Mapping the Internet to Assist Cyber-Defense. Heidemann, J. Invited talk at Spring Electronic Crimes Task Force Meeting, May, 2010. Paper abstract bibtex (No abstract, but this invited talk described how active probing and Internet mapping can assist in addressing problems in cyber-crime defense.)
@Misc{Heidemann10a,
author = "John Heidemann",
title = "Mapping the {Internet} to Assist Cyber-Defense",
howpublished = "Invited talk at Spring Electronic Crimes Task
Force Meeting",
year = 2010,
sortdate = "2010-05-01",
project = "ant, lander, lacrend, nocredit",
jsubject = "topology_modeling",
sortdate = "2010-05-01",
month = may,
jlocation = "johnh: pafile",
keywords = "lander, address space",
url = "https://ant.isi.edu/%7ejohnh/PAPERS/Heidemann10a.html",
pdfurl = "https://ant.isi.edu/%7ejohnh/PAPERS/Heidemann10a.pdf",
abstract = "(No abstract, but this invited talk described
how active probing and Internet mapping
can assist in addressing problems in
cyber-crime defense.)",
myorganization = "USC/Information Sciences Institute",
copyrightholder = "authors",
}
Downloads: 0
{"_id":"8gc5yt64RarQrAhNp","bibbaseid":"heidemann-mappingtheinternettoassistcyberdefense-2010","author_short":["Heidemann, J."],"bibdata":{"bibtype":"misc","type":"misc","author":[{"firstnames":["John"],"propositions":[],"lastnames":["Heidemann"],"suffixes":[]}],"title":"Mapping the Internet to Assist Cyber-Defense","howpublished":"Invited talk at Spring Electronic Crimes Task Force Meeting","year":"2010","sortdate":"2010-05-01","project":"ant, lander, lacrend, nocredit","jsubject":"topology_modeling","month":"May","jlocation":"johnh: pafile","keywords":"lander, address space","url":"https://ant.isi.edu/%7ejohnh/PAPERS/Heidemann10a.html","pdfurl":"https://ant.isi.edu/%7ejohnh/PAPERS/Heidemann10a.pdf","abstract":"(No abstract, but this invited talk described how active probing and Internet mapping can assist in addressing problems in cyber-crime defense.)","myorganization":"USC/Information Sciences Institute","copyrightholder":"authors","bibtex":"@Misc{Heidemann10a,\n\tauthor =\t\"John Heidemann\",\n\ttitle =\t\t\"Mapping the {Internet} to Assist Cyber-Defense\",\n\thowpublished =\t\"Invited talk at Spring Electronic Crimes Task\n Force Meeting\",\n\tyear =\t\t2010,\n\tsortdate =\t\t\"2010-05-01\",\n\tproject = \"ant, lander, lacrend, nocredit\",\n\tjsubject = \"topology_modeling\",\n\tsortdate =\t\t\"2010-05-01\",\n\tmonth =\t\tmay,\n\tjlocation =\t\"johnh: pafile\",\n\tkeywords =\t\"lander, address space\",\n\turl =\t\t\"https://ant.isi.edu/%7ejohnh/PAPERS/Heidemann10a.html\",\n\tpdfurl =\t\"https://ant.isi.edu/%7ejohnh/PAPERS/Heidemann10a.pdf\",\n\tabstract = \"(No abstract, but this invited talk described\n\t\t\thow active probing and Internet mapping\n\t\t\tcan assist in addressing problems in\n cyber-crime defense.)\",\n\tmyorganization =\t\"USC/Information Sciences Institute\",\n\tcopyrightholder = \"authors\",\n}\n\n","author_short":["Heidemann, J."],"bibbaseid":"heidemann-mappingtheinternettoassistcyberdefense-2010","role":"author","urls":{"Paper":"https://ant.isi.edu/%7ejohnh/PAPERS/Heidemann10a.html"},"keyword":["lander","address space"],"metadata":{"authorlinks":{}}},"bibtype":"misc","biburl":"https://bibbase.org/f/dHevizJoWEhWowz8q/johnh-2023-2.bib","dataSources":["YLyu3mj3xsBeoqiHK","fLZcDgNSoSuatv6aX","fxEParwu2ZfurScPY","7nuQvtHTqKrLmgu99"],"keywords":["lander","address space"],"search_terms":["mapping","internet","assist","cyber","defense","heidemann"],"title":"Mapping the Internet to Assist Cyber-Defense","year":2010}