The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for misconfiguration with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1999-2005 (16) 2006-2008 (24) 2009-2013 (15) 2014-2018 (15) 2019-2022 (15) 2023-2024 (11)
Publication types (Num. hits)
article(21) inproceedings(73) phdthesis(2)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 57 occurrences of 48 keywords

Results
Found 96 publication records. Showing 96 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
163Ratul Mahajan, David Wetherall, Thomas E. Anderson Understanding BGP misconfiguration. Search on Bibsonomy SIGCOMM The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
77Huan Xiong, Ming Chen 0003 Study on Traffic Characteristics of BGP Misconfiguration. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
64Raj Kumar Rajendran, Vishal Misra, Dan Rubenstein Brief announcement: strong detection of misconfigurations. Search on Bibsonomy PODC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF strong detection, routing, anomaly detection, distance-vector, misconfiguration
60Ching-Huang Lin, Chih-Hao Chen, Chi-Sung Laih A Study and Implementation of Vulnerability Assessment and Misconfiguration Detection. Search on Bibsonomy APSCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Raj Kumar Rajendran, Vishal Misra, Dan Rubenstein Theoretical bounds on control-plane self-monitoring in routing protocols. Search on Bibsonomy SIGMETRICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF rogue node, routing protocols, distance vector, misconfiguration
29Andre Broido, Young Hyun, Marina Fomenkov, Kimberly C. Claffy The windows of pivate DNS updates. Search on Bibsonomy Comput. Commun. Rev. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF OS fingerprinting, private addresses, domain name system, dynamic updates, misconfiguration
29Franck Le, Sihyung Lee, Tina Wong, Hyong S. Kim, Darrell Newcomb Minerals: using data mining to detect router misconfigurations. Search on Bibsonomy MineNet The full citation details ... 2006 DBLP  DOI  BibTeX  RDF network misconfiguration, static analysis, association rules mining, routers
26Noe Marcelo Yungaicela-Naula, Vishal Sharma, Sandra Scott-Hayward Misconfiguration in O-RAN: Analysis of the impact of AI/ML. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
26Ibrahim Bu Haimed, Marwan Ali Albahar, Ali Alzubaidi Exploiting Misconfiguration Vulnerabilities in Microsoft's Azure Active Directory for Privilege Escalation Attacks. Search on Bibsonomy Future Internet The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
26David Fellner, Thomas I. Strasser, Wolfgang Kastner Data-Driven Misconfiguration Detection in Power Systems With Transformer Profile Disaggregation. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
26Yingnan Zhou, Xue Hu, Sihan Xu, Yan Jia, Yuhao Liu, Junyong Wang, Guangquan Xu, Wei Wang 0012, Shaoying Liu, Thar Baker Multi-Misconfiguration Diagnosis via Identifying Correlated Configuration Parameters. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
26Bingyu Shen 0002 A Survey of Access Control Misconfiguration Detection Techniques. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
26Pablo Valle, Aitor Arrieta, Maite Arratibel Automated Misconfiguration Repair of Configurable Cyber-Physical Systems with Search: an Industrial Case Study on Elevator Dispatching Algorithms. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
26Heng Pan, Zhenyu Li 0001, Penghao Zhang, Penglai Cui, Kavé Salamatian, Gaogang Xie Misconfiguration-Free Compositional SDN for Cloud Networks. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
26Areeg Samir, Håvard Dagenborg Johansen A Self-Configuration Controller To Detect, Identify, and Recover Misconfiguration at IoT Edge Devices and Containerized Cluster System. Search on Bibsonomy ICISSP The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
26Areeg Samir, Håvard Dagenborg Johansen Self-Healing Misconfiguration of Cloud-Based IoT Systems Using Markov Decision Processes. Search on Bibsonomy CLOSER The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
26Douglas J. Millward, Martin J. Reed, Nkaepe E. E. Olaniyi CACLE - Automated Mitigation for Misconfiguration Vulnerabilities in Cloud Systems. Search on Bibsonomy ICCBDC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
26Pablo Valle, Aitor Arrieta, Maite Arratibel Automated Misconfiguration Repair of Configurable Cyber-Physical Systems with Search: an Industrial Case Study on Elevator Dispatching Algorithms. Search on Bibsonomy ICSE-SEIP The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
