Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
9 | Fábio Elias Locatelli, Luciano Paschoal Gaspary, Cristina Melchiors, Samir Lohmann, Fabiane Dillenburg |
Spotting Intrusion Scenarios from Firewall Logs Through a Case-Based Reasoning Approach. |
DSOM |
2004 |
DBLP DOI BibTeX RDF |
|
9 | Gergely Sipos, Péter Kacsuk |
Connecting Condor Pools into Computational Grids by Jini. |
European Across Grids Conference |
2004 |
DBLP DOI BibTeX RDF |
|
9 | Guillem Bernat, Ian Broster, Alan Burns 0001 |
Rewriting History to Exploit Gain Time. |
RTSS |
2004 |
DBLP DOI BibTeX RDF |
|
9 | Karl-André Skevik, Vera Goebel, Thomas Plagemann |
Design of a Hybrid CDN. |
MIPS |
2004 |
DBLP DOI BibTeX RDF |
|
9 | Manhee Lee, Eun Jung Kim 0001, Cheol Won Lee |
A Source Identification Scheme against DDoS Attacks in Cluster Interconnects. |
ICPP Workshops |
2004 |
DBLP DOI BibTeX RDF |
|
9 | Valentina Salapura, Christos J. Georgiou, Indira Nair |
An efficient system-on-a-chip design methodology for networking applications. |
CASES |
2004 |
DBLP DOI BibTeX RDF |
network processor, system-on-a-chip |
9 | Aditya Ganjam, Hui Zhang 0001 |
Connectivity restrictions in overlay multicast. |
NOSSDAV |
2004 |
DBLP DOI BibTeX RDF |
peer-to-peer systems, firewall, overlay multicast, network address translator |
9 | Rodolfo Villarroel, Eduardo Fernández-Medina, Mario Piattini |
Incorporating Security Issues in the Information Systems Design. |
ENC |
2004 |
DBLP DOI BibTeX RDF |
|
9 | Mark Adkins, John Kruse, Robert Younger |
A Language Technology Toolset for Development of a Large Group Augmented Facilitation System. |
HICSS |
2004 |
DBLP DOI BibTeX RDF |
|
9 | Makoto Shizuka, Jianhua Ma 0002, Jeneung Lee, Yoichiro Miyoshi, Katsuhiro Takata |
A P2P Ubiquitous System for Testing Network Programs. |
EUC |
2004 |
DBLP DOI BibTeX RDF |
|
9 | Karl Solchenbach |
From Science to Enterprise - Intel's Grid Activities. |
GCC |
2004 |
DBLP DOI BibTeX RDF |
|
9 | Todd S. Sproull, John W. Lockwood |
Distributed Instrusion Prevention in Active and Extensible Networks. |
IWAN |
2004 |
DBLP DOI BibTeX RDF |
|
9 | Ram Dantu, João W. Cangussu, Arun Yelimeli |
Dynamic Control of Worm Propagation. |
ITCC (1) |
2004 |
DBLP DOI BibTeX RDF |
|
9 | Tim Schattkowsky, Christoph Loeser, Wolfgang Müller 0003 |
Peer-To-Peer Technology for Interconnecting Web Services in Heterogeneous Networks. |
AINA (1) |
2004 |
DBLP DOI BibTeX RDF |
|
9 | Sébastien Lacour, Christian Pérez, Thierry Priol |
A Network Topology Description Model for Grid Application Deployment. |
GRID |
2004 |
DBLP DOI BibTeX RDF |
|
9 | Gordon W. Romney, Brady R. Stevenson |
An isolated, multi-platform network sandbox for teaching IT security system engineers. |
SIGITE Conference |
2004 |
DBLP DOI BibTeX RDF |
collaborative student teaching, security best practices, security laboratory, security system engineer, information technology, information assurance, data privacy, curricula |
