The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "LSAD@SIGCOMM"( http://dblp.L3S.de/Venues/LSAD@SIGCOMM )

URL (DBLP): http://dblp.uni-trier.de/db/conf/sigcomm

Publication years (Num. hits)
2006 (12) 2007 (10)
Publication types (Num. hits)
inproceedings(20) proceedings(2)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 22 publication records. Showing 22 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Jerry Chou 0001, Bill Lin 0001, Subhabrata Sen, Oliver Spatscheck Minimizing collateral damage by proactive surge protection. Search on Bibsonomy LSAD@SIGCOMM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Avinash Sridharan, Tao Ye Tracking port scanners on the IP backbone. Search on Bibsonomy LSAD@SIGCOMM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Eric Osterweil, Vasileios Pappas, Daniel Massey, Lixia Zhang 0001 Zone state revocation for DNSSEC. Search on Bibsonomy LSAD@SIGCOMM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Vitaly Shmatikov, Ming-Hsiu Wang Security against probe-response attacks in collaborative intrusion detection. Search on Bibsonomy LSAD@SIGCOMM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Maitreya Natu, Jelena Mirkovic Fine-grained capabilities for flooding DDoS defense using client reputations. Search on Bibsonomy LSAD@SIGCOMM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Soon Hin Khor, Nicolas Christin, Tina Wong, Akihiro Nakao Power to the people: securing the internet one edge at a time. Search on Bibsonomy LSAD@SIGCOMM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Guillaume Dewaele, Kensuke Fukuda, Pierre Borgnat, Patrice Abry, Kenjiro Cho Extracting hidden anomalies using sketch and non Gaussian multiresolution statistical detection procedures. Search on Bibsonomy LSAD@SIGCOMM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Lerone Banks, Shaozhi Ye, Yue Huang, Shyhtsun Felix Wu Davis social links: integrating social networks with internet routing. Search on Bibsonomy LSAD@SIGCOMM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Che-Fu Yeh, Ching-Hao Mao, Hahn-Ming Lee, Tsuhan Chen Adaptive e-mail intention finding mechanism based on e-mail words social networks. Search on Bibsonomy LSAD@SIGCOMM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1 Proceedings of the 2007 Workshop on Large Scale Attack Defense, LSAD '07, Kyoto, Japan, August 27, 2007 Search on Bibsonomy LSAD@SIGCOMM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Stefan Frei, Martin May, Ulrich Fiedler, Bernhard Plattner Large-scale vulnerability analysis. Search on Bibsonomy LSAD@SIGCOMM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Janak J. Parekh, Ke Wang 0009, Salvatore J. Stolfo Privacy-preserving payload-based correlation for accurate malicious traffic detection. Search on Bibsonomy LSAD@SIGCOMM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Evan Cooke, Andrew Myrick, David Rusek, Farnam Jahanian Resource-aware multi-format network security data storage. Search on Bibsonomy LSAD@SIGCOMM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Zhichun Li, Yan Chen, Aaron Beach Towards scalable and robust distributed intrusion alert fusion with good load balancing. Search on Bibsonomy LSAD@SIGCOMM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1 Proceedings of the 2006 SIGCOMM Workshop on Large-Scale Attack Defense, LSAD '06, Pisa, Italy, September 11-15, 2006 Search on Bibsonomy LSAD@SIGCOMM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Costin Raiciu, Mark Handley, David S. Rosenblum Exploit hijacking: side effects of smart defenses. Search on Bibsonomy LSAD@SIGCOMM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Z. Morley Mao, Vyas Sekar, Oliver Spatscheck, Jacobus E. van der Merwe, Rangarajan Vasudevan Analyzing large DDoS attacks using multiple data sources. Search on Bibsonomy LSAD@SIGCOMM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Senthilkumar G. Cheetancheri, John Mark Agosta, Denver Dash, Karl N. Levitt, Jeff Rowe, Eve M. Schooler A distributed host-based worm detection system. Search on Bibsonomy LSAD@SIGCOMM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Hikmat Farhat Protecting TCP services from denial of service attacks. Search on Bibsonomy LSAD@SIGCOMM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Mohamed Ali Kâafar, Laurent Mathy, Thierry Turletti, Walid Dabbous Real attacks on virtual networks: Vivaldi out of tune. Search on Bibsonomy LSAD@SIGCOMM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Jisheng Wang, Ihab Hamadeh, George Kesidis, David J. Miller 0001 Polymorphic worm detection and defense: system design, experimental methodology, and data resources. Search on Bibsonomy LSAD@SIGCOMM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Patrick Verkaik, Oliver Spatscheck, Jacobus E. van der Merwe, Alex C. Snoeren PRIMED: community-of-interest-based DDoS mitigation. Search on Bibsonomy LSAD@SIGCOMM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #22 of 22 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license