Abstract is missing.
- Privacy-preserving payload-based correlation for accurate malicious traffic detectionJanak J. Parekh, Ke Wang 0009, Salvatore J. Stolfo. 99-106 [doi]
- A distributed host-based worm detection systemSenthilkumar G. Cheetancheri, John Mark Agosta, Denver Dash, Karl N. Levitt, Jeff Rowe, Eve M. Schooler. 107-113 [doi]
- Towards scalable and robust distributed intrusion alert fusion with good load balancingZhichun Li, Yan Chen, Aaron Beach. 115-122 [doi]
- Exploit hijacking: side effects of smart defensesCostin Raiciu, Mark Handley, David S. Rosenblum. 123-130 [doi]
- Large-scale vulnerability analysisStefan Frei, Martin May, Ulrich Fiedler, Bernhard Plattner. 131-138 [doi]
- Real attacks on virtual networks: Vivaldi out of tuneMohamed Ali Kâafar, Laurent Mathy, Thierry Turletti, Walid Dabbous. 139-146 [doi]
- PRIMED: community-of-interest-based DDoS mitigationPatrick Verkaik, Oliver Spatscheck, Jacobus E. van der Merwe, Alex C. Snoeren. 147-154 [doi]
- Protecting TCP services from denial of service attacksHikmat Farhat. 155-160 [doi]
- Analyzing large DDoS attacks using multiple data sourcesZ. Morley Mao, Vyas Sekar, Oliver Spatscheck, Jacobus E. van der Merwe, Rangarajan Vasudevan. 161-168 [doi]
- Polymorphic worm detection and defense: system design, experimental methodology, and data resourcesJisheng Wang, Ihab Hamadeh, George Kesidis, David J. Miller 0001. 169-176 [doi]
- Resource-aware multi-format network security data storageEvan Cooke, Andrew Myrick, David Rusek, Farnam Jahanian. 177-184 [doi]