The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for firewalls with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1977-1996 (15) 1997-1998 (18) 1999 (17) 2000 (18) 2001 (26) 2002 (39) 2003 (51) 2004 (68) 2005 (69) 2006 (76) 2007 (86) 2008 (70) 2009 (39) 2010 (24) 2011-2012 (26) 2013-2014 (29) 2015 (17) 2016 (18) 2017-2018 (20) 2019 (16) 2020 (16) 2021 (16) 2022-2023 (28) 2024 (1)
Publication types (Num. hits)
article(172) book(9) incollection(14) inproceedings(605) phdthesis(3)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 741 occurrences of 469 keywords

Results
Found 803 publication records. Showing 803 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
9J. Lane Thames, Randal T. Abler, Ashraf Saad Hybrid intelligent systems for network security. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2006 DBLP  DOI  BibTeX  RDF self-organizing map, intrusion detection systems, Bayesian learning, hybrid-intelligent systems
9Ricardo Nabhen, Carlos Maziero Some Experiences in Using Virtual Machines for Teaching Computer Networks. Search on Bibsonomy Education for the 21st Century The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Zahid Anwar, William Yurcik, Ralph E. Johnson, Munawar Hafiz, Roy H. Campbell Multiple design patterns for voice over IP (VoIP) security. Search on Bibsonomy IPCCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9T. Srinivasan 0001, R. Balakrishnan, S. A. Gangadharan, Hayawardh Vijayakumar Supervised Grid-of-Tries: A Novel Framework for Classifier Management. Search on Bibsonomy ICDCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF grid-of-tries, supervised grid-of-tries, routing, Packet classification
9Joaquín García-Alfaro, Sergio Castillo, Jordi Castellà-Roca, Guillermo Navarro 0001, Joan Borrell SMARTCOP - A Smart Card Based Access Control for the Protection of Network Security Components. Search on Bibsonomy OTM Workshops (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Markus Fidler, Jens B. Schmitt On the way to a distributed systems calculus: an end-to-end network calculus with data scaling. Search on Bibsonomy SIGMETRICS/Performance The full citation details ... 2006 DBLP  DOI  BibTeX  RDF network calculus, packetizers, scaling functions
9Ying Zhang 0022, Evan Cooke, Zhuoqing Morley Mao Internet-scale malware mitigation: combining intelligence of the control and data plane. Search on Bibsonomy WORM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF internet motion sensor, routing anomaly, network security, BGP, computer worms
9Bin Fan, Dah-Ming Chiu, John C. S. Lui Stochastic Analysis and File Availability Enhancement for BT-like File Sharing Systems. Search on Bibsonomy IWQoS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Kazimierz Kowalski, Mohsen Beheshti Analysis of Log Files Intersections for Security Enhancement. Search on Bibsonomy ITNG The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Data Mining, Security architectures, Intrusion prevention, Log files
9Zhiyong Liu 0001, Hong Qiao Hidden Markov Model Based Intrusion Detection. Search on Bibsonomy WISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Siv Hilde Houmb, Indrakshi Ray, Indrajit Ray Estimating the Relative Trustworthiness of Information Sources in Security Solution Evaluation. Search on Bibsonomy iTrust The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9James Moscola, Young H. Cho, John W. Lockwood A Scalable Hybrid Regular Expression Pattern Matcher. Search on Bibsonomy FCCM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Salman Baset, Eli Brosh, Vishal Misra, Dan Rubenstein, Henning Schulzrinne Understanding the behavior of TCP for real-time CBR workloads. Search on Bibsonomy CoNEXT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9S. J. Wagh, T. R. Sontakke MRIP: A Heuristic Approach for Packet Classification using Multistage Refinement on IP Packet Header. Search on Bibsonomy ICN/ICONS/MCL The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Arosha K. Bandara, Antonis C. Kakas, Emil C. Lupu, Alessandra Russo Using Argumentation Logic for Firewall Policy Specification and Analysis. Search on Bibsonomy DSOM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Artem Vorobiev, Jun Han 0004 Security Attack Ontology for Web Services. Search on Bibsonomy SKG The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Muthusrinivasan