9 | Charles Higby, Michael Bailey |
Wireless security patch management system. |
SIGITE Conference |
2004 |
DBLP DOI BibTeX RDF |
security, wireless, configuration, update, worm, patch, virus, administration |
9 | Antoinette Leung, Zhuang Yan, Simon Fong 0001 |
On Designing a Flexible E-Payment System with Fraud Detection Capability. |
CEC |
2004 |
DBLP DOI BibTeX RDF |
|
9 | Luciano Paschoal Gaspary, Cristina Melchiors, Fábio Elias Locatelli, Fabiane Dillenburg |
Identification of Intrustion Scenarios through Classification, Characterization and Analysis of Firewall Events. |
LCN |
2004 |
DBLP DOI BibTeX RDF |
|
9 | Deepa Srinivasan, Wu-chang Feng |
Performance Analysis of Multi-dimensional Packet Classification on Programmable Network Processors. |
LCN |
2004 |
DBLP DOI BibTeX RDF |
|
9 | Joel Sommers, Vinod Yegneswaran, Paul Barford |
A framework for malicious workload generation. |
Internet Measurement Conference |
2004 |
DBLP DOI BibTeX RDF |
traffic generation, network intrusions |
9 | Andy Rupp, Holger Dreger, Anja Feldmann, Robin Sommer |
Packet trace manipulation rramework for test labs. |
Internet Measurement Conference |
2004 |
DBLP DOI BibTeX RDF |
evaluation, network, measurement, network intrusion detection, trace generation |
9 | DongWoo Lee, SeongHoon Lee, Chong-Sun Hwang |
Application of Active Database Abstraction in B2B E-Commerce. |
PDCAT |
2004 |
DBLP DOI BibTeX RDF |
|
9 | Joohan Lee, Steve J. Chapin, Stephen Taylor |
Reliable heterogeneous applications. |
IEEE Trans. Reliab. |
2003 |
DBLP DOI BibTeX RDF |
|
9 | Ian F. Akyildiz, Eylem Ekici, Gaofeng Yue |
A Distributed Multicast Routing Scheme for Multi-Layered Satellite IP Networks. |
Wirel. Networks |
2003 |
DBLP DOI BibTeX RDF |
intrusion response, cooperative detection, mobile ad-hoc networks, intrusion detection, anomaly detection |
9 | Grzegorz J. Nalepa, Antoni Ligeza |
Designing Reliable Web Security Systems Using Rule-Based Systems Approach. |
AWIC |
2003 |
DBLP DOI BibTeX RDF |
|
9 | Gísli Hjálmtýsson, Björn Brynjúlfsson, Ólafur Ragnar Helgason |
Overcoming Last-Hop/First-Hop Problems in IP Multicast. |
Networked Group Communication |
2003 |
DBLP DOI BibTeX RDF |
|
9 | Chunyan Li, Wei Lin, Yongtian Yang |
Packet Filtering Using a Decision Tree Classifier. |
IDEAL |
2003 |
DBLP DOI BibTeX RDF |
|
9 | Ira S. Moskowitz, Richard E. Newman, Daniel P. Crepeau, Allen R. Miller |
Covert channels and anonymizing networks. |
WPES |
2003 |
DBLP DOI BibTeX RDF |
anonymity, information theory, covert channel, MIX |
9 | T. K. Lee, Sherif Yusuf, Wayne Luk, Morris Sloman, Emil Lupu, Naranker Dulay |
Irregular Reconfigurable CAM Structures for Firewall Applications. |
FPL |
2003 |
DBLP DOI BibTeX RDF |
|
9 | Kathia Regina L. Jucá, Azzedine Boukerche, João Bosco M. Sobral, Mirela Sechi Moretti Annoni Notare |
Human Immune Anomaly and Misuse Based Detection for Computer System Operations: PART II. |
IPDPS |
2003 |
DBLP DOI BibTeX RDF |
|
9 | Tim Chown |