26Kanchanjot Kaur Phokela, Kapil Singi, Kuntal Dey, Vikrant Kaulgud, Adam P. Burden Framework to Assess Policy Driven Security Misconfiguration Risks in Cloud Native Application. Search on Bibsonomy SecDev The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
26David Fellner, Thomas I. Strasser, Wolfgang Kastner, Behnam Feizifar, Ibrahim Faiek Abdulhadi Data Driven Transformer Level Misconfiguration Detection in Power Distribution Grids. Search on Bibsonomy SMC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
26Qingzhao Zhang, Xiao Zhu 0001, Mu Zhang 0001, Z. Morley Mao Automated Runtime Mitigation for Misconfiguration Vulnerabilities in Industrial Control Systems. Search on Bibsonomy RAID The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
26Michael Alicea, Izzat Alsmadi Misconfiguration in Firewalls and Network Access Controls: Literature Review. Search on Bibsonomy Future Internet The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
26Puran Deo Ojha, R. C. Hansdah A Heuristic Approach to Detect MPLS L3 VPN Misconfiguration in Multi-Homed Multi-VRF Site-Redundant CE Environments. Search on Bibsonomy IEEE Trans. Netw. Serv. Manag. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
26Ke Li, Yuan Xue, Yujie Shao, Bing Su, Yu-an Tan 0001, Jingjing Hu Software Misconfiguration Troubleshooting Based on State Analysis. Search on Bibsonomy DSC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
26Shreyas Srinivasa, Jens Myrup Pedersen, Emmanouil Vasilomanolakis Open for hire: attack trends and misconfiguration pitfalls of IoT devices. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
26Giovane C. M. Moura, Sebastian Castro, John S. Heidemann, Wes Hardaker TsuNAME: exploiting misconfiguration and vulnerability to DDoS DNS. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
26Sonu Mehta, Ranjita Bhagwan, Rahul Kumar 0002, Chetan Bansal, Chandra Shekhar Maddila, Balasubramanyan Ashok, Sumit Asthana, Christian Bird, Aditya Kumar Rex: Preventing Bugs and Misconfiguration in Large Services Using Correlated Change Analysis. Search on Bibsonomy NSDI The full citation details ... 2020 DBLP  BibTeX  RDF
26Heng Pan, Zhenyu Li 0001, Penghao Zhang, Kavé Salamatian, Gaogang Xie Misconfiguration Checking for SDN: Data Structure, Theory and Algorithms. Search on Bibsonomy ICNP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
26Alif Akbar Pranata, Olivier Barais, Johann Bourcier, Ludovic Noirie Misconfiguration Discovery with Principal Component Analysis for Cloud-Native Services. Search on Bibsonomy UCC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
26Xueling Zhang, Xiaoyin Wang, Rocky Slavin, Travis D. Breaux, Jianwei Niu 0001 How does misconfiguration of analytic services compromise mobile privacy? Search on Bibsonomy ICSE The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
26Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquín García-Alfaro Misconfiguration Management of Network Security Components. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
26Yuan Liu, Xi Wang 0003, Lintao Xian, Zhongwen Guo STAD: Stack Trace Based Automatic Software Misconfiguration Diagnosis via Value Dependency Graph. Search on Bibsonomy SPIN The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
26Merlin Chlosta, David Rupprecht, Thorsten Holz, Christina Pöpper LTE security disabled: misconfiguration in commercial networks. Search on Bibsonomy WiSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
26Shanshan Li 0001, Wang Li 0003, Xiangke Liao, Shaoliang Peng, Shulin Zhou, Zhouyang Jia, Teng Wang 0004 ConfVD: System Reactions Analysis and Evaluation Through Misconfiguration Injection. Search on Bibsonomy IEEE Trans. Reliab. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
26Teng Wang 0004, Xiaodong Liu 0004, Shanshan Li 0001, Xiangke Liao, Wang Li 0003, Qing Liao 0001 MisconfDoctor: Diagnosing Misconfiguration via Log-Based Configuration Testing. Search on Bibsonomy QRS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
26Yuanliang Zhang, Shanshan Li 0001, Xiangyang Xu, Xiangke Liao, Shazhou Yang, Yun Xiong ConfigFile++: Automatic comment enhancement for misconfiguration prevention. Search on Bibsonomy MaLTeSQuE@SANER The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
26Malek Athamnah, Amitangshu Pal, Krishna Kant 0001 A Framework for Misconfiguration Diagnosis in Interconnected Multiparty Systems. Search on Bibsonomy ICCCN The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
