Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
163 | Ratul Mahajan, David Wetherall, Thomas E. Anderson |
Understanding BGP misconfiguration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 2002 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 19-23, 2002, Pittsburgh, PA, USA, pp. 3-16, 2002, ACM, 1-58113-570-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
77 | Huan Xiong, Ming Chen 0003 |
Study on Traffic Characteristics of BGP Misconfiguration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2008, Beijing, China, 19-23 May 2008, pp. 5751-5755, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
64 | Raj Kumar Rajendran, Vishal Misra, Dan Rubenstein |
Brief announcement: strong detection of misconfigurations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODC ![In: Proceedings of the Twenty-Fourth Annual ACM Symposium on Principles of Distributed Computing, PODC 2005, Las Vegas, NV, USA, July 17-20, 2005, pp. 40, 2005, ACM, 1-58113-994-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
strong detection, routing, anomaly detection, distance-vector, misconfiguration |
60 | Ching-Huang Lin, Chih-Hao Chen, Chi-Sung Laih |
A Study and Implementation of Vulnerability Assessment and Misconfiguration Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSCC ![In: Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008, Yilan, Taiwan, 9-12 December 2008, pp. 1252-1257, 2008, IEEE Computer Society, 978-0-7695-3473-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Raj Kumar Rajendran, Vishal Misra, Dan Rubenstein |
Theoretical bounds on control-plane self-monitoring in routing protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMETRICS ![In: Proceedings of the 2007 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS 2007, San Diego, California, USA, June 12-16, 2007, pp. 325-336, 2007, ACM, 978-1-59593-639-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
rogue node, routing protocols, distance vector, misconfiguration |
29 | Andre Broido, Young Hyun, Marina Fomenkov, Kimberly C. Claffy |
The windows of pivate DNS updates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Commun. Rev. ![In: Comput. Commun. Rev. 36(3), pp. 93-98, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
OS fingerprinting, private addresses, domain name system, dynamic updates, misconfiguration |
29 | Franck Le, Sihyung Lee, Tina Wong, Hyong S. Kim, Darrell Newcomb |
Minerals: using data mining to detect router misconfigurations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MineNet ![In: Proceedings of the 2nd Annual ACM Workshop on Mining Network Data, MineNet 2006, Pisa, Italy, September 15, 2006, pp. 293-298, 2006, ACM, 1-59593-569-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
network misconfiguration, static analysis, association rules mining, routers |
26 | Noe Marcelo Yungaicela-Naula, Vishal Sharma, Sandra Scott-Hayward |
Misconfiguration in O-RAN: Analysis of the impact of AI/ML. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2403.01180, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
26 | Ibrahim Bu Haimed, Marwan Ali Albahar, Ali Alzubaidi |
Exploiting Misconfiguration Vulnerabilities in Microsoft's Azure Active Directory for Privilege Escalation Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Internet ![In: Future Internet 15(7), pp. 226, July 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
26 | David Fellner, Thomas I. Strasser, Wolfgang Kastner |
Data-Driven Misconfiguration Detection in Power Systems With Transformer Profile Disaggregation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 11, pp. 80123-80136, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Yingnan Zhou, Xue Hu, Sihan Xu, Yan Jia, Yuhao Liu, Junyong Wang, Guangquan Xu, Wei Wang 0012, Shaoying Liu, Thar Baker |
Multi-Misconfiguration Diagnosis via Identifying Correlated Configuration Parameters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 49(10), pp. 4624-4638, October 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Bingyu Shen 0002 |
A Survey of Access Control Misconfiguration Detection Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2304.07704, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Pablo Valle, Aitor Arrieta, Maite Arratibel |
Automated Misconfiguration Repair of Configurable Cyber-Physical Systems with Search: an Industrial Case Study on Elevator Dispatching Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2301.01487, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Heng Pan, Zhenyu Li 0001, Penghao Zhang, Penglai Cui, Kavé Salamatian, Gaogang Xie |
Misconfiguration-Free Compositional SDN for Cloud Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 20(3), pp. 2484-2499, May - June 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Areeg Samir, Håvard Dagenborg Johansen |
