Cited By
View all- Amann JSommer RSharma AHall S(2012)A lone wolf no moreProceedings of the 15th international conference on Research in Attacks, Intrusions, and Defenses10.1007/978-3-642-33338-5_16(314-333)Online publication date: 12-Sep-2012
- Sekar VKrishnaswamy RGupta AReiter Mde Oliveira JOtt MGriffin TMedard M(2010)Network-wide deployment of intrusion detection and prevention systemsProceedings of the 6th International COnference10.1145/1921168.1921192(1-12)Online publication date: 30-Nov-2010
- Maier GSommer RDreger HFeldmann APaxson VSchneider FBahl VWetherall DSavage SStoica I(2008)Enriching network security analysis with time travelProceedings of the ACM SIGCOMM 2008 conference on Data communication10.1145/1402958.1402980(183-194)Online publication date: 17-Aug-2008
- Show More Cited By