Muthuprasanna, Ke Wei, Suraj Kothari Eliminating SQL Injection Attacks - A Transparent Defense Mechanism. Search on Bibsonomy WSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Manuel Egele, Martin Szydlowski, Engin Kirda, Christopher Krügel Using Static Program Analysis to Aid Intrusion Detection. Search on Bibsonomy DIMVA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Jonathan D. Blower, A. B. Harrison, Keith Haines Styx Grid Services: Lightweight, Easy-to-Use Middleware for Scientific Workflows. Search on Bibsonomy International Conference on Computational Science (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Youngseok Lee 0002, Seongho Shin, Taeck-Geun Kwon Signature-Aware Traffic Monitoring with IPFIX. Search on Bibsonomy APNOMS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF flow and security, signature, traffic measurement, IPFIX
9Karsten Bsufka, Olaf Kroll-Peters, Sahin Albayrak Intelligent Network-Based Early Warning Systems. Search on Bibsonomy CRITIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF multi agent systems, intrusion detection, critical infrastructures, early warning system
9Joaquín García-Alfaro, Sergio Castillo, Jordi Castellà-Roca, Guillermo Navarro 0001, Joan Borrell Protection of Components Based on a Smart-Card Enhanced Security Module. Search on Bibsonomy CRITIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Arunabha Mukhopadhyay, Samir Chatterjee, Debashis Saha, Ambuj Mahanti, Samir K. Sadhukhan e-Risk Management with Insurance: A Framework Using Copula Aided Bayesian Belief Networks. Search on Bibsonomy HICSS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF e-risk, premium, e-commerce, Bayesian Belief Network (BBN), copula, security breach
9DongWoo Lee, SeongHoon Lee, Yongjin Lee ECA Rule Component for Timely Collaboration of Web-Based Distributed Business Systems. Search on Bibsonomy ICCSA (4) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Chun-Hsin Wu, Jiawei Li, Yueh-Ju Chen, Jum-Ping Lin Path-Aware Multicast for Efficient File Distribution in Peer-to-Peer Overlay Networks. Search on Bibsonomy ICOIN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Niklas Steinleitner, Henning Peters, Xiaoming Fu 0001 Implementation and Performance Study of a New NAT/Firewall Signaling Protocol. Search on Bibsonomy ICDCS Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Hao Shi, Yanchun Zhang, Jingyuan Zhang, Elizabeth Beal, Nick Moustakas Collaborative Peer-to-Peer Service for Information Sharing Using JXTA. Search on Bibsonomy IMSCCS (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Pho Duc Giang, Hung Le Xuan, Yonil Zhung, Sungyoung Lee, Young-Koo Lee A Home Firewall Solution for Securing Smart Spaces. Search on Bibsonomy ISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Yung-Li Chang, Hsiang-Kai Liao, Ce-Kuen Shieh, Yu-Ben Miao KaiKai: A NAT Traversal Approach by Using Protocol Behavior Analysis. Search on Bibsonomy IIH-MSP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Christopher S. Oehmen, Douglas J. Baxter, Ryan W. Mooney, Shaun O'Leary, Tim Carlson Bandwidth challenge - High throughput feature-matching analysis of biological spectral data. Search on Bibsonomy SC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Brian O'Higgins Deep packet inspection comes to the desktop. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Gregory J. Conti Googling considered harmful. Search on Bibsonomy NSPW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF privacy, search, anonymity, anonymization, fingerprinting, usable security, Google, googling, information disclosure, AOL
9Jens Mache, Damon Tyman, Andre Pinter, Chris Allick Performance Implications of Using VPN Technology for Cluster Integration and Grid Computing. Search on Bibsonomy ICNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, performance evaluation, grid computing, VPN, hotspot
9A. Anitha, Vaidehi V. Context based Application Level Intrusion Detection System. Search on Bibsonomy ICNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Frank Siegemund, Muhammad Haroon, Goetz Brasche Towards pervasive connectivity in mobile computing settings. Search on Bibsonomy MPAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF peer-to-peer, connectivity, grouping, handheld devices, bar codes