A Self-Configuration Controller To Detect, Identify, and Recover Misconfiguration at IoT Edge Devices and Containerized Cluster System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISSP ![In: Proceedings of the 9th International Conference on Information Systems Security and Privacy, ICISSP 2023, Lisbon, Portugal, February 22-24, 2023, pp. 765-773, 2023, SciTePress, 978-989-758-624-8. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Areeg Samir, Håvard Dagenborg Johansen |
Self-Healing Misconfiguration of Cloud-Based IoT Systems Using Markov Decision Processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CLOSER ![In: Proceedings of the 13th International Conference on Cloud Computing and Services Science, CLOSER 2023, Prague, Czech Republic, April 26-28, 2023., pp. 244-252, 2023, SCITEPRESS, 978-989-758-650-7. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Douglas J. Millward, Martin J. Reed, Nkaepe E. E. Olaniyi |
CACLE - Automated Mitigation for Misconfiguration Vulnerabilities in Cloud Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCBDC ![In: Proceedings of the 7th International Conference on Cloud and Big Data Computing, ICCBDC 2023, Manchester, United Kingdom, August 17-19, 2023, pp. 74-80, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Pablo Valle, Aitor Arrieta, Maite Arratibel |
Automated Misconfiguration Repair of Configurable Cyber-Physical Systems with Search: an Industrial Case Study on Elevator Dispatching Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE-SEIP ![In: 45th IEEE/ACM International Conference on Software Engineering: Software Engineering in Practice, SEIP@ICSE 2023, Melbourne, Australia, May 14-20, 2023, pp. 396-408, 2023, IEEE, 979-8-3503-0037-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Kanchanjot Kaur Phokela, Kapil Singi, Kuntal Dey, Vikrant Kaulgud, Adam P. Burden |
Framework to Assess Policy Driven Security Misconfiguration Risks in Cloud Native Application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecDev ![In: IEEE Secure Development Conference, SecDev 2022, Atlanta, GA, USA, October 18-20, 2022, pp. 63-64, 2022, IEEE, 978-1-6654-7182-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
26 | David Fellner, Thomas I. Strasser, Wolfgang Kastner, Behnam Feizifar, Ibrahim Faiek Abdulhadi |
Data Driven Transformer Level Misconfiguration Detection in Power Distribution Grids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SMC ![In: IEEE International Conference on Systems, Man, and Cybernetics, SMC 2022, Prague, Czech Republic, October 9-12, 2022, pp. 1840-1847, 2022, IEEE, 978-1-6654-5258-8. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Qingzhao Zhang, Xiao Zhu 0001, Mu Zhang 0001, Z. Morley Mao |
Automated Runtime Mitigation for Misconfiguration Vulnerabilities in Industrial Control Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: 25th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2022, Limassol, Cyprus, October 26-28, 2022, pp. 333-349, 2022, ACM, 978-1-4503-9704-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Michael Alicea, Izzat Alsmadi |
Misconfiguration in Firewalls and Network Access Controls: Literature Review. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Internet ![In: Future Internet 13(11), pp. 283, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
26 | Puran Deo Ojha, R. C. Hansdah |
A Heuristic Approach to Detect MPLS L3 VPN Misconfiguration in Multi-Homed Multi-VRF Site-Redundant CE Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Netw. Serv. Manag. ![In: IEEE Trans. Netw. Serv. Manag. 18(2), pp. 2294-2307, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
26 | Ke Li, Yuan Xue, Yujie Shao, Bing Su, Yu-an Tan 0001, Jingjing Hu |
Software Misconfiguration Troubleshooting Based on State Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSC ![In: Sixth IEEE International Conference on Data Science in Cyberspace, DSC 2021, Shenzhen, China, October 9-11, 2021, pp. 361-366, 2021, IEEE, 978-1-6654-1815-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
26 | Shreyas Srinivasa, Jens Myrup Pedersen, Emmanouil Vasilomanolakis |
Open for hire: attack trends and misconfiguration pitfalls of IoT devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Measurement Conference ![In: IMC '21: ACM Internet Measurement Conference, Virtual Event, USA, November 2-4, 2021, pp. 195-215, 2021, ACM, 978-1-4503-9129-0. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
26 | Giovane C. M. Moura, Sebastian Castro, John S. Heidemann, Wes Hardaker |
