The Gh 0 st in the Shell : Network Security in the Himalayas
暂无分享,去创建一个
Matthias Vallentin | Yahel Ben-David | Yahel Ben-David | Matthias Vallentin | Jon Whiteaker | John M Whiteaker | Yahel Ben-David | John M. Whiteaker
[1] Robert N. M. Watson,et al. Ignoring the Great Firewall of China , 2006, Privacy Enhancing Technologies.
[2] Niels Provos,et al. All Your iFRAMEs Point to Us , 2008, USENIX Security Symposium.
[3] Zhuoqing Morley Mao,et al. Toward understanding distributed blackhole placement , 2004, WORM '04.
[4] Vinod Yegneswaran,et al. Internet intrusions: global characteristics and prevalence , 2003, SIGMETRICS '03.
[5] Vern Paxson,et al. Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.
[6] Vern Paxson,et al. Detecting Forged TCP Reset Packets , 2009, NDSS.
[7] Somesh Jha,et al. Global Intrusion Detection in the DOMINO Overlay System , 2004, NDSS.
[8] Anja Feldmann,et al. Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection , 2006, USENIX Security Symposium.
[9] Michael E. Lesk,et al. The New Front Line: Estonia under Cyberassault , 2007, IEEE Security & Privacy.
[10] Ross J. Anderson,et al. The snooping dragon: social-malware surveillance of the Tibetan movement , 2009 .
[11] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .