Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
163 | Ratul Mahajan, David Wetherall, Thomas E. Anderson |
Understanding BGP misconfiguration. |
SIGCOMM |
2002 |
DBLP DOI BibTeX RDF |
|
77 | Huan Xiong, Ming Chen 0003 |
Study on Traffic Characteristics of BGP Misconfiguration. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
64 | Raj Kumar Rajendran, Vishal Misra, Dan Rubenstein |
Brief announcement: strong detection of misconfigurations. |
PODC |
2005 |
DBLP DOI BibTeX RDF |
strong detection, routing, anomaly detection, distance-vector, misconfiguration |
60 | Ching-Huang Lin, Chih-Hao Chen, Chi-Sung Laih |
A Study and Implementation of Vulnerability Assessment and Misconfiguration Detection. |
APSCC |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Raj Kumar Rajendran, Vishal Misra, Dan Rubenstein |
Theoretical bounds on control-plane self-monitoring in routing protocols. |
SIGMETRICS |
2007 |
DBLP DOI BibTeX RDF |
rogue node, routing protocols, distance vector, misconfiguration |
29 | Andre Broido, Young Hyun, Marina Fomenkov, Kimberly C. Claffy |
The windows of pivate DNS updates. |
Comput. Commun. Rev. |
2006 |
DBLP DOI BibTeX RDF |
OS fingerprinting, private addresses, domain name system, dynamic updates, misconfiguration |
29 | Franck Le, Sihyung Lee, Tina Wong, Hyong S. Kim, Darrell Newcomb |
Minerals: using data mining to detect router misconfigurations. |
MineNet |
2006 |
DBLP DOI BibTeX RDF |
network misconfiguration, static analysis, association rules mining, routers |
26 | Noe Marcelo Yungaicela-Naula, Vishal Sharma, Sandra Scott-Hayward |
Misconfiguration in O-RAN: Analysis of the impact of AI/ML. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
26 | Ibrahim Bu Haimed, Marwan Ali Albahar, Ali Alzubaidi |
Exploiting Misconfiguration Vulnerabilities in Microsoft's Azure Active Directory for Privilege Escalation Attacks. |
Future Internet |
2023 |
DBLP DOI BibTeX RDF |
|
26 | David Fellner, Thomas I. Strasser, Wolfgang Kastner |
Data-Driven Misconfiguration Detection in Power Systems With Transformer Profile Disaggregation. |
IEEE Access |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Yingnan Zhou, Xue Hu, Sihan Xu, Yan Jia, Yuhao Liu, Junyong Wang, Guangquan Xu, Wei Wang 0012, Shaoying Liu, Thar Baker |
Multi-Misconfiguration Diagnosis via Identifying Correlated Configuration Parameters. |
IEEE Trans. Software Eng. |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Bingyu Shen 0002 |
A Survey of Access Control Misconfiguration Detection Techniques. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Pablo Valle, Aitor Arrieta, Maite Arratibel |
Automated Misconfiguration Repair of Configurable Cyber-Physical Systems with Search: an Industrial Case Study on Elevator Dispatching Algorithms. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Heng Pan, Zhenyu Li 0001, Penghao Zhang, Penglai Cui, Kavé Salamatian, Gaogang Xie |
Misconfiguration-Free Compositional SDN for Cloud Networks. |
IEEE Trans. Dependable Secur. Comput. |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Areeg Samir, Håvard Dagenborg Johansen |
A Self-Configuration Controller To Detect, Identify, and Recover Misconfiguration at IoT Edge Devices and Containerized Cluster System. |
ICISSP |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Areeg Samir, Håvard Dagenborg Johansen |
