Information Technology Reference
In-Depth Information
24. Mankin, A., Massey, D., Wu, C.L., Wu, S.F., and Zhang, L.: On design and
evaluation of “intention-driven” ICMP traceback. In Proc. IEEE International
Conference on Computer Communications and Networks (Oct 2001)
25. Manku, G.S., Rajagopalan, S., and Lindsay, B.G.: Approximate medians and other
quantiles in one pass and with limited memory. In Proc. of the ACM Intl Conf.
on Management of Data . SIGMOD (Jun 1998)
26. Manku, G.S., Rajagopalan, S., and Lindsay, B.G.: Random sampling techniques
for space ecient online computation of order statistics of large datasets. In Proc.
of the ACM Intl Conf. on Management of Data . SIGMOD (Jun 1999)
27. Mitchell, A. and Vigna, G.: Mnemosyne: Designing and implementing network
short-term memory. In International Conference on Engineering of Complex Com-
puter Systems . IEEE (Dec 2002)
28. Motwani, R., Widom, J., Arasu, A., Babcock, B., Babu, S., Datar, M., Manku, G.,
Olston, C., Rosenstein, J., and Varma, R.: Query processing, resource management,
and approximation in a data stream management system. In Proc. of the 2003
Conference on Innovative Data Systems Research (CIDR) (Jan 2003)
29. Paxson, V.: Bro: A system for detecting network intruders in real-time. 7th Annual
USENIX Security Symposium (January 1998)
30. Porras, P.A. and Peter G. Neumann: Emerald: Event monitoring enabling re-
sponses to anomalous live disturbances. In Proceedings of the National Information
Systems Security Conference (1997)
31. Ptacek, T.H. and Newsham, T.N.: Insertion, evasion, and denial of service: Eluding
network intrusion detection. Secure Networks, Inc. (January 1998)
32. Roberts, P.: Nai goes forensic with infinistream. In InfoWorld ,
http://www.infoworld.com/article/03/02/10/HNnai 1.html (Feb 2003)
33. Savage, S., Wetherall, D., Karlin, A., and Anderson, T.: Practical network sup-
port for IP traceback. In Proceedings of the 2000 ACM SIGCOMM Conference ,
Stockholm, Sweden (Aug 2000) 295-306
34. Shanmugasundaram, K., Memon, N., Savant, A., and Bronnimann, H.: E-
cient monitoring and storage of payloads for network forensics. In Unpublished
Manuscript (May 2003)
35. Shanmugasundaram, K., Memon, N., Savant, A., and Bronnimann, H.: Fornet: A
distributed forensics system. In Unpublished Manuscript (May 2003)
36. Snoeren, A.C., Partridge, C., Sanchez, L.A., Jones, C.E., Tchakountio, F.,
Kent, S.T., and Strayer, W.T.: Hash-based IP traceback. In ACM SIGCOMM ,
San Diego, California, USA (August 2001)
37. Song, D. and Perrig, A.: Advanced and authenticated marking schemes for IP
traceback. In IEEE Infocomm (2001)
38. Thaper, U., Guha, S., Indyk, P., and Koudas, N.: Dynamic multidimensional
histograms. In Proc. ACM Int. Symp. on Management of Data . SIGMOD (2002)
39. Winter, R. and Auerbach, K.: The big time: 1998 winter vldb survey. Database
Programming Design (August 1998)
40. Yasinsac, A. and Manzano, Y.: Policies to enhance computer and network foren-
sics. In Workshop on Information Assurance and Security , United States Military
Academy, West Point, NY, IEEE (Jun 2001)
 
Search WWH ::




Custom Search