COOTS '99 | The Application of Object-Oriented Design Techniques to the Evolution of the Architecture of a Large Legacy Software System | Jeff Mason, Emil Ochotta |
COOTS '99 | Supporting Automatic Configuration of Component-Based Distributed Systems | Fabio Kon, Roy H. Campbell |
COOTS '99 | Automating Three Modes of Evolution for Object-Oriented Software Architectures | Lance Tokuda, Don Batory |
COOTS '99 | The Design and Implementation of Guaraná | Alexandre Oliva, Luiz Eduardo Buzato |
COOTS '99 | Tuning Branch Predictors to Support Java Method Invocation | N. Vijaykrishnan, N. Ranganathan |
COOTS '99 | Comprehensive Profiling Support in the Java Virtual Machine | Sheng Liang, Deepa Viswanathan |
ID '99 | Intrusion Detection Through Dynamic Software Measurement | Sebastian Elbaum, John C. Munson |
ID '99 | Learning Program Behavior Profiles for Intrusion Detection | Anup Ghosh, Aaron Schwartzbard, Michael Schatz |
ID '99 | Automated Intrusion Detection Methods Using NFR | Wenke Lee, Christopher Park, Salvatore J. Stolfo |
ID '99 | Experience with EMERALD Thus Far | Phillip A. Porras, Peter G. Neumann, Teresa Lunt |
ID '99 | Defending Against the Wily Surfer -Web-Based Attacks and Defenses | Dan Klein |
ID '99 | Preprocessor Algorithm for Network Management Codebook | Minaxi Gupta, Mani Subramanian |
ID '99 | The Packet Vault: Secure Storage of Network Data | Charles J. Antonelli, Matthew Undy, Peter Honeyman |
ID '99 | Real-Time Intrusion Detection and Suppression in ATM Networks | Ricardo Bettati, Wei Zhao, Dan Teodor |
ID '99 | A Statistical Method for Profiling Network Traffic | David Marchette |
ID '99 | Transaction-Based Anomaly Detection | Roland Buschkes, Mark Borning |
ID '99 | Analysis Techniques for Detecting Coordinated Attacks and Probes | Tim Aldrich, Stephen Northcutt, Bill Ralph, John Green |
ID '99 | Intrusion Detection and Intrusion Prevention on a Large Network: A Case Study | Tom Dunigan, Greg Hinkel |
ID '99 | An Eye on Network Intruder-Administrator Shootouts | Luc Girardin |
ID '99 | On Preventing Intrusions by Process Behavior Monitoring | R. Sekar, Thomas Bowen |
NETA '99 | Keynote Address: "Home, Road and Work Have Merged Via the Internet" | Norm Schryer |
NETA '99 | Driving via the Rearview Mirror: Managing a Network with Super MRTG | Jeff Allen |
NETA '99 | Don't Just Talk About the Weather -Manage It! A System for Measuring, Monitoring, and Managing Internet Performance and Connectivity | Cindy Bickerstaff, Ken True, Charles Smothers, Tod Oace, Jeff Sedayao, Clinton Wong |
NETA '99 | Supporting H.323 Video and Voice in an Enterprise Network | Randal Abler, Gail Wells |
NETA '99 | Network Documentation: A Web-Based Relational Database Approach | Wade Warner, Rajshekhar Sunderraman |