Self-Healing Misconfiguration of Cloud-Based IoT Systems Using Markov Decision Processes. |
CLOSER |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Douglas J. Millward, Martin J. Reed, Nkaepe E. E. Olaniyi |
CACLE - Automated Mitigation for Misconfiguration Vulnerabilities in Cloud Systems. |
ICCBDC |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Pablo Valle, Aitor Arrieta, Maite Arratibel |
Automated Misconfiguration Repair of Configurable Cyber-Physical Systems with Search: an Industrial Case Study on Elevator Dispatching Algorithms. |
ICSE-SEIP |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Kanchanjot Kaur Phokela, Kapil Singi, Kuntal Dey, Vikrant Kaulgud, Adam P. Burden |
Framework to Assess Policy Driven Security Misconfiguration Risks in Cloud Native Application. |
SecDev |
2022 |
DBLP DOI BibTeX RDF |
|
26 | David Fellner, Thomas I. Strasser, Wolfgang Kastner, Behnam Feizifar, Ibrahim Faiek Abdulhadi |
Data Driven Transformer Level Misconfiguration Detection in Power Distribution Grids. |
SMC |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Qingzhao Zhang, Xiao Zhu 0001, Mu Zhang 0001, Z. Morley Mao |
Automated Runtime Mitigation for Misconfiguration Vulnerabilities in Industrial Control Systems. |
RAID |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Michael Alicea, Izzat Alsmadi |
Misconfiguration in Firewalls and Network Access Controls: Literature Review. |
Future Internet |
2021 |
DBLP DOI BibTeX RDF |
|
26 | Puran Deo Ojha, R. C. Hansdah |
A Heuristic Approach to Detect MPLS L3 VPN Misconfiguration in Multi-Homed Multi-VRF Site-Redundant CE Environments. |
IEEE Trans. Netw. Serv. Manag. |
2021 |
DBLP DOI BibTeX RDF |
|
26 | Ke Li, Yuan Xue, Yujie Shao, Bing Su, Yu-an Tan 0001, Jingjing Hu |
Software Misconfiguration Troubleshooting Based on State Analysis. |
DSC |
2021 |
DBLP DOI BibTeX RDF |
|
26 | Shreyas Srinivasa, Jens Myrup Pedersen, Emmanouil Vasilomanolakis |
Open for hire: attack trends and misconfiguration pitfalls of IoT devices. |
Internet Measurement Conference |
2021 |
DBLP DOI BibTeX RDF |
|
26 | Giovane C. M. Moura, Sebastian Castro, John S. Heidemann, Wes Hardaker |
TsuNAME: exploiting misconfiguration and vulnerability to DDoS DNS. |
Internet Measurement Conference |
2021 |
DBLP DOI BibTeX RDF |
|
26 | Sonu Mehta, Ranjita Bhagwan, Rahul Kumar 0002, Chetan Bansal, Chandra Shekhar Maddila, Balasubramanyan Ashok, Sumit Asthana, Christian Bird, Aditya Kumar |
Rex: Preventing Bugs and Misconfiguration in Large Services Using Correlated Change Analysis. |
NSDI |
2020 |
DBLP BibTeX RDF |
|
26 | Heng Pan, Zhenyu Li 0001, Penghao Zhang, Kavé Salamatian, Gaogang Xie |
Misconfiguration Checking for SDN: Data Structure, Theory and Algorithms. |
ICNP |
2020 |
DBLP DOI BibTeX RDF |
|
26 | Alif Akbar Pranata, Olivier Barais, Johann Bourcier, Ludovic Noirie |
Misconfiguration Discovery with Principal Component Analysis for Cloud-Native Services. |
UCC |
2020 |
DBLP DOI BibTeX RDF |
|
26 | Xueling Zhang, Xiaoyin Wang, Rocky Slavin, Travis D. Breaux, Jianwei Niu 0001 |
How does misconfiguration of analytic services compromise mobile privacy? |
ICSE |
2020 |
DBLP DOI BibTeX RDF |
|
26 | Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquín García-Alfaro |
Misconfiguration Management of Network Security Components. |
CoRR |
2019 |
DBLP BibTeX RDF |
|
26 | Yuan Liu, Xi Wang 0003, Lintao Xian, Zhongwen Guo |
