Experimental Validation of Architectural Solutions
暂无分享,去创建一个
Paulo Veríssimo | Susanna Donatelli | Vincent Nicomette | Mohamed Kaâniche | Eric Alata | Nuno Neves | João Antunes
[1] Dave Aitel,et al. The Shellcoder's Handbook: Discovering and Exploiting Security Holes , 2004 .
[2] Olivier Bonaventure,et al. The HoneyTank: a scalable approach to collect malicious internet traffic , 2008, Int. J. Crit. Infrastructures.
[3] Mark R. Crispin. Internet Message Access Protocol - Version 4rev1 , 1996, RFC.
[4] Chen-Nee Chuah,et al. Characterization of Failures in an Operational IP Backbone Network , 2008, IEEE/ACM Transactions on Networking.
[5] Farnam Jahanian,et al. The Internet Motion Sensor - A Distributed Blackhole Monitoring System , 2005, NDSS.
[6] David R. Karger,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.
[7] Vishal Malik,et al. Distributed intrusion detection system , 2002 .
[8] Van-Hau Pham,et al. on the Advantages of Deploying a Large Scale Distributed Honeypot Platform , 2005 .
[9] Geert Deconinck,et al. Architecture, Services and Protocols for CRUTIAL , 2009 .
[10] Niels Provos,et al. A Virtual Honeypot Framework , 2004, USENIX Security Symposium.
[11] Miguel Correia,et al. Intrusion-Tolerant Architectures: Concepts and Design , 2002, WADS.
[12] Krishna P. Gummadi,et al. Improving the Reliability of Internet Paths with One-hop Source Routing , 2004, OSDI.
[13] L. Spitzner,et al. Honeypots: Tracking Hackers , 2002 .
[14] Richard Luczak,et al. The PAPI Cross-Platform Interface to Hardware Performance Counters , 2001 .
[15] Geert Deconinck,et al. FOSeL: Filtering by Helping an Overlay Security Layer to Mitigate DoS Attacks , 2008, 2008 Seventh IEEE International Symposium on Network Computing and Applications.
[16] Andrew A. Chien,et al. Tolerating denial-of-service attacks using overlay networks: impact of topology , 2003, SSRS '03.
[17] Fred B. Schneider,et al. Implementing trustworthy services using replicated state machines , 2005, IEEE Security & Privacy Magazine.
[18] Paul V. Mockapetris,et al. Domain names - implementation and specification , 1987, RFC.
[19] Alex C. Snoeren,et al. Mesh-based content routing using XML , 2001, SOSP.
[20] Stephen T. Kent,et al. IP Authentication Header , 1995, RFC.
[21] Zhuoqing Morley Mao,et al. Toward understanding distributed blackhole placement , 2004, WORM '04.
[22] Chen-Nee Chuah,et al. On the analysis of overlay failure detection and recovery , 2007, Comput. Networks.
[23] David L. Mills,et al. Network Time Protocol (NTP) , 1985, RFC.
[24] D. Hoffman,et al. The special needs of SCADA/PCN firewalls: architectures and test results , 2005, 2005 IEEE Conference on Emerging Technologies and Factory Automation.
[25] Paulo Veríssimo,et al. Distributed Systems for System Architects , 2001, Advances in Distributed Computing and Middleware.
[26] Miguel Correia,et al. Using Attack Injection to Discover New Vulnerabilities , 2006, International Conference on Dependable Systems and Networks (DSN'06).
[27] Stefan Savage,et al. Inferring Internet denial-of-service activity , 2001, TOCS.
[28] John Gilmore,et al. Bootstrap Protocol , 1985, RFC.
[29] Miguel Correia,et al. The Middleware Architecture of MAFTIA: A Blueprint , 2000 .
[30] Michael Dahlin,et al. End-to-end WAN service availability , 2001, TNET.
[31] Mark R. Crispin,et al. Internet Message Access Protocol - Version 4 , 1994, RFC.
[32] Paulo Veríssimo,et al. Intrusion-tolerant middleware: the road to automatic security , 2006, IEEE Security & Privacy.
[33] Philippe Owezarski,et al. Internet attacks monitoring with dynamic connection redirection mechanisms , 2007, Journal in Computer Virology.
[34] Hari Balakrishnan,et al. Best-path vs. multi-path overlay routing , 2003, IMC '03.
[35] Hassan Artail,et al. A hybrid honeypot framework for improving intrusion detection systems in protecting organizational networks , 2006, Comput. Secur..
[36] Hari Balakrishnan,et al. Resilient overlay networks , 2001, SOSP.
[37] Paulo Veríssimo,et al. Travelling through wormholes: a new look at distributed systems models , 2006, SIGA.
[38] Jonathan Kirsch,et al. Scaling Byzantine Fault-Tolerant Replication toWide Area Networks , 2006, International Conference on Dependable Systems and Networks (DSN'06).