TsuNAME: exploiting misconfiguration and vulnerability to DDoS DNS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Measurement Conference ![In: IMC '21: ACM Internet Measurement Conference, Virtual Event, USA, November 2-4, 2021, pp. 398-418, 2021, ACM, 978-1-4503-9129-0. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
26 | Sonu Mehta, Ranjita Bhagwan, Rahul Kumar 0002, Chetan Bansal, Chandra Shekhar Maddila, Balasubramanyan Ashok, Sumit Asthana, Christian Bird, Aditya Kumar |
Rex: Preventing Bugs and Misconfiguration in Large Services Using Correlated Change Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSDI ![In: 17th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2020, Santa Clara, CA, USA, February 25-27, 2020., pp. 435-448, 2020, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
26 | Heng Pan, Zhenyu Li 0001, Penghao Zhang, Kavé Salamatian, Gaogang Xie |
Misconfiguration Checking for SDN: Data Structure, Theory and Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNP ![In: 28th IEEE International Conference on Network Protocols, ICNP 2020, Madrid, Spain, October 13-16, 2020, pp. 1-11, 2020, IEEE, 978-1-7281-6992-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
26 | Alif Akbar Pranata, Olivier Barais, Johann Bourcier, Ludovic Noirie |
Misconfiguration Discovery with Principal Component Analysis for Cloud-Native Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UCC ![In: 13th IEEE/ACM International Conference on Utility and Cloud Computing, UCC 2020, Leicester, United Kingdom, December 7-10, 2020, pp. 269-278, 2020, IEEE, 978-0-7381-2394-3. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
26 | Xueling Zhang, Xiaoyin Wang, Rocky Slavin, Travis D. Breaux, Jianwei Niu 0001 |
How does misconfiguration of analytic services compromise mobile privacy? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE ![In: ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June - 19 July, 2020, pp. 1572-1583, 2020, ACM, 978-1-4503-7121-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
26 | Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquín García-Alfaro |
Misconfiguration Management of Network Security Components. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1912.07283, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
26 | Yuan Liu, Xi Wang 0003, Lintao Xian, Zhongwen Guo |
STAD: Stack Trace Based Automatic Software Misconfiguration Diagnosis via Value Dependency Graph. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPIN ![In: Model Checking Software - 26th International Symposium, SPIN 2019, Beijing, China, July 15-16, 2019, Proceedings, pp. 135-152, 2019, Springer, 978-3-030-30922-0. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
26 | Merlin Chlosta, David Rupprecht, Thorsten Holz, Christina Pöpper |
LTE security disabled: misconfiguration in commercial networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WiSec ![In: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019., pp. 261-266, 2019, ACM, 978-1-4503-6726-4. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
26 | Shanshan Li 0001, Wang Li 0003, Xiangke Liao, Shaoliang Peng, Shulin Zhou, Zhouyang Jia, Teng Wang 0004 |
ConfVD: System Reactions Analysis and Evaluation Through Misconfiguration Injection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Reliab. ![In: IEEE Trans. Reliab. 67(4), pp. 1393-1405, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Teng Wang 0004, Xiaodong Liu 0004, Shanshan Li 0001, Xiangke Liao, Wang Li 0003, Qing Liao 0001 |
MisconfDoctor: Diagnosing Misconfiguration via Log-Based Configuration Testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QRS ![In: 2018 IEEE International Conference on Software Quality, Reliability and Security, QRS 2018, Lisbon, Portugal, July 16-20, 2018, pp. 1-12, 2018, IEEE, 978-1-5386-7757-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Yuanliang Zhang, Shanshan Li 0001, Xiangyang Xu, Xiangke Liao, Shazhou Yang, Yun Xiong |
ConfigFile++: Automatic comment enhancement for misconfiguration prevention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MaLTeSQuE@SANER ![In: 2018 IEEE Workshop on Machine Learning Techniques for Software Quality Evaluation, MaLTeSQuE@SANER 2018, Campobasso, Italy, March 20, 2018, pp. 37-42, 2018, IEEE Computer Society, 978-1-5386-5920-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Malek Athamnah, Amitangshu Pal, Krishna Kant 0001 |
A Framework for Misconfiguration Diagnosis in Interconnected Multiparty Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCN ![In: 27th International Conference on Computer Communication and Networks, ICCCN 2018, Hangzhou, China, July 30 - August 2, 2018, pp. 1-9, 2018, IEEE, 978-1-5386-5156-8. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Xiangyang Xu, Shanshan Li 0001, Yong Guo, Wei Dong 0006, Wang Li 0003, Xiangke Liao |
