-
2
-
-
6444230346
-
-
Arbor Networks Peakflow: www.arbornetworks.com/en/peakflow-ip-flowbased-technology.html.
-
Arbor Networks Peakflow
-
-
-
4
-
-
85080712101
-
-
CAIDA: www.caida.org/data/realtime/.
-
-
-
-
9
-
-
85080797614
-
-
Internet Systems Consortium, Internet Host Count History, https://www.isc.org/solutions/survey/history, 2009.
-
(2009)
Internet Host Count History
-
-
-
12
-
-
85080762586
-
-
Open Flow Switch Consortium. http://www.openflowswitch.org.
-
-
-
-
18
-
-
33645492588
-
-
Digital Signature Standard DSS. Publication, June
-
Digital Signature Standard (DSS). Federal Information Processing Standards Publication, June 2009.
-
(2009)
Federal Information Processing Standards
-
-
-
20
-
-
11244318344
-
Loose source routing as a mechanism for traffic policies
-
K. Argyraki and D. R. Cheriton. Loose Source Routing as a Mechanism for Traffic Policies. In ACM SIGCOMM Workshops, 2004.
-
(2004)
ACM SIGCOMM Workshops
-
-
Argyraki, K.1
Cheriton, D.R.2
-
21
-
-
85050149881
-
Active internet traffic filtering: Real-time Response to Denialof-service attacks
-
K. Argyraki and D. R. Cheriton. Active Internet Traffic Filtering: Real-time Response to Denialof-Service Attacks. In USENIX Annual Conf., 2005.
-
(2005)
USENIX Annual Conf
-
-
Argyraki, K.1
Cheriton, D.R.2
-
22
-
-
84891624492
-
Off by Default!
-
H. Ballani, Y. Chawathe, S. Ratnasamy, T. Roscoe, and S. Shenker. Off by Default! In ACM HotNets, 2005.
-
(2005)
ACM HotNets
-
-
Ballani, H.1
Chawathe, Y.2
Ratnasamy, S.3
Roscoe, T.4
Shenker, S.5
-
23
-
-
79961236654
-
The spoofer project: Inferring the extent of source address filtering on the Internet
-
R. Beverly and S. Bauer. The Spoofer project: Inferring the extent of source address filtering on the Internet. In SRUTI Workshop, 2005.
-
(2005)
SRUTI Workshop
-
-
Beverly, R.1
Bauer, S.2
-
25
-
-
2442631039
-
Lightweight network support for scalable end-to-end services
-
August
-
K. L. Calvert, J. Griffioen, and S. Wen. Lightweight Network Support for Scalable End-to-End Services. In ACM SIGCOMM, August 2002.
-
(2002)
ACM SIGCOMM
-
-
Calvert, K.L.1
Griffioen, J.2
Wen, S.3
-
26
-
-
78149336917
-
RouteBricks: Exploiting parallelism to scale software routers
-
M. Dobrescu, N. Egi, K. Argyraki, B.G. Chun, K. Fall, G. Iannaccone, A. Knies, M. Manesh, and S. Ratnasamy. RouteBricks: Exploiting Parallelism to Scale Software Routers. In ACM SOSP, 2009.
-
(2009)
ACM SOSP
-
-
Dobrescu, M.1
Egi, N.2
Argyraki, K.3
Chun, B.G.4
Fall, K.5
Iannaccone, G.6
Knies, A.7
Manesh, M.8
Ratnasamy, S.9
-
27
-
-
70449346143
-
Towards high performance virtual routers on commodity hardware
-
Madrid, Spain, December
-
N. Egi, A. Greenhalgh, M. Handley, M. Hoerdt, F. Huici, and L. Mathy. Towards High Performance Virtual Routers on Commodity Hardware. In Proceedings of 4th Conference on Future Networking Technologies (ACM CoNEXT 2008), Madrid, Spain, December 2008.
-
(2008)
Proceedings of 4th Conference on Future Networking Technologies (ACM CoNEXT 2008)
-
-
Egi, N.1
Greenhalgh, A.2
Handley, M.3
Hoerdt, M.4
Huici, F.5
Mathy, L.6
-
28
-
-
77951278164
-
Flow processing and the rise of commodity network hardware
-
April
-
A. Greenhalgh, F. Huici, M. Hoerdt, P. Papadimitriou, M. Handley, and L. Mathy. Flow processing and the rise of commodity network hardware. SIGCOMM Comput. Commun. Rev., 39(2), April 2009.
-
(2009)
SIGCOMM Comput. Commun. Rev.
, vol.39
, Issue.2
-
-
Greenhalgh, A.1
Huici, F.2
Hoerdt, M.3
Papadimitriou, P.4
Handley, M.5
Mathy, L.6
-
29
-
-
36949005385
-
An end-middle-end approach to connection establishment
-
S. Guha and P. Francis. An End-Middle-End Approach to Connection Establishment. In ACM SIGCOMM, 2007.
-
(2007)
ACM SIGCOMM
-
-
Guha, S.1
Francis, P.2
-
30
-
-
33644961664
-
DARPA intrusion detection system evaluation: Design and procedures
-
J. W. Haines, R. P. Lippmann, D. J. Fried, E. Tran, S. Boswell, and M. A. Zissman. 1999 DARPA Intrusion Detection System Evaluation: Design and Procedures. In MIT Lincoln Laboratory Technical Report.
