giani, A.2
Cybenko, G.3
-
13
-
-
72249104877
-
RouteBricks: Exploiting parallelism to scale software routers
-
DOBRESCU, M., EGI, N., ARGYRAKI, K., CHUN, B.-G., FALL, K., IANNACCONE, G., KNIES, A., MANESH, M., AND RATNASAMY, S. RouteBricks: exploiting parallelism to scale software routers. In Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles (2009).
-
(2009)
Proceedings of the ACM SIGOPS 22nd Symposium on Operating Systems Principles
-
-
Dobrescu, M.1
Egi, N.2
Argyraki, K.3
Chun, B.-G.4
Fall, K.5
Iannaccone, G.6
Knies, A.7
Manesh, M.8
Ratnasamy, S.9
-
14
-
-
1642408095
-
Eliminating steganography in internet traffic with active wardens
-
FISK, G., FISK, M., PAPADOPOULOS, C., AND NEIL, J. Eliminating steganography in internet traffic with active wardens. In Revised Papers from the 5th International Workshop on Information Hiding (2003).
-
(2003)
Revised Papers from the 5th International Workshop on Information Hiding
-
-
Fisk, G.1
Fisk, M.2
Papadopoulos, C.3
Neil, J.4
-
15
-
-
85076675593
-
Exact temporal characterization of 10 gbps optical wide-area network
-
FREEDMAN, D. A., MARIAN, T., LEE, J. H., BIRMAN, K., WEATHERSPOON, H., AND XU, C. Exact temporal characterization of 10 gbps optical wide-area network. In Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement (2010).
-
(2010)
Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement
-
-
Freedman, D.A.1
Marian, T.2
Lee, J.H.3
Birman, K.4
Weatherspoon, H.5
Xu, C.6
-
17
-
-
0036715113
-
An information-theoretic and game-theoretic study of timing channels
-
Sept
-
GILES, J., AND HAJEK, B. An information-theoretic and game-theoretic study of timing channels. IEEE Transactions on Information Theory 48, 9 (Sept. 2002), 2455–2477.
-
(2002)
IEEE Transactions on Information Theory
, vol.48
, Issue.9
, pp. 2455-2477
-
-
Giles, J.1
Hajek, B.2
-
18
-
-
78149305172
-
PacketShader: A GPU-accelerated software router
-
HAN, S., JANG, K., PARK, K., AND MOON, S. Packetshader: a gpu-accelerated software router. In Proceedings of the ACM SIGCOMM 2010 Conference (2010).
-
(2010)
Proceedings of the ACM SIGCOMM 2010 Conference
-
-
Han, S.1
Jang, K.2
Park, K.3
Moon, S.4
-
19
-
-
0037986867
-
Network intrusion detection: Evasion, traffic normalization
-
HANDLEY, M., KREIBICH, C., AND PAXSON, V. Network intrusion detection: Evasion, traffic normalization. In Proceedings of the 10th USENIX Security Symposium (2001).
-
(2001)
Proceedings of the 10th USENIX Security Symposium
-
-
Handley, M.1
Kreibich, C.2
Paxson, V.3
-
21
-
-
0015672289
-
A note on the confinement problem
-
October
-
LAMPSON, B. W. A note on the confinement problem. Communications of the ACM 16, 10 (October 1973), 613–615.
-
(1973)
Communications of the ACM
, vol.16
, Issue.10
, pp. 613-615
-
-
Lampson, B.W.1
-
23
-
-
84901391506
-
Packet clustering introduced by routers: Modeling, analysis and experiments
-
LIM, C. L., LEE, K. S., WANG, H., WEATHERSPOON, H., AND TANG, A. Packet clustering introduced by routers: Modeling, analysis and experiments. In Proceedings of the 48th Annual Conference on Information Sciences and Systems (2014).
-
(2014)
Proceedings of the 48th Annual Conference on Information Sciences and Systems
-
-
Lim, C.L.1
Lee, K.S.2
Wang, H.3
Weatherspoon, H.4
Tang, A.5
-
24
-
-
84905705959
-
Hide and seek in time: Robust covert timing channels
-
LIU, Y., GHOSAL, D., ARMKNECHT, F., SADEGHI, A.-R., SCHULZ, S., AND KATZENBEISSER, S. Hide and Seek in Time: Robust Covert Timing Channels. In Proceedings of the 14th European Conference on Research in Computer Security (2009).
-
(2009)
Proceedings of the 14th European Conference on Research in Computer Security
-
-
Liu, Y.1
Ghosal, D.2
Armknecht, F.3
Sadeghi, A.-R.4
Schulz, S.5
Katzenbeisser, S.6
-
25
-
-
85076693411
-
Robust and undetectable steganographic timing channels for i.I.D. Traffic
-
LIU, Y., GHOSAL, D., ARMKNECHT, F., SADEGHI, A.-R., SCHULZ, S., AND KATZENBEISSER, S. Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic. In Proceedings of the 12th International Conference on Information Hiding (2010).
-
(2010)
Proceedings of the 12th International Conference on Information Hiding
-
-
Liu, Y.1
Ghosal, D.2
Armknecht, F.3
Sadeghi, A.-R.4
Schulz, S.5
Katzenbeisser, S.6
-
26
-
-
0033890508
-
Transport and application protocol scrubbing
-
MALAN, G. R., WATSON, D., JAHANIAN, F., AND HOWELL, P. Transport and application protocol scrubbing. In Proceedings of IEEE Conference on Computer Communications (2000).
-
(2000)
Proceedings of IEEE Conference on Computer Communications
-
-
Malan, G.R.1
Watson, D.2
Jahanian, F.3
Howell, P.4
-
31
-
-
53349127055
-
-
Tech. Rep. ESD-TR-78-158, Mitre Corporation, August
-
PADLIPSKY, M. A., SNOW, D. W., AND KARGER, P. A. Limitations of end-to-end encryption in secure computer networks. Tech. Rep. ESD-TR-78-158, Mitre Corporation, August 1978.
-
(1978)
Limitations of End-to-End Encryption in Secure Computer Networks
-
-
Padlipsky, M.A.1
Snow, D.W.2
Karger, P.A.3
-
34
-
-
0012054514
-
Covert channels in the TCP/IP protocol suite
-
July
-
ROWLAND, C. H. Covert channels in the tcp/ip protocol suite. First Monday (July 1997).
-
(1997)
First Monday
-
-
Rowland, C.H.1
-
37
-
-
44449087948
-
A survey of covert channels and countermeasures in computer network protocols
-
October
-
ZANDER, S., ARMITAGE, G., AND BRANSH, P. A survey of covert channels and countermeasures in computer network protocols. IEEE Communications Surveys and Tutorials 9, 3 (October 2007), 44–57.
-
(2007)
IEEE Communications Surveys and Tutorials
, vol.9
, Issue.3
, pp. 44-57
-
-
Zander, S.1
Armitage, G.2
Bransh, P.3
|