Automatic Type Inference for Proactive Misconfiguration Prevention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEKE ![In: The 29th International Conference on Software Engineering and Knowledge Engineering, Wyndham Pittsburgh University Center, Pittsburgh, PA, USA, July 5-7, 2017., pp. 295-300, 2017, KSI Research Inc. and Knowledge Systems Institute Graduate School, 1-891706-41-1. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
26 | Hongyan Tang, Ying Li 0012, Long Wang 0003, Jing Gu, Zhonghai Wu |
Predicting Misconfiguration-Induced Unsuccessful Executions of Jobs in Big Data System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC (1) ![In: 41st IEEE Annual Computer Software and Applications Conference, COMPSAC 2017, Turin, Italy, July 4-8, 2017. Volume 1, pp. 772-777, 2017, IEEE Computer Society, 978-1-5386-0367-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
26 | Rukma Talwadker |
Dexter: faster troubleshooting of misconfiguration cases using system logs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SYSTOR ![In: Proceedings of the 10th ACM International Systems and Storage Conference, SYSTOR 2017, Haifa, Israel, May 22-24, 2017, pp. 7:1-7:12, 2017, ACM, 978-1-4503-5035-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
26 | Wang Li 0003, Shanshan Li 0001, Xiangke Liao, Xiangyang Xu, Shulin Zhou, Zhouyang Jia |
ConfTest: Generating Comprehensive Misconfiguration for System Reaction Ability Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EASE ![In: Proceedings of the 21st International Conference on Evaluation and Assessment in Software Engineering, EASE 2017, Karlskrona, Sweden, June 15-16, 2017, pp. 88-97, 2017, ACM, 978-1-4503-4804-1. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
26 | Shulin Zhou, Shanshan Li 0001, Xiaodong Liu 0004, Xiangyang Xu, Si Zheng, Xiangke Liao, Yun Xiong |
Easier Said Than Done: Diagnosing Misconfiguration via Configuration Constraints Analysis: A Study of the Variance of Configuration Constraints in Source Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EASE ![In: Proceedings of the 21st International Conference on Evaluation and Assessment in Software Engineering, EASE 2017, Karlskrona, Sweden, June 15-16, 2017, pp. 196-201, 2017, ACM, 978-1-4503-4804-1. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
26 | Tobias Fiebig |
An empirical evaluation of misconfiguration in Internet services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2017 |
RDF |
|
26 | Rahul Potharaju, Joseph Chan, Luhui Hu, Cristina Nita-Rotaru, Mingshi Wang, Liyuan Zhang 0007, Navendu Jain |
ConfSeer: Leveraging Customer Support Knowledge Bases for Automated Misconfiguration Detection. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
Proc. VLDB Endow. ![In: Proc. VLDB Endow. 8(12), pp. 1828-1839, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
26 | Hiroshi Otsuka, Yukihiro Watanabe, Yasuhide Matsumoto |
Learning from Before and After Recovery to Detect Latent Misconfiguration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC Workshops ![In: 39th Annual Computer Software and Applications Conference, COMPSAC Workshops 2015, Taichung, Taiwan, July 1-5, 2015, pp. 141-148, 2015, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
26 | Rohini Sulatycki, Eduardo B. Fernández |
Two threat patterns that exploit "security misconfiguration" and "sensitive data exposure" vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPLoP ![In: Proceedings of the 20th European Conference on Pattern Languages of Programs, EuroPLoP 2015, Kaufbeuren, Germany, July 8-12, 2015, pp. 46:1-46:11, 2015, ACM, 978-1-4503-3847-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
26 | Zhihui Han, Liang Cheng 0004, Yang Zhang 0021, Shuke Zeng, Yi Deng 0002, Xiaoshan Sun |
Systematic Analysis and Detection of Misconfiguration Vulnerabilities in Android Smartphones. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014, Beijing, China, September 24-26, 2014, pp. 432-439, 2014, IEEE Computer Society, 978-1-4799-6513-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
26 | Jiaqi Zhang, Lakshminarayanan Renganarayana, Xiaolan Zhang 0001, Niyu Ge, Vasanth Bala, Tianyin Xu, Yuanyuan Zhou 0001 |
EnCore: exploiting system environment and correlation information for misconfiguration detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASPLOS ![In: Architectural Support for Programming Languages and Operating Systems, ASPLOS 2014, Salt Lake City, UT, USA, March 1-5, 2014, pp. 687-700, 2014, ACM, 978-1-4503-2305-5. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
26 | Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia, Salvador Martínez Perez, Jordi Cabot |