26Xiangyang Xu, Shanshan Li 0001, Yong Guo, Wei Dong 0006, Wang Li 0003, Xiangke Liao Automatic Type Inference for Proactive Misconfiguration Prevention. Search on Bibsonomy SEKE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
26Hongyan Tang, Ying Li 0012, Long Wang 0003, Jing Gu, Zhonghai Wu Predicting Misconfiguration-Induced Unsuccessful Executions of Jobs in Big Data System. Search on Bibsonomy COMPSAC (1) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
26Rukma Talwadker Dexter: faster troubleshooting of misconfiguration cases using system logs. Search on Bibsonomy SYSTOR The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
26Wang Li 0003, Shanshan Li 0001, Xiangke Liao, Xiangyang Xu, Shulin Zhou, Zhouyang Jia ConfTest: Generating Comprehensive Misconfiguration for System Reaction Ability Evaluation. Search on Bibsonomy EASE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
26Shulin Zhou, Shanshan Li 0001, Xiaodong Liu 0004, Xiangyang Xu, Si Zheng, Xiangke Liao, Yun Xiong Easier Said Than Done: Diagnosing Misconfiguration via Configuration Constraints Analysis: A Study of the Variance of Configuration Constraints in Source Code. Search on Bibsonomy EASE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
26Tobias Fiebig An empirical evaluation of misconfiguration in Internet services. Search on Bibsonomy 2017   RDF
26Rahul Potharaju, Joseph Chan, Luhui Hu, Cristina Nita-Rotaru, Mingshi Wang, Liyuan Zhang 0007, Navendu Jain ConfSeer: Leveraging Customer Support Knowledge Bases for Automated Misconfiguration Detection. (PDF / PS) Search on Bibsonomy Proc. VLDB Endow. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
26Hiroshi Otsuka, Yukihiro Watanabe, Yasuhide Matsumoto Learning from Before and After Recovery to Detect Latent Misconfiguration. Search on Bibsonomy COMPSAC Workshops The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
26Rohini Sulatycki, Eduardo B. Fernández Two threat patterns that exploit "security misconfiguration" and "sensitive data exposure" vulnerabilities. Search on Bibsonomy EuroPLoP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
26Zhihui Han, Liang Cheng 0004, Yang Zhang 0021, Shuke Zeng, Yi Deng 0002, Xiaoshan Sun Systematic Analysis and Detection of Misconfiguration Vulnerabilities in Android Smartphones. Search on Bibsonomy TrustCom The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
26Jiaqi Zhang, Lakshminarayanan Renganarayana, Xiaolan Zhang 0001, Niyu Ge, Vasanth Bala, Tianyin Xu, Yuanyuan Zhou 0001 EnCore: exploiting system environment and correlation information for misconfiguration detection. Search on Bibsonomy ASPLOS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
26Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia, Salvador Martínez Perez, Jordi Cabot Management of stateful firewall misconfiguration. Search on Bibsonomy Comput. Secur. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
26Yousra Javed, Mohamed Shehab Access Control Policy Misconfiguration Detection in Online Social Networks. Search on Bibsonomy SocialCom The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
26Yin Minn Pa Pa, Katsunari Yoshioka, Tsutomu Matsumoto Search Engine Based Investigation on Misconfiguration of Zone Transfer. Search on Bibsonomy AsiaJCIS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
26Tetsuya Uchiumi, Shinji Kikuchi, Yasuhide Matsumoto Misconfiguration detection for cloud datacenters using decision tree analysis. Search on Bibsonomy APNOMS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
26Ariel S. Rabkin Using Program Analysis to Reduce Misconfiguration in Open Source Systems Software. Search on Bibsonomy 2012   RDF
26Birhanu Eshete, Adolfo Villafiorita, Komminist Weldemariam Early Detection of Security Misconfiguration Vulnerabilities in Web Applications. Search on Bibsonomy ARES The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
26Daniel Fabbri, Kristen LeFevre, Qiang Zhu 0001 PolicyReplay: Misconfiguration-Response Queries for Data Breach Reporting. (PDF / PS) Search on Bibsonomy Proc. VLDB Endow. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