STAD: Stack Trace Based Automatic Software Misconfiguration Diagnosis via Value Dependency Graph. |
SPIN |
2019 |
DBLP DOI BibTeX RDF |
|
26 | Merlin Chlosta, David Rupprecht, Thorsten Holz, Christina Pöpper |
LTE security disabled: misconfiguration in commercial networks. |
WiSec |
2019 |
DBLP DOI BibTeX RDF |
|
26 | Shanshan Li 0001, Wang Li 0003, Xiangke Liao, Shaoliang Peng, Shulin Zhou, Zhouyang Jia, Teng Wang 0004 |
ConfVD: System Reactions Analysis and Evaluation Through Misconfiguration Injection. |
IEEE Trans. Reliab. |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Teng Wang 0004, Xiaodong Liu 0004, Shanshan Li 0001, Xiangke Liao, Wang Li 0003, Qing Liao 0001 |
MisconfDoctor: Diagnosing Misconfiguration via Log-Based Configuration Testing. |
QRS |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Yuanliang Zhang, Shanshan Li 0001, Xiangyang Xu, Xiangke Liao, Shazhou Yang, Yun Xiong |
ConfigFile++: Automatic comment enhancement for misconfiguration prevention. |
MaLTeSQuE@SANER |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Malek Athamnah, Amitangshu Pal, Krishna Kant 0001 |
A Framework for Misconfiguration Diagnosis in Interconnected Multiparty Systems. |
ICCCN |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Xiangyang Xu, Shanshan Li 0001, Yong Guo, Wei Dong 0006, Wang Li 0003, Xiangke Liao |
Automatic Type Inference for Proactive Misconfiguration Prevention. |
SEKE |
2017 |
DBLP DOI BibTeX RDF |
|
26 | Hongyan Tang, Ying Li 0012, Long Wang 0003, Jing Gu, Zhonghai Wu |
Predicting Misconfiguration-Induced Unsuccessful Executions of Jobs in Big Data System. |
COMPSAC (1) |
2017 |
DBLP DOI BibTeX RDF |
|
26 | Rukma Talwadker |
Dexter: faster troubleshooting of misconfiguration cases using system logs. |
SYSTOR |
2017 |
DBLP DOI BibTeX RDF |
|
26 | Wang Li 0003, Shanshan Li 0001, Xiangke Liao, Xiangyang Xu, Shulin Zhou, Zhouyang Jia |
ConfTest: Generating Comprehensive Misconfiguration for System Reaction Ability Evaluation. |
EASE |
2017 |
DBLP DOI BibTeX RDF |
|
26 | Shulin Zhou, Shanshan Li 0001, Xiaodong Liu 0004, Xiangyang Xu, Si Zheng, Xiangke Liao, Yun Xiong |
Easier Said Than Done: Diagnosing Misconfiguration via Configuration Constraints Analysis: A Study of the Variance of Configuration Constraints in Source Code. |
EASE |
2017 |
DBLP DOI BibTeX RDF |
|
26 | Tobias Fiebig |
An empirical evaluation of misconfiguration in Internet services. |
|
2017 |
RDF |
|
26 | Rahul Potharaju, Joseph Chan, Luhui Hu, Cristina Nita-Rotaru, Mingshi Wang, Liyuan Zhang 0007, Navendu Jain |
ConfSeer: Leveraging Customer Support Knowledge Bases for Automated Misconfiguration Detection. (PDF / PS) |
Proc. VLDB Endow. |
2015 |
DBLP DOI BibTeX RDF |
|
26 | Hiroshi Otsuka, Yukihiro Watanabe, Yasuhide Matsumoto |
Learning from Before and After Recovery to Detect Latent Misconfiguration. |
COMPSAC Workshops |
2015 |
DBLP DOI BibTeX RDF |
|
26 | Rohini Sulatycki, Eduardo B. Fernández |
Two threat patterns that exploit "security misconfiguration" and "sensitive data exposure" vulnerabilities. |
EuroPLoP |
2015 |
DBLP DOI BibTeX RDF |
|
26 | Zhihui Han, Liang Cheng 0004, Yang Zhang 0021, Shuke Zeng, Yi Deng 0002, Xiaoshan Sun |
Systematic Analysis and Detection of Misconfiguration Vulnerabilities in Android Smartphones. |
TrustCom |
2014 |
DBLP DOI BibTeX RDF |
|