Management of stateful firewall misconfiguration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 39, pp. 64-85, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
26 | Yousra Javed, Mohamed Shehab |
Access Control Policy Misconfiguration Detection in Online Social Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SocialCom ![In: International Conference on Social Computing, SocialCom 2013, SocialCom/PASSAT/BigData/EconCom/BioMedCom 2013, Washington, DC, USA, 8-14 September, 2013, pp. 544-549, 2013, IEEE Computer Society, 978-0-7695-5137-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
26 | Yin Minn Pa Pa, Katsunari Yoshioka, Tsutomu Matsumoto |
Search Engine Based Investigation on Misconfiguration of Zone Transfer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaJCIS ![In: Eighth Asia Joint Conference on Information Security, AsiaJCIS 2013, Seoul, Korea, July 25-26, 2013, pp. 56-62, 2013, IEEE Computer Society, 978-0-7695-5075-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
26 | Tetsuya Uchiumi, Shinji Kikuchi, Yasuhide Matsumoto |
Misconfiguration detection for cloud datacenters using decision tree analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APNOMS ![In: 14th Asia-Pacific Network Operations and Management Symposium, APNOMS 2012, Seoul, Korea (South), September 25-27, 2012, pp. 1-4, 2012, IEEE, 978-1-4673-4494-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
26 | Ariel S. Rabkin |
Using Program Analysis to Reduce Misconfiguration in Open Source Systems Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2012 |
RDF |
|
26 | Birhanu Eshete, Adolfo Villafiorita, Komminist Weldemariam |
Early Detection of Security Misconfiguration Vulnerabilities in Web Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Sixth International Conference on Availability, Reliability and Security, ARES 2011, Vienna, Austria, August 22-26, 2011, pp. 169-174, 2011, IEEE Computer Society, 978-1-4577-0979-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
26 | Daniel Fabbri, Kristen LeFevre, Qiang Zhu 0001 |
PolicyReplay: Misconfiguration-Response Queries for Data Breach Reporting. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
Proc. VLDB Endow. ![In: Proc. VLDB Endow. 3(1), pp. 36-47, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
26 | Shivani Deshpande, Marina Thottan, Biplab Sikdar 0001 |
An online scheme for the isolation of BGP misconfiguration errors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Netw. Serv. Manag. ![In: IEEE Trans. Netw. Serv. Manag. 5(2), pp. 78-90, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | David Buchmann, Dominik Jungo, Ulrich Ultes-Nitsche |
Improving network reliability by avoiding misconfiguration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DRCN ![In: 6th International Workshop on Design and Reliable Communication Networks, DRCN 2007, La Rochelle, France, October 7-10, 2007, pp. 1-8, 2007, IEEE, 978-1-4244-3824-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | HaiYing Liang, Guowen Teng, Hongjun Wang, Yuan Gao |
Detecting BGP Misconfiguration for BGP/MPLS VPNs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDCAT ![In: Sixth International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2005), 5-8 December 2005, Dalian, China, pp. 168-170, 2005, IEEE Computer Society, 0-7695-2405-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Antonio Magnaghi, Jingsha He, Takafumi Chujo, Tsuneo Katsuyama |
Active misconfiguration detection in Ethernet networks based on analysis of end-to-end anomalies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GLOBECOM ![In: Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November - 3 December 2004, pp. 610-616, 2004, IEEE, 0-7803-8794-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Helen J. Wang, John C. Platt, Yu Chen, Ruyun Zhang, Yi-Min Wang |
Automatic Misconfiguration Troubleshooting with PeerPressure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OSDI ![In: 6th Symposium on Operating System Design and Implementation (OSDI 2004), San Francisco, California, USA, December 6-8, 2004, pp. 245-258, 2004, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
17 | Radia J. Perlman |
Protocol design for effective communication among silicon or carbon-based nodes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 2010 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, New Delhi, India, August 30 -September 3, 2010, pp. 1-2, 2010, ACM, 978-1-4503-0201-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
protocol design |
17 | Vasileios Pappas, Duane Wessels, Daniel Massey, Songwu Lu, Andreas Terzis, Lixia Zhang 0001 |