26Shivani Deshpande, Marina Thottan, Biplab Sikdar 0001 An online scheme for the isolation of BGP misconfiguration errors. Search on Bibsonomy IEEE Trans. Netw. Serv. Manag. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26David Buchmann, Dominik Jungo, Ulrich Ultes-Nitsche Improving network reliability by avoiding misconfiguration. Search on Bibsonomy DRCN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26HaiYing Liang, Guowen Teng, Hongjun Wang, Yuan Gao Detecting BGP Misconfiguration for BGP/MPLS VPNs. Search on Bibsonomy PDCAT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Antonio Magnaghi, Jingsha He, Takafumi Chujo, Tsuneo Katsuyama Active misconfiguration detection in Ethernet networks based on analysis of end-to-end anomalies. Search on Bibsonomy GLOBECOM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Helen J. Wang, John C. Platt, Yu Chen, Ruyun Zhang, Yi-Min Wang Automatic Misconfiguration Troubleshooting with PeerPressure. Search on Bibsonomy OSDI The full citation details ... 2004 DBLP  BibTeX  RDF
17Radia J. Perlman Protocol design for effective communication among silicon or carbon-based nodes. Search on Bibsonomy SIGCOMM The full citation details ... 2010 DBLP  DOI  BibTeX  RDF protocol design
17Vasileios Pappas, Duane Wessels, Daniel Massey, Songwu Lu, Andreas Terzis, Lixia Zhang 0001 Impact of configuration errors on DNS robustness. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Sihyung Lee, Tina Wong, Hyong S. Kim Netpiler: detection of ineffective router configurations. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17John Homer, Xinming Ou SAT-solving approaches to context-aware enterprise network security management. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Joni Hahkala, John White, Ákos Frohner Proxy Restrictions for Grid Usage. Search on Bibsonomy GPC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Ehab Al-Shaer, Wilfredo Marrero, Adel El-Atawy, Khalid Elbadawi Network Configuration in A Box: Towards End-to-End Verification of Network Reachability and Security. Search on Bibsonomy ICNP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Fakher Ben Ftima, Kamel Karoui, Henda Ben Ghézala Misconfigurations discovery between distributed security components using the mobile agent approach. Search on Bibsonomy iiWAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF anomalies detection system (IDS), intra/inter-components anomalies detection, static agent, mobile agents, firewalls, misconfigurations
17William Kozma, Loukas Lazos REAct: resource-efficient accountability for nodemisbehavior in ad hoc networks based on random audits. Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF routing, ad hoc networks, bloom filter, misbehavior
17Xiaodong Lin 0001, Rongxing Lu, Pin-Han Ho, Xuemin Shen, Zhenfu Cao TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Robin Berthier, Michel Cukier The Deployment of a Darknet on an Organization-Wide Network: An Empirical Analysis. Search on Bibsonomy HASE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Rui Wang 0010, XiaoFeng Wang 0001, Kehuan Zhang, Zhuowei Li 0001 Towards automatic reverse engineering of software security configurations. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF access control, reverse engineering, configuration, context-free language, taint analysis
17Dirk Reinelt, Mario Wolframm Security in virtual automation networks. Search on Bibsonomy ETFA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Naaliel Mendes, Afonso Araújo Neto, João Durães, Marco Vieira, Henrique Madeira Assessing and Comparing Security of Web Servers. Search on Bibsonomy PRDC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Brian Shand, Jem Rashbass Security for middleware extensions: event meta-data for enforcing security policy. Search on Bibsonomy Middleware Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF middleware, extensions, policy specification
17Saikat Guha 0002, Jaideep Chandrashekar, Nina Taft, Konstantina Papagiannaki How healthy are today's enterprise networks? Search on Bibsonomy Internet Measurement Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF network health, mobility, enterprise, environment awareness
17James W. Mickens, Brian D. Noble Concilium: Collaborative Diagnosis of Broken Overlay Routes. Search on Bibsonomy DSN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Bin Zhang 0007, Ehab Al-Shaer, Radha Jagadeesan, James Riely, Corin Pitcher Specifications of a high-level conflict-free firewall policy language for multi-domain networks. Search on Bibsonomy SACMAT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF firewall, policy language, conflicts free
17Ya-Yunn Su, Mona Attariyan, Jason Flinn AutoBash: improving configuration management with operating system causality analysis. Search on Bibsonomy SOSP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF configuration management, causality, speculative execution
