Abstract is missing.
- Power to the people: securing the internet one edge at a timeSoon Hin Khor, Nicolas Christin, Tina Wong, Akihiro Nakao. 89-96 [doi]
- Minimizing collateral damage by proactive surge protectionJerry Chou 0001, Bill Lin, Subhabrata Sen, Oliver Spatscheck. 97-104 [doi]
- Fine-grained capabilities for flooding DDoS defense using client reputationsMaitreya Natu, Jelena Mirkovic. 105-112 [doi]
- Adaptive e-mail intention finding mechanism based on e-mail words social networksChe-Fu Yeh, Ching-Hao Mao, Hahn-Ming Lee, Tsuhan Chen. 113-120 [doi]
- Davis social links: integrating social networks with internet routingLerone Banks, Shaozhi Ye, Yue Huang, Shyhtsun Felix Wu. 121-128 [doi]
- Security against probe-response attacks in collaborative intrusion detectionVitaly Shmatikov, Ming-Hsiu Wang. 129-136 [doi]
- Tracking port scanners on the IP backboneAvinash Sridharan, Tao Ye. 137-144 [doi]
- Extracting hidden anomalies using sketch and non Gaussian multiresolution statistical detection proceduresGuillaume Dewaele, Kensuke Fukuda, Pierre Borgnat, Patrice Abry, Kenjiro Cho. 145-152 [doi]
- Zone state revocation for DNSSECEric Osterweil, Vasileios Pappas, Daniel Massey, Lixia Zhang 0001. 153-160 [doi]