Impact of configuration errors on DNS robustness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE J. Sel. Areas Commun. ![In: IEEE J. Sel. Areas Commun. 27(3), pp. 275-290, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Sihyung Lee, Tina Wong, Hyong S. Kim |
Netpiler: detection of ineffective router configurations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE J. Sel. Areas Commun. ![In: IEEE J. Sel. Areas Commun. 27(3), pp. 291-301, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | John Homer, Xinming Ou |
SAT-solving approaches to context-aware enterprise network security management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE J. Sel. Areas Commun. ![In: IEEE J. Sel. Areas Commun. 27(3), pp. 315-322, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Joni Hahkala, John White, Ákos Frohner |
Proxy Restrictions for Grid Usage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GPC ![In: Advances in Grid and Pervasive Computing, 4th International Conference, GPC 2009, Geneva, Switzerland, May 4-8, 2009. Proceedings, pp. 48-56, 2009, Springer, 978-3-642-01670-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Ehab Al-Shaer, Wilfredo Marrero, Adel El-Atawy, Khalid Elbadawi |
Network Configuration in A Box: Towards End-to-End Verification of Network Reachability and Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNP ![In: Proceedings of the 17th annual IEEE International Conference on Network Protocols, 2009. ICNP 2009, Princeton, NJ, USA, 13-16 October 2009, pp. 123-132, 2009, IEEE Computer Society, 978-1-4244-4634-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Fakher Ben Ftima, Kamel Karoui, Henda Ben Ghézala |
Misconfigurations discovery between distributed security components using the mobile agent approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iiWAS ![In: iiWAS'2009 - The Eleventh International Conference on Information Integration and Web-based Applications and Services, 14-16 December 2009, Kuala Lumpur, Malaysia, pp. 663-668, 2009, ACM, 978-1-60558-660-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
anomalies detection system (IDS), intra/inter-components anomalies detection, static agent, mobile agents, firewalls, misconfigurations |
17 | William Kozma, Loukas Lazos |
REAct: resource-efficient accountability for nodemisbehavior in ad hoc networks based on random audits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009, pp. 103-110, 2009, ACM, 978-1-60558-460-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
routing, ad hoc networks, bloom filter, misbehavior |
17 | Xiaodong Lin 0001, Rongxing Lu, Pin-Han Ho, Xuemin Shen, Zhenfu Cao |
TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Wirel. Commun. ![In: IEEE Trans. Wirel. Commun. 7(4), pp. 1389-1399, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Robin Berthier, Michel Cukier |
The Deployment of a Darknet on an Organization-Wide Network: An Empirical Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HASE ![In: 11th IEEE High Assurance Systems Engineering Symposium, HASE 2008, Nanjing, China, December 3 - 5, 2008, pp. 59-68, 2008, IEEE Computer Society, 978-0-7695-3482-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Rui Wang 0010, XiaoFeng Wang 0001, Kehuan Zhang, Zhuowei Li 0001 |
Towards automatic reverse engineering of software security configurations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008, pp. 245-256, 2008, ACM, 978-1-59593-810-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
access control, reverse engineering, configuration, context-free language, taint analysis |
17 | Dirk Reinelt, Mario Wolframm |
Security in virtual automation networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ETFA ![In: Proceedings of 13th IEEE International Conference on Emerging Technologies and Factory Automation, ETFA 2008, September 15-18, 2008, Hamburg, Germany, pp. 480-483, 2008, IEEE, 1-4244-1505-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Naaliel Mendes, Afonso Araújo Neto, João Durães, Marco Vieira, Henrique Madeira |
Assessing and Comparing Security of Web Servers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRDC ![In: 14th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2008, 15-17 December 2008, Taipei, Taiwan, pp. 313-322, 2008, IEEE Computer Society, 978-0-7695-3448-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Brian Shand, Jem Rashbass |
Security for middleware extensions: event meta-data for enforcing security policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Middleware Security ![In: Proceedings of the Workshop on Middleware Security, Leuven, Belgium, December 2, 2008, pp. 31-33, 2008, ACM, 978-1-60558-363-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
middleware, extensions, policy specification |
