Author:
Zand Ali,Houmansadr Amir,Vigna Giovanni,Kemmerer Richard,Kruegel Christopher
Reference42 articles.
1. NetFlow protocol. http://www.manageengine.com/products/netflow/help/cisco-netflow/netflow-ios-versions.html.
2. P. Bahl, P. Barham, R. Black, R. Ch, M. Goldszmidt, R. Isaacs, S. K, L. Li, J. Maccormick, D. A. Maltz, R. Mortier, M. Wawrzoniak, and M. Zhang. Discovering dependencies for network management. In In Proc. V HotNets Workshop, 2006.
3. P. Bahl, R. Chandra, A. Greenberg, S. Kandula, D. A. Maltz, and M. Zhang. Towards highly reliable enterprise network services via inference of multi-level dependencies. SIGCOMM Comput. Commun. Rev., 37, 2007.
4. P. Barford, M. Dacier, T. G. Dietterich, M. Fredrikson, J. Giffin, S. Jajodia, S. Jha, J. Li, P. Liu, P. Ning, X. Ou, D. Song, L. Strater, V. Swarup, G. Tadda, C. Wang, and J. Yen. Cyber SA: Situational Awareness for Cyber Defense. In S. Jajodia, P. Liu, V. Swarup, and C. Wang, editors, Cyber Situational Awareness, Advances in Information Security. Springer US, 2010.
5. L. Bernaille, R. Teixeira, and K. Salamatian. Early application identification. In Proceedings of the 2006 ACM CoNEXT conference, CoNEXT '06, pages 6:1--6:12, New York, NY, USA, 2006. ACM.
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献