|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 538 occurrences of 244 keywords
|
|
|
Results
Found 2856 publication records. Showing 2856 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
122 | Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran, Jae-Kwang Lee |
Multi Layer Approach to Defend DDoS Attacks Caused by Spam. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MUE ![In: 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 26-28 April 2007, Seoul, Korea, pp. 97-102, 2007, IEEE Computer Society, 978-0-7695-2777-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
112 | Tae Hwan Kim, Dong Seong Kim 0001, Sang Min Lee 0012, Jong Sou Park |
Detecting DDoS Attacks Using Dispersible Traffic Matrix and Weighted Moving Average. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISA ![In: Advances in Information Security and Assurance, Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings, pp. 290-300, 2009, Springer, 978-3-642-02616-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Traffic visualization, Weighted moving average, Intrusion detection, Distributed Denial of Service attacks, Traffic matrix, IP spoofing |
102 | Xin Xu, Yongqiang Sun, Zunguo Huang |
Defending DDoS Attacks Using Hidden Markov Models and Cooperative Reinforcement Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAISI ![In: Intelligence and Security Informatics, Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings, pp. 196-207, 2007, Springer, 978-3-540-71548-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
93 | Usman Tariq, Manpyo Hong, Kyung-suk Lhee |
A Comprehensive Categorization of DDoS Attack and DDoS Defense Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ADMA ![In: Advanced Data Mining and Applications, Second International Conference, ADMA 2006, Xi'an, China, August 14-16, 2006, Proceedings, pp. 1025-1036, 2006, Springer, 3-540-37025-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
92 | Guoxing Zhang, Shengming Jiang, Gang Wei, Quansheng Guan |
A prediction-based detection algorithm against distributed denial-of-service attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, IWCMC 2009, Leipzig, Germany, June 21-24, 2009, pp. 106-110, 2009, ACM, 978-1-60558-569-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
available service rate, prediction-based detection of DDoS and low-rate TCP attacks, distributed DoS (DDoS), denial-of-service attacks (DoS) |
92 | Hyundo Park, Peng Li 0059, Debin Gao, Heejo Lee, Robert H. Deng |
Distinguishing between FE and DDoS Using Randomness Check. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings, pp. 131-145, 2008, Springer, 978-3-540-85884-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Flash Event, Randomness Check, Network Security, Distributed Denial of Service |
86 | Jun (Jim) Xu, Wooyong Lee |
Sustaining Availability of Web Services under Distributed Denial of Service Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 52(2), pp. 195-208, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
World-Wide Web, game theory, Availability, survivability, Distributed Denial of Service (DDoS) |
83 | Soon Hin Khor, Akihiro Nakao |
Overfort: Combating DDoS with peer-to-peer DDoS puzzle. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 22nd IEEE International Symposium on Parallel and Distributed Processing, IPDPS 2008, Miami, Florida USA, April 14-18, 2008, pp. 1-8, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
82 | Jieren Cheng, Jianping Yin, Yun Liu, Zhiping Cai, Min Li |
DDoS Attack Detection Algorithm Using IP Address Features. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FAW ![In: Frontiers in Algorithmics, Third International Workshop, FAW 2009, Hefei, China, June 20-23, 2009. Proceedings, pp. 207-215, 2009, Springer, 978-3-642-02269-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
IP address features value, support vector machine, network security, distributed denial of service attack |
82 | Christos Siaterlis, Vasilis Maglaris |
Detecting Incoming and Outgoing DDoS Attacks at the Edge Using a Single Set of Network Characteristics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005), 27-30 June 2005, Murcia, Cartagena, Spain, pp. 469-475, 2005, IEEE Computer Society, 0-7695-2373-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
82 | Jung-Taek Seo, Cheolho Lee, Taeshik Shon, Jongsub Moon |
SVM Approach with CTNT to Detect DDoS Attacks in Grid Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC ![In: Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30 - December 3, 2005, Proceedings, pp. 59-70, 2005, Springer, 3-540-30510-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
80 | Seung-Won Shin, Kwang-ho Baik, Ki-Young Kim, Jong-Soo Jang |
QS-Ware: The Middleware for Providing QoS and Secure Ability to Web Server. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part I, pp. 988-997, 2004, Springer, 3-540-22054-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
78 | Chwan-Hwa John Wu, Tong Liu |
Simulation for intrusion-resilient, DDoS-resistant authentication system (IDAS). ![Search on Bibsonomy](Pics/bibsonomy.png) |
SpringSim ![In: Proceedings of the 2008 Spring Simulation Multiconference, SpringSim 2008, Ottawa, Canada, April 14-17, 2008, pp. 844-851, 2008, SCS/ACM, 1-56555-319-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
computer network defense, authentication, network security, discrete event simulation, DDoS, intrusion |
78 | Yu Chen 0002, Kai Hwang 0001, Wei-Shinn Ku |
Collaborative Detection of DDoS Attacks over Multiple Network Domains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 18(12), pp. 1649-1662, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Cyber defense, network security, DDoS attacks, Internet technology |
78 | Jian Yuan, Kevin L. Mills |
Monitoring the Macroscopic Effect of DDoS Flooding Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 2(4), pp. 324-335, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
attack dynamics, spatial-temporal pattern, monitoring, network traffic, DDoS attack |
72 | Mohit Mehta, Kanika Thapar, George C. Oikonomou, Jelena Mirkovic |