IPv6 Initiatives Within the European National Research and Education Networks (NRENs). |
SAINT Workshops |
2003 |
DBLP DOI BibTeX RDF |
|
9 | Andreas Hess 0003, Michael Jung, Günter Schäfer |
FIDRAN: A Flexible Intrusion Detection and Response Framework for Active Networks. |
ISCC |
2003 |
DBLP DOI BibTeX RDF |
|
9 | Lawrence Teo, Gail-Joon Ahn, Yuliang Zheng 0001 |
Dynamic and risk-aware network access management. |
SACMAT |
2003 |
DBLP DOI BibTeX RDF |
risk awareness, network management, role, risk, dynamic access control |
9 | Si Choon Noh, Dong Chun Lee, Kuinam J. Kim |
Improved Structure Management of Gateway Firewall Systems for Effective Networks Security. |
ISCIS |
2003 |
DBLP DOI BibTeX RDF |
|
9 | Xinzhou Qin, Wenke Lee |
Statistical Causality Analysis of INFOSEC Alert Data. |
RAID |
2003 |
DBLP DOI BibTeX RDF |
attack scenario analysis, Intrusion detection, time series analysis, alert correlation |
9 | David P. Gilliam, John D. Powell, Eric Haugh, Matt Bishop |
Addressing Software Security and Mitigations in the Life Cycle. |
SEW |
2003 |
DBLP DOI BibTeX RDF |
|
9 | Gabor Gombás, Zoltán Balaton |
A Flexible Multi-level Grid Monitoring Architecture. |
European Across Grids Conference |
2003 |
DBLP DOI BibTeX RDF |
|
9 | Oleg Lodygensky, Gilles Fedak, Franck Cappello, Vincent Néri, Miron Livny, Douglas Thain |
XtremWeb & Condor sharing resources between Internet connected Condor pools. |
CCGRID |
2003 |
DBLP DOI BibTeX RDF |
|
9 | Gonzalo Álvarez, Slobodan Petrovic |
A Taxonomy of Web Attacks. |
ICWE |
2003 |
DBLP DOI BibTeX RDF |
|
9 | Clint Kreitner |
The Development and Proliferation of Consensus Security Configuration Benchmarks for Systems Connected to the Interne. |
HICSS |
2003 |
DBLP DOI BibTeX RDF |
|
9 | Mason McDaniel, Mohammad Hossain Heydari |
Content Based File Type Detection Algorithms. |
HICSS |
2003 |
DBLP DOI BibTeX RDF |
|
9 | Bernd Podey, Thomas Kessler, Hans-Dietrich Melzer |
Network Packet Filter Design and Performance. |
ICOIN |
2003 |
DBLP DOI BibTeX RDF |
|
9 | Kenneth L. Calvert, Jim Griffioen, Najati Imam, Jiangbo Li |
Challenges in Implementing an ESP Service. |
IWAN |
2003 |
DBLP DOI BibTeX RDF |
|
9 | Tim Chart, Stefan Schmid 0002, Manolis Sifalakis, Andrew Scott 0001 |
Active Routers in Action: Evaluation of the LARA++ Active Router Architecture in a Real-Life Network. |
IWAN |
2003 |
DBLP DOI BibTeX RDF |
|
9 | Mikkel Thorup |
Space efficient dynamic stabbing with fast queries. |
STOC |
2003 |
DBLP DOI BibTeX RDF |
IP packet classification, dynamic stabbing, object oriented method look-up |
9 | Mikito Nakamura, Jianhua Ma 0002, Katsuhiro Chiba, Makoto Shizuka, Yoichiro Miyoshi |
Design and Implementation of a P2P Shared Web Browser Using JXTA. |
AINA |
2003 |
DBLP DOI BibTeX RDF |
shared browser, P2P, awareness, JXTA, group management, Peer, pipe |
9 | Sotiris Ioannidis, Steven M. Bellovin, John Ioannidis, Angelos D. Keromytis, Jonathan M. Smith |