9Rob Sherwood, Neil Spring Touring the internet in a TCP sidecar. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2006 DBLP  DOI  BibTeX  RDF network topology discovery, passenger, record route, sidecar
9Christos Gkantsidis, John L. Miller 0001, Pablo Rodriguez 0001 Comprehensive view of a live network coding P2P system. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2006 DBLP  DOI  BibTeX  RDF NAT issues, secure random chesksums, peer-to-peer, network coding, content distribution
9Ana C. C. Machado, Carlos André Guimarães Ferraz JWSPerf: A Performance Benchmarking Utility with Support to Multiple Web Services Implementations. Search on Bibsonomy AICT/ICIW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Arnaud Simon, Thomas Rischbeck Service Contract Template. Search on Bibsonomy IEEE SCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Florin Baboescu, George Varghese Scalable packet classification. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Robert Schaefer Systems of systems and coordinated atomic actions. Search on Bibsonomy ACM SIGSOFT Softw. Eng. Notes The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Chuanxiong Guo, Haitao Wu, Kun Tan, Qian Zhang 0001, Jingmin Song, Junfeng Zhou, Christian Huitema, Wenwu Zhu 0001 End-system-based mobility support in IPv6. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Peter Kuper The State of Security. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF information security, security technology
9Jorge Herrerías Guerrero, Roberto Gómez Cárdenas An example of communication between security tools: iptables - snort. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Linux
9Ping Yi, YiPing Zhong, Shiyong Zhang A Novel Intrusion Detection Method for Mobile Ad Hoc Networks. Search on Bibsonomy EGC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Andrew W. Moore 0002, Konstantina Papagiannaki Toward the Accurate Identification of Network Applications. Search on Bibsonomy PAM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Diana Senn, David A. Basin, Germano Caronni Firewall Conformance Testing. Search on Bibsonomy TestCom The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Haidong Xia, Jayashree Kanchana, José Carlos Brustoloni Using Secure Coprocessors to Protect Access to Enterprise Networks. Search on Bibsonomy NETWORKING The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Lorrie Faith Cranor Towards usable Web privacy and security. Search on Bibsonomy WWW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Robert F. Erbacher, Kim Christensen, Amanda Sundberg Designing Visualization Capabilities for IDS Challenges. Search on Bibsonomy VizSEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Visualization, Intrusion Detection, Graphical User Interfaces
9Christopher P. Lee 0001, Jason Trost, Nicholas Gibbs, Raheem A. Beyah, John A. Copeland Visual Firewall: Real-time Network Security Monito. Search on Bibsonomy VizSEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF firewall configuration, snort monitoring, user interfaces, information visualization, Network security
9Eric C. K. Poh, Hong Tat Ewe IPv6 Packet Classification Based on Flow Label, Source and Destination Addresses. Search on Bibsonomy ICITA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Bruce D. Caulkins, Joohan Lee, Morgan C. Wang A dynamic data mining technique for intrusion detection systems. Search on Bibsonomy ACM Southeast Regional Conference (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF signature detection, data mining, decision tree, anomaly detection, data modeling, intrusion detection system
9Sasu Tarkoma, Jaakko Kangasharju Filter Merging for Efficient Information Dissemination. Search on Bibsonomy OTM Conferences (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Distributed event-based computing, publish/subscribe
9Ramy Bebawy, Hesham Sabry, Sherif El-Kassas, Youssef Hanna, Youssef Youssef Nedgty: Web Services Firewall. Search on Bibsonomy ICWS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Brien G. Muller, Mark A. Bauer Is your resNet support boat sinking?: try outsourcing! Search on Bibsonomy SIGUCCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF outsource, support, students, resNet
9Jarogniew Rykowski Active Advertisement in Supermarkets Using Personal Agents. Search on Bibsonomy I3E The full citation details ... 2005 DBLP  DOI  BibTeX  RDF personalization, RFID, Software agents, targeted marketing