17Jordi Perelló, Eduard Escalona, Salvatore Spadaro, Jaume Comellas, Gabriel Junyent Transport Plane Resource Discovery Mechanisms for ASON/GMPLS Meshed Transport Networks. Search on Bibsonomy ONDM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF LMP, Automatic Resource Discovery, GMPLS
17Wei Zheng, Ricardo Bianchini, Thu D. Nguyen Automatic configuration of internet services. Search on Bibsonomy EuroSys The full citation details ... 2007 DBLP  DOI  BibTeX  RDF operator mistakes, manageability, configuration, internet services
17Yun Mao, Hani Jamjoom, Shu Tao, Jonathan M. Smith Networkmd: topology inference and failure diagnosis in the last mile. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2007 DBLP  DOI  BibTeX  RDF network topology inference, failure diagnosis
17Pin Ren, John Kristoff, Bruce Gooch Visualizing DNS traffic. Search on Bibsonomy VizSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF network security visualization, information visualization, domain name system, visual metaphor
17Sophie Y. Qiu, Patrick D. McDaniel, Fabian Monrose, Aviel D. Rubin Characterizing Address Use Structure and Stability of Origin Advertisement in Inter-domain Routing. Search on Bibsonomy ISCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Josh Karlin, Stephanie Forrest, Jennifer Rexford Pretty Good BGP: Improving BGP by Cautiously Adopting Routes. Search on Bibsonomy ICNP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Andrew Tjang, Fábio Oliveira, Richard P. Martin, Thu D. Nguyen A: an assertion language for distributed systems. Search on Bibsonomy PLOS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Takeshi Imamura, Michiaki Tatsubori, Yuichi Nakamura 0003, Christopher Giblin Web services security configuration in a service-oriented architecture. Search on Bibsonomy WWW (Special interest tracks and posters) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF best practice pattern, security configuration, service-oriented architecture, model-driven architecture, web services security
17Pei-Te Chen, Chi-Sung Laih, Fabien Pouget, Marc Dacier Comparative Survey of Local Honeypot Sensors to Assist Network Forensics. Search on Bibsonomy SADFE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17M. Sundstron, Lars-Åke Larzon High-performance longest prefix matching supporting high-speed incremental updates and guaranteed compression. Search on Bibsonomy INFOCOM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Hazem H. Hamed, Ehab S. Al-Shaer, Will Marrero Modeling and Verification of IPSec and VPN Security Policies. Search on Bibsonomy ICNP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Paul Rubel, Michael Ihde, Steven A. Harp, Charles N. Payne Generating Policies for Defense in Depth. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Vasileios Pappas, Zhiguo Xu, Songwu Lu, Daniel Massey, Andreas Terzis, Lixia Zhang 0001 Impact of configuration errors on DNS robustness. Search on Bibsonomy SIGCOMM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF resiliency, DNS, misconfigurations
17Helen J. Wang, Yih-Chun Hu, Chun Yuan, Zheng Zhang 0001, Yi-Min Wang Friends Troubleshooting Network: Towards Privacy-Preserving, Automatic Troubleshooting. Search on Bibsonomy IPTPS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Evan Cooke, Michael D. Bailey, Zhuoqing Morley Mao, David Watson 0001, Farnam Jahanian, Danny McPherson Toward understanding distributed blackhole placement. Search on Bibsonomy WORM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF blackhole monitoring, blackhole placement, globally scoped threats, internet motion sensor, network security, computer worms
17Thomas E. Anderson, Scott Shenker, Ion Stoica, David Wetherall Design guidelines for robust Internet protocols. Search on Bibsonomy Comput. Commun. Rev. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Di-Fa Chang, Ramesh Govindan, John S. Heidemann An empirical study of router response to large BGP routing table load. Search on Bibsonomy Internet Measurement Workshop The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
17Rajesh R. Talpade, Gitae Kim, Sumit Khurana NOMAD: Traffic-based Network Monitoring Framework for Anomaly Detection. Search on Bibsonomy ISCC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF network performance monitoring, network anomalies, packet delay variance, traffic analysis, flow, time to live (TTL)
Displaying result #1 - #96 of 96 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license