26 | Jiaqi Zhang, Lakshminarayanan Renganarayana, Xiaolan Zhang 0001, Niyu Ge, Vasanth Bala, Tianyin Xu, Yuanyuan Zhou 0001 |
EnCore: exploiting system environment and correlation information for misconfiguration detection. |
ASPLOS |
2014 |
DBLP DOI BibTeX RDF |
|
26 | Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia, Salvador Martínez Perez, Jordi Cabot |
Management of stateful firewall misconfiguration. |
Comput. Secur. |
2013 |
DBLP DOI BibTeX RDF |
|
26 | Yousra Javed, Mohamed Shehab |
Access Control Policy Misconfiguration Detection in Online Social Networks. |
SocialCom |
2013 |
DBLP DOI BibTeX RDF |
|
26 | Yin Minn Pa Pa, Katsunari Yoshioka, Tsutomu Matsumoto |
Search Engine Based Investigation on Misconfiguration of Zone Transfer. |
AsiaJCIS |
2013 |
DBLP DOI BibTeX RDF |
|
26 | Tetsuya Uchiumi, Shinji Kikuchi, Yasuhide Matsumoto |
Misconfiguration detection for cloud datacenters using decision tree analysis. |
APNOMS |
2012 |
DBLP DOI BibTeX RDF |
|
26 | Ariel S. Rabkin |
Using Program Analysis to Reduce Misconfiguration in Open Source Systems Software. |
|
2012 |
RDF |
|
26 | Birhanu Eshete, Adolfo Villafiorita, Komminist Weldemariam |
Early Detection of Security Misconfiguration Vulnerabilities in Web Applications. |
ARES |
2011 |
DBLP DOI BibTeX RDF |
|
26 | Daniel Fabbri, Kristen LeFevre, Qiang Zhu 0001 |
PolicyReplay: Misconfiguration-Response Queries for Data Breach Reporting. (PDF / PS) |
Proc. VLDB Endow. |
2010 |
DBLP DOI BibTeX RDF |
|
26 | Shivani Deshpande, Marina Thottan, Biplab Sikdar 0001 |
An online scheme for the isolation of BGP misconfiguration errors. |
IEEE Trans. Netw. Serv. Manag. |
2008 |
DBLP DOI BibTeX RDF |
|
26 | David Buchmann, Dominik Jungo, Ulrich Ultes-Nitsche |
Improving network reliability by avoiding misconfiguration. |
DRCN |
2007 |
DBLP DOI BibTeX RDF |
|
26 | HaiYing Liang, Guowen Teng, Hongjun Wang, Yuan Gao |
Detecting BGP Misconfiguration for BGP/MPLS VPNs. |
PDCAT |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Antonio Magnaghi, Jingsha He, Takafumi Chujo, Tsuneo Katsuyama |
Active misconfiguration detection in Ethernet networks based on analysis of end-to-end anomalies. |
GLOBECOM |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Helen J. Wang, John C. Platt, Yu Chen, Ruyun Zhang, Yi-Min Wang |
Automatic Misconfiguration Troubleshooting with PeerPressure. |
OSDI |
2004 |
DBLP BibTeX RDF |
|
17 | Radia J. Perlman |
Protocol design for effective communication among silicon or carbon-based nodes. |
SIGCOMM |
2010 |
DBLP DOI BibTeX RDF |
protocol design |
17 | Vasileios Pappas, Duane Wessels, Daniel Massey, Songwu Lu, Andreas Terzis, Lixia Zhang 0001 |
Impact of configuration errors on DNS robustness. |
IEEE J. Sel. Areas Commun. |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Sihyung Lee, Tina Wong, Hyong S. Kim |
Netpiler: detection of ineffective router configurations. |
IEEE J. Sel. Areas Commun. |
2009 |
DBLP DOI BibTeX RDF |
|
17 | John Homer, Xinming Ou |
SAT-solving approaches to context-aware enterprise network security management. |
IEEE J. Sel. Areas Commun. |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Joni Hahkala, John White, Ákos Frohner |
Proxy Restrictions for Grid Usage. |
GPC |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Ehab Al-Shaer, Wilfredo Marrero, Adel El-Atawy, Khalid Elbadawi |
Network Configuration in A Box: Towards End-to-End Verification of Network Reachability and Security. |
