A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is
To this end, in this survey article, we present existing research on NTA and related areas, primarily focusing on TLS-encrypted traffic to detect and classify malicious traffic with deployment scenarios ... Recently, a majority of security operations centers (SOCs) have been facing a critical issue of increased adoption of transport layer security (TLS) encryption on the Internet, in network traffic analysis ... Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems, 3rd ed.; No Starch Press: San Francisco, CA, USA, 2017. 77. Collins, M. ...doi:10.3390/app12010155 fatcat:kdkvmdkbareb7cxgy7er7ncday
In Proceedings of the 2nd conference on Real, Large Distributed Systems - Volume 2, WORLDS’05, pages 1–6, Berkeley, CA, USA, 2005. USENIX Association.  D. Agrawal and A. E. Abbadi. ... Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 2005.  R. J. Honicky and E. L. Miller. A fast algorithm for online placement and reorganization of replicated data. ...doi:10.5075/epfl-thesis-5278 fatcat:cqwluzkzojgozb362zlaxt3z4e
This report describes the IRAD projects that were conducted during fiscal year 2006 (October 2005 through September 2006). ... Projects are chosen based on their potential to mature and/or transition software engineering practices, develop information that will help in deciding whether further work is worth funding, and set new ... San Francisco, CA (USA): Jossey-Bass, 1992. [Stallinger 2001] Stallinger, F. & Grunbacher, P. "System Dynamics Modelling and Simulation of Collaborative Requirements Engineering." ...doi:10.1184/r1/6583376 fatcat:kszugi3fzbdk5mm4t7pqepgxfm
in Lisbon, Portugal, was a multi-track event covering related topics on theory and practice on systems automation, autonomous systems and autonomic computing. ... We aimed to expose specific advancements on theory and tool in supporting advanced autonomous systems. ... Berkeley, CA, USA: USENIX Association, 2010, pp. 3-3.  S. Crosby and D. Brown, "The virtualization reality," in ACM Q focus: computer architecture, 2006, pp. 34 -41. ...fatcat:ke3eyz375zejhezaowd63bksqu
paper, "Cyber Power and International Stability: Assessing Deterrence and Escalation in Cyberspace," posits that there are unique attributes that define the cyber domain and that have direct implications on ... The second paper, "Arms Control and Confidence Building Measures for the Cyber Domain," explores at various mechanisms that states have traditionally used to foster stability and prevent inadvertent conflict ... Acknowledgements This dissertation greatly benefited from the writings, teachings, and guidance of Richard Betts and Robert Jervis, who served on my dissertation committee. ...doi:10.7916/d88d07ph fatcat:7vqzfgghwzfrbepl2lytb7dnti