9Michael Ruth, Feng Lin, Shengru Tu Adapting Single-Request/Multiple-Response Messaging to Web Services. Search on Bibsonomy COMPSAC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF request-response, clearinghouse, Web service, design pattern, correlation, WSDL, callback
9Everett Anderson, Kevin Eustice, Shane Markstrum, Mark H. Hansen, Peter L. Reiher Mobile Contagion: Simulation of Infection and Defense. Search on Bibsonomy PADS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Min Wook Kil, Seung Kyeom Kim, Geuk Lee, Youngmi Kwon A Development of Intrusion Detection and Protection System Using Netfilter Framework. Search on Bibsonomy RSFDGrC (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Michel Abdalla, Olivier Chevassut, Pierre-Alain Fouque, David Pointcheval A Simple Threshold Authenticated Key Exchange from Short Secrets. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Threshold Protocols, Password-based Authentication
9Ping Yi, Yichuan Jiang, YiPing Zhong, Shiyong Zhang Distributed Intrusion Detection for Mobile Ad Hoc Networks. Search on Bibsonomy SAINT Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Peter Bieringer Status of IPv6 (Information and Workshop). Search on Bibsonomy SAINT Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Rong-Tai Liu, Chia-Nan Kao, Hung-Shen Wu, Ming-Chang Shih, Nen-Fu Huang FTSE: The FNP-Like TCAM Searching Engine. Search on Bibsonomy ISCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Junfeng Tian, Min Peng, Yuling Liu A New Active DDoS Defense System Based on Automatic Learning. Search on Bibsonomy ASIAN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF active defense, neural network, statistical analysis, DDoS, traffic monitoring
9Ke Wang 0009, Gabriela F. Cretu, Salvatore J. Stolfo Anomalous Payload-Based Worm Detection and Signature Generation. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Wenjie Wang 0006, Cheng Jin 0009, Sugih Jamin Network overlay construction under limited end-to-end reachability. Search on Bibsonomy INFOCOM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Hannes Tschofenig, Andrei V. Gurtov, Jukka Ylitalo, Aarthi Nagarajan, Murugaraj Shanmugam Traversing Middleboxes with the Host Identity Protocol. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Chi-Fai Wong, Wai-Lam Fung, Jack T. Chi-Fai, S.-H. Gary Chan TCP Streaming for Low-DelayWireless Video. Search on Bibsonomy QSHINE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9V. Krishna Nandivada, Jens Palsberg Timing Analysis of TCP Servers for Surviving Denial-of-Service Attacks. Search on Bibsonomy IEEE Real-Time and Embedded Technology and Applications Symposium The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Pawel Jurczyk, Maciej Golenia, Maciej Malawski, Dawid Kurzyniec, Marian Bubak, Vaidy S. Sunderam Enabling Remote Method Invocations in Peer-to-Peer Environments: RMIX over JXTA. Search on Bibsonomy PPAM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Hai Jin 0001, Zhiling Yang, Jianhua Sun 0002, Xuping Tu, Zongfen Han CIPS: Coordinated Intrusion Prevention System. Search on Bibsonomy ICOIN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Xugang Wang, Qianni Deng VIP: A P2P Communication Platform for NAT Traversal. Search on Bibsonomy ISPA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Xin Li, Zhenzhou Ji, Ming-Zeng Hu Stateful Inspection Firewall Session Table Processing. Search on Bibsonomy ITCC (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Bruce D. Caulkins, Joohan Lee, Morgan C. Wang Packet- vs. Session-Based Modeling for Intrusion Detection Systems. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Maurício O. Tsugawa, Andréa M. Matsunaga, Liping Zhu, Vivekananthan Sanjeepan, Herman Lam, Renato J. O. Figueiredo, José A. B. Fortes In-VIGO virtual networks and virtual application services: automated grid-enabling and deployment of applications. Search on Bibsonomy HPDC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Willy Susilo, Russell James Ang, Cameron Allen George McDonald, Jianyong Huang Personal Firewall for Pocket PC 2003: Design & Implementation. Search on Bibsonomy AINA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Bo Xu 0018, Dongyi Jiang, Jun Li 0003 HSM: A Fast Packet Classification Algorithm. Search on Bibsonomy AINA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Ram