17 | Saikat Guha 0002, Jaideep Chandrashekar, Nina Taft, Konstantina Papagiannaki |
How healthy are today's enterprise networks? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Measurement Conference ![In: Proceedings of the 8th ACM SIGCOMM Internet Measurement Conference, IMC 2008, Vouliagmeni, Greece, October 20-22, 2008, pp. 145-150, 2008, ACM, 978-1-60558-334-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
network health, mobility, enterprise, environment awareness |
17 | James W. Mickens, Brian D. Noble |
Concilium: Collaborative Diagnosis of Broken Overlay Routes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: The 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2007, 25-28 June 2007, Edinburgh, UK, Proceedings, pp. 225-234, 2007, IEEE Computer Society, 0-7695-2855-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Bin Zhang 0007, Ehab Al-Shaer, Radha Jagadeesan, James Riely, Corin Pitcher |
Specifications of a high-level conflict-free firewall policy language for multi-domain networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 12th ACM Symposium on Access Control Models and Technologies, SACMAT 2007, Sophia Antipolis, France, June 20-22, 2007, Proceedings, pp. 185-194, 2007, ACM, 978-1-59593-745-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
firewall, policy language, conflicts free |
17 | Ya-Yunn Su, Mona Attariyan, Jason Flinn |
AutoBash: improving configuration management with operating system causality analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOSP ![In: Proceedings of the 21st ACM Symposium on Operating Systems Principles 2007, SOSP 2007, Stevenson, Washington, USA, October 14-17, 2007, pp. 237-250, 2007, ACM, 978-1-59593-591-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
configuration management, causality, speculative execution |
17 | Jordi Perelló, Eduard Escalona, Salvatore Spadaro, Jaume Comellas, Gabriel Junyent |
Transport Plane Resource Discovery Mechanisms for ASON/GMPLS Meshed Transport Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ONDM ![In: Optical Network Design and Modeling, 11th International IFIP TC6 Conference, ONDM 2007, Athens, Greece, May 29-31, 2007., pp. 221-228, 2007, Springer, 978-3-540-72729-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
LMP, Automatic Resource Discovery, GMPLS |
17 | Wei Zheng, Ricardo Bianchini, Thu D. Nguyen |
Automatic configuration of internet services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroSys ![In: Proceedings of the 2007 EuroSys Conference, Lisbon, Portugal, March 21-23, 2007, pp. 219-229, 2007, ACM, 978-1-59593-636-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
operator mistakes, manageability, configuration, internet services |
17 | Yun Mao, Hani Jamjoom, Shu Tao, Jonathan M. Smith |
Networkmd: topology inference and failure diagnosis in the last mile. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Measurement Conference ![In: Proceedings of the 7th ACM SIGCOMM Internet Measurement Conference, IMC 2007, San Diego, California, USA, October 24-26, 2007, pp. 189-202, 2007, ACM, 978-1-59593-908-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
network topology inference, failure diagnosis |
17 | Pin Ren, John Kristoff, Bruce Gooch |
Visualizing DNS traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 3rd International Workshop on Visualization for Computer Security, VizSEC 2006, Alexandria, VA, USA, November 3, 2006, pp. 23-30, 2006, ACM, 1-59593-549-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
network security visualization, information visualization, domain name system, visual metaphor |
17 | Sophie Y. Qiu, Patrick D. McDaniel, Fabian Monrose, Aviel D. Rubin |
Characterizing Address Use Structure and Stability of Origin Advertisement in Inter-domain Routing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 26-29 June 2006, Cagliari, Sardinia, Italy, pp. 489-496, 2006, IEEE Computer Society, 0-7695-2588-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Josh Karlin, Stephanie Forrest, Jennifer Rexford |
Pretty Good BGP: Improving BGP by Cautiously Adopting Routes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNP ![In: Proceedings of the 14th IEEE International Conference on Network Protocols, ICNP 2006, November 12-15, 2006, Santa Barbara, California, USA, pp. 290-299, 2006, IEEE Computer Society, 1-4244-0593-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Andrew Tjang, Fábio Oliveira, Richard P. Martin, Thu D. Nguyen |
A: an assertion language for distributed systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLOS ![In: Proceedings of the 3rd Workshop on Programming Languages and Operating Systems: Linguistic Support for Modern Operating Systems, PLOS 2006, San Jose, California, USA, October 22, 2006, pp. 8, 2006, ACM, 1-59593-577-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Takeshi Imamura, Michiaki Tatsubori, Yuichi Nakamura 0003, Christopher Giblin |