Design and Implementation of Virtual Private Services. |
WETICE |
2003 |
DBLP DOI BibTeX RDF |
|
9 | Jianhua Ma 0002, Makoto Shizuka, Jeneung Lee, Runhe Huang |
A P2P Groupware System with Decentralized Topology for Supporting Synchronous Collaborations. |
CW |
2003 |
DBLP DOI BibTeX RDF |
|
9 | Angelos D. Keromytis, Sotiris Ioannidis, Michael B. Greenwald, Jonathan M. Smith |
The STRONGMAN Architecture. |
DISCEX (1) |
2003 |
DBLP DOI BibTeX RDF |
|
9 | Shambhu J. Upadhyaya |
Real-Time Intrusion Detection with Emphasis on Insider Attacks. |
MMM-ACNS |
2003 |
DBLP DOI BibTeX RDF |
|
9 | George Lawton |
Open Source Security: Opportunity or Oxymoron? |
Computer |
2002 |
DBLP DOI BibTeX RDF |
|
9 | Nong Ye, Syed Masum Emran, Qiang Chen, Sean Vilbert |
Multivariate Statistical Analysis of Audit Trails for Host-Based Intrusion Detection. |
IEEE Trans. Computers |
2002 |
DBLP DOI BibTeX RDF |
multivariate statistical analysis, chi-square test and Hotelling's rm T^2 test, intrusion detection, Computer security |
9 | Danai Patiyoot |
Migration / Evolution of security towards wireless ATM. |
ACM SIGOPS Oper. Syst. Rev. |
2002 |
DBLP DOI BibTeX RDF |
|
9 | John Pikoulas, William J. Buchanan, Mike Mannion, Kostas Triantafyllopoulos |
An Intelligent Agent Security Intrusion System. |
ECBS |
2002 |
DBLP DOI BibTeX RDF |
|
9 | Christopher Krügel, Thomas Toth, Engin Kirda |
Service specific anomaly detection for network intrusion detection. |
SAC |
2002 |
DBLP DOI BibTeX RDF |
anomaly eetection, intrusion eetection, network security |
9 | Neil C. Rowe, Jim Coffman, Yilmaz Degirmenci, Scott Hall, Shong Lee, Clifton Williams |
Automatic removal of advertising from web-page display. |
JCDL |
2002 |
DBLP DOI BibTeX RDF |
information retrieval, World Wide Web, images, information filtering, advertising |
9 | Marcel-Catalin Rosu, Daniela Rosu 0001 |
An evaluation of TCP splice benefits in web proxy servers. |
WWW |
2002 |
DBLP DOI BibTeX RDF |
TCP splice, web proxy |
9 | Simon M. Lucas |
Web-Based Evaluation and Deployment of Pattern Recognizers. |
ICPR (3) |
2002 |
DBLP DOI BibTeX RDF |
|
9 | Young H. Cho, Shiva Navab, William H. Mangione-Smith |
Specialized Hardware for Deep Network Packet Filtering. |
FPL |
2002 |
DBLP DOI BibTeX RDF |
|
9 | Jon Allen, Jeff Wilson |
Securing a wireless network. |
SIGUCCS |
2002 |
DBLP DOI BibTeX RDF |
EAP-LEAP, EAP-MD5, EAP-TLS, EAP-TTLS, VPN, WEP, 802.11i, 802.1x |
9 | Mary Micco, Hart Rossman |
Building a cyberwar lab: lessons learned: teaching cybersecurity principles to undergraduates. |
SIGCSE |
2002 |
DBLP DOI BibTeX RDF |
|
9 | Yunpeng Zhao, Thomas Baudel, Jie Zhou |
Objets graphiques transactionnels: une méthode ouverte pour la création d'applications interactives distribuées synchrones. |
IHM |
2002 |
DBLP DOI BibTeX RDF |
transactional graphic objects, XML, XML, CSCW, groupware, HTML, direct manipulation, distributed graphics |
9 | Stefania Castellani, François Pacull |
