Author:
Anagnostakis Kostas G.,Greenwald Michael B.,Ioannidis Sotiris,Keromytis Angelos D.
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Safety, Risk, Reliability and Quality,Information Systems,Software
Reference89 articles.
1. Allman, M., Blanton, E., Paxson, V.: An architecture for developing behavioral history. In: Proceedings of the 8th Information Security Conference (ISC) (2005)
2. Anagnostakis, K., Sidiroglou, S., Akritidis, P., Xinidis, K., Markatos, E., Keromytis, A.D.: Detecting targetted attacks using shadow honeypots. In: Proceedings of the 14th USENIX Security Symposium, pp. 129–144 (2005)
3. Anagnostakis, K.G., Greenwald, M.B., Ioannidis, S., Keromytis, A.D., Li, D.: A cooperative immunization system for an untrusting Internet. In: Proceedings of the 11th IEEE Internation Conference on Networking (ICON), pp. 403–408 (2003)
4. Anagnostakis, K.G., Greenwald, M.B., Ioannidis, S., Miltchev, S.: Open packet monitoring on FLAME: safety, performance and applications. In: Proceedings of the 4th International working conference on active networks (2002)
5. Antonatos, S., Akritidis, P., Markatos, E.P., Anagnostakis, K.G.: Defending against hitlist worms using network address space randomization. In: Proceedings of the ACM workshop on rapid malcode (WORM), pp. 30–40 (2005)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献