ICNP |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Fakher Ben Ftima, Kamel Karoui, Henda Ben Ghézala |
Misconfigurations discovery between distributed security components using the mobile agent approach. |
iiWAS |
2009 |
DBLP DOI BibTeX RDF |
anomalies detection system (IDS), intra/inter-components anomalies detection, static agent, mobile agents, firewalls, misconfigurations |
17 | William Kozma, Loukas Lazos |
REAct: resource-efficient accountability for nodemisbehavior in ad hoc networks based on random audits. |
WISEC |
2009 |
DBLP DOI BibTeX RDF |
routing, ad hoc networks, bloom filter, misbehavior |
17 | Xiaodong Lin 0001, Rongxing Lu, Pin-Han Ho, Xuemin Shen, Zhenfu Cao |
TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks. |
IEEE Trans. Wirel. Commun. |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Robin Berthier, Michel Cukier |
The Deployment of a Darknet on an Organization-Wide Network: An Empirical Analysis. |
HASE |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Rui Wang 0010, XiaoFeng Wang 0001, Kehuan Zhang, Zhuowei Li 0001 |
Towards automatic reverse engineering of software security configurations. |
CCS |
2008 |
DBLP DOI BibTeX RDF |
access control, reverse engineering, configuration, context-free language, taint analysis |
17 | Dirk Reinelt, Mario Wolframm |
Security in virtual automation networks. |
ETFA |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Naaliel Mendes, Afonso Araújo Neto, João Durães, Marco Vieira, Henrique Madeira |
Assessing and Comparing Security of Web Servers. |
PRDC |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Brian Shand, Jem Rashbass |
Security for middleware extensions: event meta-data for enforcing security policy. |
Middleware Security |
2008 |
DBLP DOI BibTeX RDF |
middleware, extensions, policy specification |
17 | Saikat Guha 0002, Jaideep Chandrashekar, Nina Taft, Konstantina Papagiannaki |
How healthy are today's enterprise networks? |
Internet Measurement Conference |
2008 |
DBLP DOI BibTeX RDF |
network health, mobility, enterprise, environment awareness |
17 | James W. Mickens, Brian D. Noble |
Concilium: Collaborative Diagnosis of Broken Overlay Routes. |
DSN |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Bin Zhang 0007, Ehab Al-Shaer, Radha Jagadeesan, James Riely, Corin Pitcher |
Specifications of a high-level conflict-free firewall policy language for multi-domain networks. |
SACMAT |
2007 |
DBLP DOI BibTeX RDF |
firewall, policy language, conflicts free |
17 | Ya-Yunn Su, Mona Attariyan, Jason Flinn |
AutoBash: improving configuration management with operating system causality analysis. |
SOSP |
2007 |
DBLP DOI BibTeX RDF |
configuration management, causality, speculative execution |
17 | Jordi Perelló, Eduard Escalona, Salvatore Spadaro, Jaume Comellas, Gabriel Junyent |
Transport Plane Resource Discovery Mechanisms for ASON/GMPLS Meshed Transport Networks. |
ONDM |
2007 |
DBLP DOI BibTeX RDF |
LMP, Automatic Resource Discovery, GMPLS |
17 | Wei Zheng, Ricardo Bianchini, Thu D. Nguyen |
Automatic configuration of internet services. |
EuroSys |
2007 |
DBLP DOI BibTeX RDF |
operator mistakes, manageability, configuration, internet services |
17 | Yun Mao, Hani Jamjoom, Shu Tao, Jonathan M. Smith |
Networkmd: topology inference and failure diagnosis in the last mile. |
Internet Measurement Conference |