XFolders: A Flexible Workflow System Based on Electronic Circulation Folders. |
DEXA Workshops |
2002 |
DBLP DOI BibTeX RDF |
|
9 | Phillip A. Porras, Martin W. Fong, Alfonso Valdes |
A Mission-Impact-Based Approach to INFOSEC Alarm Correlation. |
RAID |
2002 |
DBLP DOI BibTeX RDF |
intrusion report correlation, alert management, alert prioritization, Network security |
9 | Harald Rölle |
A Hot-Failover State Machine for Gateway Services and Its Application to a Linux Firewall. |
DSOM |
2002 |
DBLP DOI BibTeX RDF |
|
9 | Ellen Stokes |
Cool to Critical: Managing Web Services Now. |
DSOM |
2002 |
DBLP DOI BibTeX RDF |
|
9 | Robert van Engelen, Kyle A. Gallivan |
The gSOAP Toolkit for Web Services and Peer-to-Peer Computing Networks. |
CCGRID |
2002 |
DBLP DOI BibTeX RDF |
|
9 | Jonghwan Lee, Yongho Kim, Kyongsok Kim |
Development of Internet Home Server to Control Information Appliances Remotely. |
ICOIN (1) |
2002 |
DBLP DOI BibTeX RDF |
|
9 | Geon Woo Kim 0001, So-Hee Park, Jaehoon Nah, Sung Won Sohn |
Security Policy Deployment in IPsec. |
ICOIN (2) |
2002 |
DBLP DOI BibTeX RDF |
|
9 | Theodosis Dimitrakos, Ivan Djordjevic, Brian Matthews, Juan Bicarregui, Chris I. Phillips 0001 |
Policy-Driven Access Control over a Distributed Firewall Architecture. |
POLICY |
2002 |
DBLP DOI BibTeX RDF |
|
9 | Thomas L. Wolfe, Yih-Chiao Joseph Liu, Hsin-Ping Pat Chang |
Maintaining Remote Services and Resources Over the Internet and Other Networks. |
WETICE |
2002 |
DBLP DOI BibTeX RDF |
|
9 | Adam Wierzbicki, Robert Strzelecki, Daniel Swierczewski, Mariusz Znojek |
Rhubarb: A Tool for Developing Scalable and Secure Peer-to-Peer Applications. |
Peer-to-Peer Computing |
2002 |
DBLP DOI BibTeX RDF |
|
9 | Pankaj K. Garg, Kave Eshghi, Thomas Gschwind, Boudewijn R. Haverkort, Katinka Wolter |
Enabling Network Caching of Dynamic Web Objects. |
Computer Performance Evaluation / TOOLS |
2002 |
DBLP DOI BibTeX RDF |
|
9 | Hai Jin 0001, Feng Xian, Zongfen Han, Shengli Li 0002 |
A Distributed Dynamic µFirewall Architecture with Mobile Agents and KeyNote Trust Management System. |
ICICS |
2002 |
DBLP DOI BibTeX RDF |
|
9 | Ronald W. Ritchey, Brian O'Berry, Steven Noel |
Representing TCP/IP Connectivity For Topological Analysis of Network Security. |
ACSAC |
2002 |
DBLP DOI BibTeX RDF |
|
9 | John Haggerty, Qi Shi 0001, Madjid Merabti |
Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks. |
ACSAC |
2002 |
DBLP DOI BibTeX RDF |
|
9 | Lidong Zhou, Robbert van Renesse, Michael A. Marsh |
Implementing IPv6 as a Peer-to-Peer Overlay Network. |
SRDS |
2002 |
DBLP DOI BibTeX RDF |
|
9 | Keesook J. Han, Ahmed H. Tewfik |
Scalable cryptographic scheme for networked multimedia applications. |
ICIP (3) |
2001 |
DBLP DOI BibTeX RDF |
|
9 | Qiming Chen, Meichun Hsu |
Inter-Enterprise Collaborative Business Process Management. |
ICDE |
2001 |
DBLP DOI BibTeX RDF |
|
9 | Raymond Sinnappan, Scott Hazelhurst |
A Reconfigurable Approach to Packet Filtering. |
FPL |
2001 |