Web services security configuration in a service-oriented architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW (Special interest tracks and posters) ![In: Proceedings of the 14th international conference on World Wide Web, WWW 2005, Chiba, Japan, May 10-14, 2005 - Special interest tracks and posters, pp. 1120-1121, 2005, ACM, 1-59593-051-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
best practice pattern, security configuration, service-oriented architecture, model-driven architecture, web services security |
17 | Pei-Te Chen, Chi-Sung Laih, Fabien Pouget, Marc Dacier |
Comparative Survey of Local Honeypot Sensors to Assist Network Forensics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SADFE ![In: First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005), 7-10 November 2005, Taipei, Taiwan, pp. 120-134, 2005, IEEE Computer Society, 0-7695-2478-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | M. Sundstron, Lars-Åke Larzon |
High-performance longest prefix matching supporting high-speed incremental updates and guaranteed compression. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 13-17 March 2005, Miami, FL, USA, pp. 1641-1652, 2005, IEEE, 0-7803-8968-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Hazem H. Hamed, Ehab S. Al-Shaer, Will Marrero |
Modeling and Verification of IPSec and VPN Security Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNP ![In: 13th IEEE International Conference on Network Protocols (ICNP 2005), 6-9 November 2005, Boston, MA, USA, pp. 259-278, 2005, IEEE Computer Society, 0-7695-2437-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Paul Rubel, Michael Ihde, Steven A. Harp, Charles N. Payne |
Generating Policies for Defense in Depth. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 21st Annual Computer Security Applications Conference (ACSAC 2005), 5-9 December 2005, Tucson, AZ, USA, pp. 505-514, 2005, IEEE Computer Society, 0-7695-2461-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Vasileios Pappas, Zhiguo Xu, Songwu Lu, Daniel Massey, Andreas Terzis, Lixia Zhang 0001 |
Impact of configuration errors on DNS robustness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 30 - September 3, 2004, Portland, Oregon, USA, pp. 319-330, 2004, ACM, 1-58113-862-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
resiliency, DNS, misconfigurations |
17 | Helen J. Wang, Yih-Chun Hu, Chun Yuan, Zheng Zhang 0001, Yi-Min Wang |
Friends Troubleshooting Network: Towards Privacy-Preserving, Automatic Troubleshooting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPTPS ![In: Peer-to-Peer Systems III, Third International Workshop, IPTPS 2004, La Jolla, CA, USA, February 26-27, 2004, Revised Selected Papers, pp. 184-194, 2004, Springer, 3-540-24252-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Evan Cooke, Michael D. Bailey, Zhuoqing Morley Mao, David Watson 0001, Farnam Jahanian, Danny McPherson |
Toward understanding distributed blackhole placement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WORM ![In: Proceedings of the 2004 ACM Workshop on Rapid Malcode, WORM 2004, Washington, DC, USA, October 29, 2004, pp. 54-64, 2004, ACM Press, 1-58113-970-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
blackhole monitoring, blackhole placement, globally scoped threats, internet motion sensor, network security, computer worms |
17 | Thomas E. Anderson, Scott Shenker, Ion Stoica, David Wetherall |
Design guidelines for robust Internet protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Commun. Rev. ![In: Comput. Commun. Rev. 33(1), pp. 125-130, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Di-Fa Chang, Ramesh Govindan, John S. Heidemann |
An empirical study of router response to large BGP routing table load. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Measurement Workshop ![In: Proceedings of the 2nd ACM SIGCOMM Internet Measurement Workshop, IMW 2002, Marseille, France, November 6-8, 2002, pp. 203-208, 2002, ACM, 1-58113-603-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
17 | Rajesh R. Talpade, Gitae Kim, Sumit Khurana |
NOMAD: Traffic-based Network Monitoring Framework for Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the Fourth IEEE Symposium on Computers and Communications (ISCC 1999), 6-8 July 1999, Sharm El Sheikh, Red Sea, Egypt, pp. 442-452, 1999, IEEE Computer Society, 0-7695-0250-4. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
network performance monitoring, network anomalies, packet delay variance, traffic analysis, flow, time to live (TTL) |