NeTS—FIND: Enabling Defense and Deterrence through Private Attribution
暂无分享,去创建一个
Amin Vahdat | Stefan Savage | Alex C. Snoeren | Yoshi Kohno | S. Savage | Amin Vahdat | A. Snoeren | Yoshi Kohno
[1] Amin Vahdat,et al. Detour: a Case for Informed Internet Routing and Transport , 2007 .
[2] Tal Garfinkel,et al. SANE: A Protection Architecture for Enterprise Networks , 2006, USENIX Security Symposium.
[3] Brent Waters,et al. Compact Group Signatures Without Random Oracles , 2006, EUROCRYPT.
[4] The costs and limits of availability for replicated services , 2001, TOCS.
[5] Stefan Savage,et al. Inferring Internet denial-of-service activity , 2001, TOCS.
[6] Patrick D. McDaniel,et al. Enterprise Security: A Community of Interest Based Approach , 2006, NDSS.
[7] Stefan Savage,et al. Self-stopping worms , 2005, WORM '05.
[8] Michael Vrable,et al. Scalability, fidelity, and containment in the potemkin virtual honeyfarm , 2005, SOSP '05.
[9] Xiaowei Yang,et al. A DoS-limiting network architecture , 2005, SIGCOMM '05.
[10] Mark Allman,et al. An Architecture for Developing Behavioral History , 2005, SRUTI.
[11] Stefan Savage,et al. Fatih: detecting and isolating malicious routers , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).
[12] Srikanth Kandula,et al. Botz-4-sale: surviving organized DDoS attacks that mimic flash crowds , 2005, NSDI.
[13] T. Kohno,et al. Remote physical device fingerprinting , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[14] Patrick D. McDaniel,et al. Analysis of Communities of Interest in Data Networks , 2005, PAM.
[15] Mihir Bellare,et al. Foundations of Group Signatures: The Case of Dynamic Groups , 2005, CT-RSA.
[16] George Varghese,et al. Automated Worm Fingerprinting , 2004, OSDI.
[17] A. Snoeren,et al. A system for authenticated policy-compliant routing , 2004, SIGCOMM '04.
[18] Hovav Shacham,et al. Short Group Signatures , 2004, CRYPTO.
[19] Jan Camenisch,et al. Signature Schemes and Anonymous Credentials from Bilinear Maps , 2004, CRYPTO.
[20] Stefan Savage,et al. Monkey See, Monkey Do: A Tool for TCP Tracing and Replaying , 2004, USENIX ATC, General Track.
[21] Stefan Savage,et al. Total Recall: System Support for Automated Availability Management , 2004, NSDI.
[22] Alex C. Snoeren,et al. Decoupling policy from mechanism in Internet routing , 2004, Comput. Commun. Rev..
[23] David Wetherall,et al. Preventing Internet denial-of-service with capabilities , 2004, Comput. Commun. Rev..
[24] Hari Balakrishnan,et al. Best-path vs. multi-path overlay routing , 2003, IMC '03.
[25] Renata Teixeira,et al. In search of path diversity in ISP networks , 2003, IMC '03.
[26] Amin Vahdat,et al. Toward scaling network emulation using topology partitioning , 2003, 11th IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer Telecommunications Systems, 2003. MASCOTS 2003..
[27] Amin Vahdat,et al. SHARP: an architecture for secure resource peering , 2003, SOSP '03.
[28] Amin Vahdat,et al. Bullet: high bandwidth data dissemination using an overlay mesh , 2003, SOSP '03.
[29] George Varghese,et al. Automatically inferring patterns of resource consumption in network traffic , 2003, SIGCOMM '03.
[30] Stefan Savage,et al. 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.
[31] Kang G. Shin,et al. Evolution of the Internet QoS and support for soft real-time applications , 2003, Proc. IEEE.
[32] David Moore,et al. Internet quarantine: requirements for containing self-propagating code , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[33] Stefan Savage,et al. Inside the Slammer Worm , 2003, IEEE Secur. Priv..
[34] Theodore Johnson,et al. Gigascope: a stream database for network applications , 2003, SIGMOD '03.
[35] Stefan Savage,et al. The Phoenix Recovery System: Rebuilding from the Ashes of an Internet Catastrophe , 2003, HotOS.
[36] Mihir Bellare,et al. Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions , 2003, EUROCRYPT.
[37] John Langford,et al. CAPTCHA: Using Hard AI Problems for Security , 2003, EUROCRYPT.
[38] Amin Vahdat,et al. Using Random Subsets to Build Scalable Network Services , 2003, USENIX Symposium on Internet Technologies and Systems.