-
(1999)
MIT Lincoln Laboratory Technical Report
-
-
Haines, J.W.1
Lippmann, R.P.2
Fried, D.J.3
Tran, E.4
Boswell, S.5
Zissman, M.A.6
-
32
-
-
85180745018
-
Implementing pushback: Router-based defense against DDoS attacks
-
J. Ioannidis and S. M. Bellovin. Implementing Pushback: Router-Based Defense Against DDoS Attacks. In NDDS, 2002.
-
(2002)
NDDS
-
-
Ioannidis, J.1
Bellovin, S.M.2
-
33
-
-
76749083002
-
Networking named content
-
V. Jacobson, D. K. Smetters, J. D. Thornton, M. F. Plass, N. H. Briggs, and R. L. Braynard. Networking Named Content. In ACM CoNEXT), 2009.
-
(2009)
ACM CoNEXT)
-
-
Jacobson, V.1
Smetters, D.K.2
Thornton, J.D.3
Plass, M.F.4
Briggs, N.H.5
Braynard, R.L.6
-
34
-
-
62249110288
-
Fast point multiplication on Koblitz curves: Parallelization method and implementations
-
K. Järvinen et al. Fast point multiplication on Koblitz curves: Parallelization method and implementations. Microprocess. Microsyst., 33(2), 2009.
-
(2009)
Microprocess. Microsyst.
, vol.33
, Issue.2
-
-
Järvinen, K.1
-
35
-
-
36949039907
-
A data-oriented (and beyond) network architecture
-
T. Koponen, M. Chawla, B.-G. Chun, A. Ermolinskiy, K. H. Kim, S. Shenker, and I. Stoica. A data-oriented (and beyond) network architecture. In ACM SIGCOMM, 2007.
-
(2007)
ACM SIGCOMM
-
-
Koponen, T.1
Chawla, M.2
Chun, B.-G.3
Ermolinskiy, A.4
Kim, K.H.5
Shenker, S.6
Stoica, I.7
-
37
-
-
66249102841
-
To filter or to authorize: Network-layer dos Defense against Multimillion-node Botnets
-
X. Liu, X. Yang, and Y. Lu. To Filter or to Authorize: Network-Layer DoS Defense Against Multimillion-node Botnets. In ACM SIGCOMM, 2008.
-
(2008)
ACM SIGCOMM
-
-
Liu, X.1
Yang, X.2
Lu, Y.3
-
38
-
-
72249115790
-
API design challenges for open router platforms on proprietary hardware
-
J. C. Mogul, P. Yalagandula, J. Tourrilhes, R. McGeer, S. Banerjee, T. Connors, and P. Sharma. API Design Challenges for Open Router Platforms on Proprietary Hardware. In ACM Hotnets, 2008.
-
(2008)
ACM Hotnets
-
-
Mogul, J.C.1
Yalagandula, P.2
Tourrilhes, J.3
McGeer, R.4
Banerjee, S.5
Connors, T.6
Sharma, P.7
-
39
-
-
0041851132
-
The click modular router
-
R. Morris, E. Kohler, J. Jannotti, and M. F. Kaashoek. The click modular router. SIGOPS Oper. Syst. Rev., 33(5):217-231, 1999.
-
(1999)
SIGOPS Oper. Syst. Rev.
, vol.33
, Issue.5
, pp. 217-231
-
-
Morris, R.1
Kohler, E.2
Jannotti, J.3
Kaashoek, M.F.4
-
40
-
-
77952410514
-
Snapp: Stateless network-authenticated path pinning
-
B. Parno, A. Perrig, and D. G. Andersen. SNAPP: Stateless Network-Authenticated Path Pinning. In ACM ASIACCS, 2008.
-
(2008)
ACM ASIACCS
-
-
Parno, B.1
Perrig, A.2
Andersen, D.G.3
-
41
-
-
36949036429
-
Portcullis: Protecting connection setup from denial-of-capability attacks
-
B. Parno, D. Wendlandt, E. Shi, A. Perrig, B. Maggs, and Y.-C. Hu. Portcullis: Protecting Connection Setup from Denial-of-Capability Attacks. In ACM SIGCOMM, 2007.
-
(2007)
ACM SIGCOMM
-
-
Parno, B.1
Wendlandt, D.2
Shi, E.3
Perrig, A.4
Maggs, B.5
Hu, Y.-C.6
-
42
-
-
85080795618
-
Rule-based Forwarding (RBF): Improving the internet's flexibility and security
-
L. Popa, N. Egi, S. Ratnasamy, and I. Stoica. Rule-based Forwarding (RBF): Improving the Internet's Flexibility and Security. UCB Technical Report, 2010. http://www.eecs.berkeley.edu/%7Epopa/rbfTechReport.pdf.