Dantu, João W. Cangussu An Architecture for Network Security Using Feedback Control. Search on Bibsonomy ISI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Jefferson Tan, David Abramson 0001, Colin Enticott Bridging organizational network boundaries on the grid. Search on Bibsonomy GRID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Yuuki Horita, Kenjiro Taura, Takashi Chikayama A scalable and efficient self-organizing failure detector for grid applications. Search on Bibsonomy GRID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Yaxuan Qi, Bo Xu 0018, Jun Li 0003 Performance Evaluation and Improvement of Algorithmic Approaches for Packet Classification. Search on Bibsonomy ICAS/ICNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Xin Li, Zhenzhou Ji, Mingzeng Hu Session Table Architecture for Defending SYN Flood Attack. Search on Bibsonomy ICICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Paul Rubel, Michael Ihde, Steven A. Harp, Charles N. Payne Generating Policies for Defense in Depth. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Kwong Yuen Lai, Thi Khoi Anh Phan, Zahir Tari Efficient SOAP Binding for Mobile Web Services. Search on Bibsonomy LCN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Jianwei Liao 0001, Hongbin Cai, Pandeng Jiang, Meirong Chen Design and Implementation of Grid Monitoring System Based on GMA. Search on Bibsonomy PDCAT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Huan-Yun Wei, Shih-Chiang Tsao, Ying-Dar Jason Lin Assessing and Improving TCP Rate Shaping over Edge Gateways. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2004 DBLP  DOI  BibTeX  RDF rate enforcement, ACK-pacing, scheduling, TCP, testbed, packet scheduler, queuing, Bandwidth management, window-sizing
9John G. Levine, Julian B. Grizzard, Henry L. Owen Using Honeynets to Protect Large Enterprise Networks. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF firewall, honeypot, honeynet
9Conan C. Albrecht How clean is the future of SOAP? Search on Bibsonomy Commun. ACM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Haidong Xia, José Carlos Brustoloni Detecting and Blocking Unauthorized Access in Wi-Fi Networks. Search on Bibsonomy NETWORKING The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Mikko Alutoin, Pertti Raatikainen Diagonal Tuple Space Search in Two Dimensions. Search on Bibsonomy NETWORKING The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Andreas Pilz "Policy-Maker": a toolkit for policy-based security management. Search on Bibsonomy NOMS (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Hari Balakrishnan, Karthik Lakshminarayanan, Sylvia Ratnasamy, Scott Shenker, Ion Stoica, Michael Walfish A layered naming architecture for the internet. Search on Bibsonomy SIGCOMM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF global identifiers, distributed hash tables, naming, internet architecture, name resolution, middleboxes
9Michael Haungs, Raju Pandey, Earl T. Barr Handling Catastrophic Failures in Scalable Internet Applications. Search on Bibsonomy SAINT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Haoyu Song 0001, Jing Lu, John W. Lockwood, James Moscola Secure Remote Control of Field-programmable Network Devices. Search on Bibsonomy FCCM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Young H. Cho, William H. Mangione-Smith Deep Packet Filter with Dedicated Logic and Read Only Memories. Search on Bibsonomy FCCM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Christopher R. Clark, David E. Schimmel Scalable Pattern Matching for High Speed Networks. Search on Bibsonomy FCCM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Andrew H. Sung, Srinivas Mukkamala The Feature Selection and Intrusion Detection Problems. Search on Bibsonomy ASIAN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Rui Costa Cardoso, Mário M. Freire Intelligent Assessment of Distributed Security in TCP/IP Networks. Search on Bibsonomy HSNMC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Vinod Yegneswaran, Paul Barford, David Plonka On the Design and Use of Internet Sinks for Network Abuse Monitoring. Search on Bibsonomy RAID The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Deception Systems, Intrusion Detection, Honeypots
Displaying result #601 - #700 of 803 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license