[39] David G. Andersen,et al. Proceedings of Usits '03: 4th Usenix Symposium on Internet Technologies and Systems Mayday: Distributed Filtering for Internet Services , 2022 .
[40] Know your enemy , 2003, Nature Reviews Cancer.
[41] Amin Vahdat,et al. Bootstrapping a Distributed Computational Economy with Peer-to-Peer Bartering , 2003 .
[42] Stefan Savage,et al. Understanding Availability , 2003, IPTPS.
[43] Craig Partridge,et al. Single-packet IP traceback , 2002, TNET.
[44] Stefan Savage,et al. Measuring packet reordering , 2002, IMW '02.
[45] Amin Vahdat,et al. Opus: an overlay peer utility service , 2002, 2002 IEEE Open Architectures and Network Programming Proceedings. OPENARCH 2002 (Cat. No.02EX571).
[46] Amin Vahdat,et al. Minimal replication cost for availability , 2002, PODC '02.
[47] Dejan Kostic,et al. Scalability and accuracy in a large-scale network emulator , 2002, CCRV.
[48] Amin Vahdat,et al. Self-Organizing Subsets: From Each According to His Abilities, to Each According to His Needs , 2002, IPTPS.
[49] Vishal Malik,et al. Distributed intrusion detection system , 2002 .
[50] D. Andersen,et al. Resilient overlay networks , 2002, CCRV.
[51] Steven M. Bellovin,et al. Implementing Pushback: Router-Based Defense Against DDoS Attacks , 2002, NDSS.
[52] Stefan Savage,et al. Robust congestion signaling , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[53] Alex C. Snoeren,et al. Mesh-based content routing using XML , 2001, SOSP.
[54] Christine E. Jones,et al. Hash-based IP traceback , 2001, SIGCOMM '01.
[55] Craig Partridge,et al. Hardware support for a hash-based IP traceback , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[56] Anna R. Karlin,et al. Network support for IP traceback , 2001, TNET.
[57] Amin Vahdat,et al. Combining generality and practicality in a conit-based continuous consistency model for wide-area replication , 2001, Proceedings 21st International Conference on Distributed Computing Systems.
[58] Stefan Savage,et al. Alpine: A User-Level Infrastructure for Network Protocol Development , 2001, USITS.
[59] Amin Vahdat,et al. Transcoding characteristics of Web images , 2000, IS&T/SPIE Electronic Imaging.
[60] Amin Vahdat,et al. Application-level differentiated multimedia Web services using quality aware transcoding , 2000, IEEE Journal on Selected Areas in Communications.
[61] Amin Vahdat,et al. Efficient Numerical Error Bounding for Replicated Network Services , 2000, VLDB.
[62] Craig Partridge,et al. FIRE: flexible Intra-AS routing environment , 2000, IEEE J. Sel. Areas Commun..
[63] Anna R. Karlin,et al. Practical network support for IP traceback , 2000, SIGCOMM.
[64] Yin Zhang,et al. Detecting Stepping Stones , 2000, USENIX Security Symposium.
[65] Amin Vahdat,et al. Managing the storage and battery resources in an image capture device (digital camera) using dynamic transcoding , 2000, WOWMOM '00.
[66] Amin Vahdat,et al. Building replicated Internet services using TACT: a toolkit for tunable availability and consistency tradeoffs , 2000, Proceedings Second International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems. WECWIS 2000.
[67] Amin Vahdat,et al. Differentiated multimedia Web services using quality aware transcoding , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[68] Stefan Savage,et al. Modeling TCP latency , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[69] Amit Aggarwal,et al. Understanding the performance of TCP pacing , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[70] David R. Cheriton,et al. TRIAD: A Scalable Deployable NAT-based Internet Architecture , 2000 .
[71] Alex C. Snoeren,et al. Adaptive inverse multiplexing for wide-area wireless networks , 1999, Seamless Interconnection for Universal Services. Global Telecommunications Conference. GLOBECOM'99. (Cat. No.99CH37042).
[72] Stefan Savage,et al. Sting: A TCP-based Network Measurement Tool , 1999, USENIX Symposium on Internet Technologies and Systems.
[73] Stefan Savage,et al. TCP congestion control with a misbehaving receiver , 1999, CCRV.
[74] Stefan Savage,et al. The end-to-end effects of Internet path selection , 1999, SIGCOMM '99.
[75] Amin Vahdat,et al. Multimedia Web services for mobile clients using quality aware transcoding , 1999, WOWMOM '99.
[76] Xipeng Xiao,et al. Internet QoS: a big picture , 1999, IEEE Netw..
[77] Paul Ferguson,et al. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing , 1998, RFC.
[78] David Chaum,et al. Group Signatures , 1991, EUROCRYPT.