-
(2010)
UCB Technical Report
-
-
Popa, L.1
Egi, N.2
Ratnasamy, S.3
Stoica, I.4
-
43
-
-
85047764379
-
Rule-based Forwarding (RBF): Improving the Internet's flexibility and security
-
L. Popa, I. Stoica, and S. Ratnasamy. Rule-based Forwarding (RBF): improving the Internet's flexibility and security. In ACM Hotnets, 2009.
-
(2009)
ACM Hotnets
-
-
Popa, L.1
Stoica, I.2
Ratnasamy, S.3
-
44
-
-
33750357978
-
A system for authenticated policy-compliant routing
-
B. Raghavan and A. C. Snoeren. A System for Authenticated Policy-Compliant Routing. In ACM SIGCOMM, 2004.
-
(2004)
ACM SIGCOMM
-
-
Raghavan, B.1
Snoeren, A.C.2
-
45
-
-
21844431930
-
Predicate routing: Enabling controlled networking
-
T. Roscoe, S. Hand, R. Isaacs, R. Mortier, and P. Jardetzky. Predicate Routing: Enabling Controlled Networking. In ACM Hotnets, 2002.
-
(2002)
ACM Hotnets
-
-
Roscoe, T.1
Hand, S.2
Isaacs, R.3
Mortier, R.4
Jardetzky, P.5
-
46
-
-
84864221374
-
A policy framework for the future internet
-
A. Seehra, J. Nous, M. Walfish, D. Mazieres, A. Nicolosi, and S. Shenker. A Policy Framework for the Future Internet. In ACM Hotnets, 2009.
-
(2009)
ACM Hotnets
-
-
Seehra, A.1
Nous, J.2
Walfish, M.3
Mazieres, D.4
Nicolosi, A.5
Shenker, S.6
-
47
-
-
0038322587
-
Internet indirection infrastructure
-
I. Stoica, D. Adkins, S. Zhuang, S. Shenker, and S. Surana. Internet Indirection Infrastructure. In ACM SIGCOMM, 2002.
-
(2002)
ACM SIGCOMM
-
-
Stoica, I.1
Adkins, D.2
Zhuang, S.3
Shenker, S.4
Surana, S.5
-
48
-
-
0001982732
-
A survey of active network research
-
D. L. Tennenhouse, J. M. Smith, W. D. Sincoskie, D. J. Wetherall, and G. J. Minden. A Survey of Active Network Research. IEEE Comm., 1997.
-
(1997)
IEEE Comm
-
-
Tennenhouse, D.L.1
Smith, J.M.2
Sincoskie, W.D.3
Wetherall, D.J.4
Minden, G.J.5
-
49
-
-
84871284967
-
Middleboxes no longer considered harmful
-
M. Walfish, J. Stribling, M. Krohn, H. Balakrishnan, R. Morris, and S. Shenker. Middleboxes no longer considered harmful. In OSDI, 2004.
-
(2004)
OSDI
-
-
Walfish, M.1
Stribling, J.2
Krohn, M.3
Balakrishnan, H.4
Morris, R.5
Shenker, S.6
-
50
-
-
84875682345
-
Active network vision and reality: Lessons from a capsulebased system
-
D. Wetherall. Active network vision and reality: Lessons from a capsulebased system. In ACM SOSP, 1999.
-
(1999)
ACM SOSP
-
-
Wetherall, D.1
-
51
-
-
3543097593
-
SIff: A stateless internet flow filter to mitigate DDoS flooding attacks
-
A. Yaar, A. Perrig, and D. Song. SIFF: A Stateless Internet Flow Filter to Mitigate DDoS Flooding Attacks. In IEEE Symp. on Sec. and Priv., 2004.
-
(2004)
IEEE Symp. On Sec. On Priv.
-
-
Yaar, A.1
Perrig, A.2
Song, D.3
-
53
-
-
77954196120
-
A high performance ECC hardware implementation with instruction-level parallelism over GF(2163)
-
Y. Zhang, D. Chen, Y. Choi, L. Chen, and S.-B. Ko. A high performance ECC hardware implementation with instruction-level parallelism over GF(2163). Microprocess. Microsyst., 34(6), 2010.
-
(2010)
Microprocess. Microsyst.
, vol.34
, Issue.6
-
-
Zhang, Y.1
Chen, D.2
Choi, Y.3
Chen, L.4
Ko, S.-B.5
-
54
-
-
77952248898
-
Addressing shared resource contention in multicore processors via scheduling
-
S. Zhuravleva, S. Blagodurov, et al. Addressing Shared Resource Contention in Multicore Processors via Scheduling. In ASPLOS, 2010.
-
(2010)
ASPLOS
-
-
Zhuravleva, S.1
Blagodurov, S.2
|