DBLP DOI BibTeX RDF |
|
9 | Florin Baboescu, George Varghese |
Scalable packet classification. |
SIGCOMM |
2001 |
DBLP DOI BibTeX RDF |
Internet |
9 | Lili Qiu, George Varghese, Subhash Suri |
Fast firewall implementations for software-based and hardware-based routers. |
SIGMETRICS/Performance |
2001 |
DBLP DOI BibTeX RDF |
|
9 | Mohamed G. Gouda, Chin-Tser Huang, Anish Arora |
On the Security and Vulnerability of PING. |
WSS |
2001 |
DBLP DOI BibTeX RDF |
|
9 | Daniel F. Sterne, Kelly Djahandari, Brett Wilson, Bill Babson, Dan Schnackenberg, Harley Holliday, Travis Reid |
Autonomic Response to Distributed Denial of Service Attacks. |
Recent Advances in Intrusion Detection |
2001 |
DBLP DOI BibTeX RDF |
|
9 | Nicodemos Damianou, Naranker Dulay, Emil Lupu, Morris Sloman |
The Ponder Policy Specification Language. |
POLICY |
2001 |
DBLP DOI BibTeX RDF |
|
9 | David Barkai |
Technologies for Sharing and Collaborating on the Net. |
Peer-to-Peer Computing |
2001 |
DBLP DOI BibTeX RDF |
|
9 | John W. Lockwood |
Evolvable Internet Hardware Platforms. |
Evolvable Hardware |
2001 |
DBLP DOI BibTeX RDF |
|
9 | Ronald Mraz |
Secure Blue: An Architecture for a Scalable, Reliable, High Volume SSL Internet Server. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
9 | Ross J. Anderson |
Why Information Security is Hard-An Economic Perspective. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
9 | David M. Wheeler, Adam Conyers, Jane Luo, Alex Xiong |
Java Security Extensions for a Java Server in a Hostile Environment. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
9 | King P. Fung, Rocky K. C. Chang |
A Transport-Level Proxy for Secure Multimedia Streams. |
IEEE Internet Comput. |
2000 |
DBLP DOI BibTeX RDF |
|
9 | Mauro César Bernardes, Edson dos Santos Moreira |
Implementation of an Intrusion Detection System Based on Mobile Agents. |
PDSE |
2000 |
DBLP DOI BibTeX RDF |
|
9 | Jun Xu 0014, Mukesh Singhal |
Design of a High-Performance ATM Firewall. |
ACM Trans. Inf. Syst. Secur. |
1999 |
DBLP DOI BibTeX RDF |
asynchronous transfer mode, TCP/IP, firewall, packet filtering, switch architecture |
9 | Luca Cardelli |
Wide Area Computation. |
ICALP |
1999 |
DBLP DOI BibTeX RDF |
|
9 | Venkatachary Srinivasan, Subhash Suri, George Varghese |
Packet Classification Using Tuple Space Search. |
SIGCOMM |
1999 |
DBLP DOI BibTeX RDF |
|
9 | Craig Linn |
A Multi-Agent System for Cooperative Document Indexing and Querying in Distributed Networked Environments. |
ICPP Workshops |
1999 |
DBLP DOI BibTeX RDF |
agent, distributed, index, network computing |
9 | Susan Hinrichs |
Policy-Based Management: Bridging the Gap. |
ACSAC |
1999 |
DBLP DOI BibTeX RDF |
|
9 | Yariv Aridor, Mitsuru Oshima |
Infrastructure for Mobile Agents: Requirements and Design. |
Mobile Agents |
1998 |
DBLP DOI BibTeX RDF |
|
9 | Kelly Djahandari, Daniel F. Sterne |
An MBone Proxy for an Application Gateway Firewall. |
S&P |
1997 |
DBLP DOI BibTeX RDF |
|