2007 |
DBLP DOI BibTeX RDF |
network topology inference, failure diagnosis |
17 | Pin Ren, John Kristoff, Bruce Gooch |
Visualizing DNS traffic. |
VizSEC |
2006 |
DBLP DOI BibTeX RDF |
network security visualization, information visualization, domain name system, visual metaphor |
17 | Sophie Y. Qiu, Patrick D. McDaniel, Fabian Monrose, Aviel D. Rubin |
Characterizing Address Use Structure and Stability of Origin Advertisement in Inter-domain Routing. |
ISCC |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Josh Karlin, Stephanie Forrest, Jennifer Rexford |
Pretty Good BGP: Improving BGP by Cautiously Adopting Routes. |
ICNP |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Andrew Tjang, Fábio Oliveira, Richard P. Martin, Thu D. Nguyen |
A: an assertion language for distributed systems. |
PLOS |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Takeshi Imamura, Michiaki Tatsubori, Yuichi Nakamura 0003, Christopher Giblin |
Web services security configuration in a service-oriented architecture. |
WWW (Special interest tracks and posters) |
2005 |
DBLP DOI BibTeX RDF |
best practice pattern, security configuration, service-oriented architecture, model-driven architecture, web services security |
17 | Pei-Te Chen, Chi-Sung Laih, Fabien Pouget, Marc Dacier |
Comparative Survey of Local Honeypot Sensors to Assist Network Forensics. |
SADFE |
2005 |
DBLP DOI BibTeX RDF |
|
17 | M. Sundstron, Lars-Åke Larzon |
High-performance longest prefix matching supporting high-speed incremental updates and guaranteed compression. |
INFOCOM |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Hazem H. Hamed, Ehab S. Al-Shaer, Will Marrero |
Modeling and Verification of IPSec and VPN Security Policies. |
ICNP |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Paul Rubel, Michael Ihde, Steven A. Harp, Charles N. Payne |
Generating Policies for Defense in Depth. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Vasileios Pappas, Zhiguo Xu, Songwu Lu, Daniel Massey, Andreas Terzis, Lixia Zhang 0001 |
Impact of configuration errors on DNS robustness. |
SIGCOMM |
2004 |
DBLP DOI BibTeX RDF |
resiliency, DNS, misconfigurations |
17 | Helen J. Wang, Yih-Chun Hu, Chun Yuan, Zheng Zhang 0001, Yi-Min Wang |
Friends Troubleshooting Network: Towards Privacy-Preserving, Automatic Troubleshooting. |
IPTPS |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Evan Cooke, Michael D. Bailey, Zhuoqing Morley Mao, David Watson 0001, Farnam Jahanian, Danny McPherson |
Toward understanding distributed blackhole placement. |
WORM |
2004 |
DBLP DOI BibTeX RDF |
blackhole monitoring, blackhole placement, globally scoped threats, internet motion sensor, network security, computer worms |
17 | Thomas E. Anderson, Scott Shenker, Ion Stoica, David Wetherall |
Design guidelines for robust Internet protocols. |
Comput. Commun. Rev. |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Di-Fa Chang, Ramesh Govindan, John S. Heidemann |
An empirical study of router response to large BGP routing table load. |
Internet Measurement Workshop |
2002 |
DBLP DOI BibTeX RDF |
|
17 | Rajesh R. Talpade, Gitae Kim, Sumit Khurana |
NOMAD: Traffic-based Network Monitoring Framework for Anomaly Detection. |
ISCC |
1999 |
DBLP DOI BibTeX RDF |
network performance monitoring, network anomalies, packet delay variance, traffic analysis, flow, time to live (TTL) |