Sign in
SRUTI
2005
2006
2007
2005
2007
Keyphrases
Publications
2007
Aarjav J. Trivedi
,
Paul Judge
,
Sven Krasser
Analyzing Network and Content Characteristics of Spim Using Honeypots.
SRUTI
(2007)
Karim El Defrawy
,
Minas Gjoka
BotTorrent: Misusing BitTorrent to Launch DDoS Attacks.
SRUTI
(2007)
3rd Workshop on Steps to Reducing Unwanted Traffic on the Internet, SRUTI'07, Santa Clara, CA, USA, June 18, 2007
SRUTI
(2007)
Adam Bender
,
Neil Spring
,
Dave Levin
,
Bobby Bhattacharjee
Accountability as a Service.
SRUTI
(2007)
Jian Zhang
,
Phillip A. Porras
,
Johannes Ullrich
A New Service for Increasing the Effectiveness of Network Address Blacklists.
SRUTI
(2007)
Diego Zamboni
,
James Riordan
,
Milton Yates
Boundary Detection and Containment of Local Worm Infections.
SRUTI
(2007)
2006
Xin Liu
,
Xiaowei Yang
,
David Wetherall
,
Thomas E. Anderson
Efficient and Secure Source Authentication with Packet Passports.
SRUTI
(2006)
Yi-Min Wang
,
Doug Beck
,
Jeffrey Wang
,
Chad Verbowski
,
Brad Daniels
Strider Typo-Patrol: Discovery and Analysis of Systematic Typo-Squatting.
SRUTI
(2006)
Anirudh Ramachandran
,
Nick Feamster
,
David Dagon
Revealing Botnet Membership Using DNSBL Counter-Intelligence.
SRUTI
(2006)
Mark Allman
,
Paul Barford
,
Balachander Krishnamurthy
,
Jia Wang
Tracking the Role of Adversaries in Measuring Unwanted Traffic.
SRUTI
(2006)
Richard Clayton
The Rising Tide: DDoS from Defective Designs and Defaults.
SRUTI
(2006)
James R. Binkley
,
Suresh Singh
An Algorithm for Anomaly-based Botnet Detection.
SRUTI
(2006)
Youngsang Shin
,
Minaxi Gupta
,
Rob Henderson
,
Aaron Emigh
Separating Wheat from the Chaff: A Deployable Approach to Counter Spam.
SRUTI
(2006)
Martín Casado
,
Aditya Akella
,
Pei Cao
,
Niels Provos
,
Scott Shenker
Cookies Along Trust-Boundaries (CAT): Accurate and Deployable Flood Protection.
SRUTI
(2006)
Marianne Shaw
Leveraging Good Intentions to Reduce Malicious Network Traffic.
SRUTI
(2006)
2nd Workshop on Steps to Reducing Unwanted Traffic on the Internet, SRUTI'06, San Jose, CA, USA, July 7, 2006
SRUTI
(2006)
2005
Mauro Andreolini
,
Alessandro Bulgarelli
,
Michele Colajanni
,
Francesca Mazzoni
HoneySpam: Honeypots Fighting Spam at the Source.
SRUTI
(2005)
Steps to Reducing Unwanted Traffic on the Internet Workshop, SRUTI'05, Cambridge, MA, USA, July 7, 2005
SRUTI
(2005)
Nick G. Duffield
Stress Testing Traffic to Infer Its Legitimacy.
SRUTI
(2005)
Mark Allman
,
Ethan Blanton
An Architecture for Developing Behavioral History.
SRUTI
(2005)
Cliff C. Zou
,
Don Towsley
,
Weibo Gong
Adaptive Defense Against Various Network Attacks.
SRUTI
(2005)
Adam Greenhalgh
,
Mark Handley
,
Felipe Huici
Using Routing and Tunneling to Combat DoS Attacks.
SRUTI
(2005)
Zhenhai Duan
,
Kartik Gopalan
Push vs. Pull: Implications of Protocol Design on Controlling Unwanted Traffic.
SRUTI
(2005)
Evan Cooke
,
Farnam Jahanian
The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets.
SRUTI
(2005)
Ben Adida
,
Susan Hohenberger
,
Ronald L. Rivest
Lightweight Encryption for Email.
SRUTI
(2005)
Robert Beverly
,
Steven J. Bauer
The Spoofer Project: Inferring the Extent of Internet Source Address Filtering on the Internet.
SRUTI
(2005)
Kuai Xu
,
Zhi-Li Zhang
,
Supratik Bhattacharyya
Reducing Unwanted Traffic in a Backbone Network.
SRUTI
(2005)
Ram Dantu
,
Prakash Kolan
Detecting Spam in VoIP Networks.
SRUTI
(2005)
Jayanthkumar Kannan
,
Lakshminarayanan Subramanian
,
Ion Stoica
,
Randy H. Katz
Analyzing Cooperative Containment of Fast Scanning Worms.
SRUTI
(2005)
Luíz Henrique Gomes
,
Fernando D. O. Castro
,
Virgílio A. F. Almeida
,
Jussara M. Almeida
,
Rodrigo B. Almeida
,
Luís M. A. Bettencourt
Improving Spam Detection Based on Structural Similarity.
SRUTI
(2005)