Combining Speak-Up with DefCOM for Improved DDoS Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2008, Beijing, China, 19-23 May 2008, pp. 1708-1714, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
72 | Yi Xie 0002, Shun-Zheng Yu |
A Novel Model for Detecting Application Layer DDoS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMSCCS (2) ![In: Interdisciplinary and Multidisciplinary Research in Computer Science, IEEE CS Proceeding of the First International Multi-Symposium of Computer and Computational Sciences (IMSCCS|06), June 20-24, 2006, Zhejiang University, Hangzhou, China, Vol. 2, pp. 56-63, 2006, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
72 | Zhongwen Li, Yang Xiang 0001, Dongsheng He |
Simulation and Analysis of DDoS in Active Defense Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Computational Intelligence and Security, International Conference, CIS 2006, Guangzhou, China, November 3-6, 2006, Revised Selected Papers, pp. 878-886, 2006, Springer, 978-3-540-74376-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
72 | Sanguk Noh, Cheolho Lee, Kyunghee Choi, Gihyun Jung |
Detecting Distributed Denial of Service (DDoS) Attacks through Inductive Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDEAL ![In: Intelligent Data Engineering and Automated Learning, 4th International Conference, IDEAL 2003, Hong Kong, China, March 21-23, 2003, Revised Papers, pp. 286-295, 2003, Springer, 3-540-40550-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
68 | Yi Xie 0002, Shun-Zheng Yu |
Monitoring the application-layer DDoS attacks for popular websites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE/ACM Trans. Netw. ![In: IEEE/ACM Trans. Netw. 17(1), pp. 15-25, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
popular Website, distributed denial of service (DDoS), application-layer |
68 | Markus Goldstein, Christoph H. Lampert, Matthias Reif, Armin Stahl, Thomas M. Breuel |
Bayes Optimal DDoS Mitigation by Adaptive History-Based IP Filtering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICN ![In: Seventh International Conference on Networking (ICN 2008), 13-18 April 2008, Cancun, Mexico, pp. 174-179, 2008, IEEE Computer Society, 978-0-7695-3106-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
History-Based IP Filtering, DDoS, Bayes, Mitigation |
68 | Pan Shi, Yifeng Lian |
Game-Theoretical Effectiveness Evaluation of DDoS Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICN ![In: Seventh International Conference on Networking (ICN 2008), 13-18 April 2008, Cancun, Mexico, pp. 427-433, 2008, IEEE Computer Society, 978-0-7695-3106-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
effectiveness evaluation, Game Theory, congestion control, DDoS |
68 | Jun Yang, Ying Li 0002, Benxiong Huang, Jiuqiang Ming |
Preventing DDoS Attacks Based on Credit Model for P2P Streaming System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATC ![In: Autonomic and Trusted Computing, 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008, Proceedings, pp. 13-20, 2008, Springer, 978-3-540-69294-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Distributed Denial of Service (DDoS), peer-to-peer (P2P), Credit |
68 | Liying Li, Jianying Zhou 0001, Ning Xiao |
DDoS Attack Detection Algorithms Based on Entropy Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007, Proceedings, pp. 452-466, 2007, Springer, 978-3-540-77047-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
DDoS detection, entropy computing, network security |
68 | Igor V. Kotenko, Alexander Ulanov |
Simulation of Internet DDoS Attacks and Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings, pp. 327-342, 2006, Springer, 3-540-38341-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Security modeling and architecture, Security models for ambient intelligence environments, Security simulation, DDoS, Infrastructure security |
68 | Minho Sung, Jun (Jim) Xu |
IP Traceback-Based Intelligent Packet Filtering: A Novel Technique for Defending against Internet DDoS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 14(9), pp. 861-872, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
performance modeling and simulation, Distributed Denial of Service (DDoS), IP traceback |
66 | Xun Wang, Sriram Chellappan, Phillip Boyer, Dong Xuan |
On the Effectiveness of Secure Overlay Forwarding Systems under Intelligent Distributed DoS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 17(7), pp. 619-632, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Secure overlay forwarding system, DDoS attacks |
63 | Supranamaya Ranjan, Ram Swaminathan, Mustafa Uysal, Antonio Nucci, Edward W. Knightly |
DDoS-shield: DDoS-resilient scheduling to counter application layer attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE/ACM Trans. Netw. ![In: IEEE/ACM Trans. Netw. 17(1), pp. 26-39, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
application layer attacks, site security monitoring, anomaly detection, information entropy, denial-of-service attacks |
62 | Huizhong Sun, Yan Zhaung, H. Jonathan Chao |
A Principal Components Analysis-Based Robust DDoS Defense System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2008, Beijing, China, 19-23 May 2008, pp. 1663-1669, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
62 | Sanjam Garg, Huzur Saran |
Anti-DDoS Virtualized Operating System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 667-674, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Performance, Virtualization, Malware, Distributed Denial of Service Attack |
62 | Wei Zhang, Shize Guo, Kangfeng Zheng, Yixian Yang |
A Defending Mechanism against DDoS Based on Registration and Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICYCS ![In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 2192-2197, 2008, IEEE Computer Society, 978-0-7695-3398-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
62 | Zonglin Li, Guangmin Hu, Dan Yang |
Global abnormal correlation analysis for DDoS attack detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), July 6-9, Marrakech, Morocco, pp. 310-315, 2008, IEEE Computer Society, 978-1-4244-2702-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
62 | Keun Park, Dongwon Seo, Jaewon Yoo, Heejo Lee, Hyogon Kim |
Unified Rate Limiting in Broadband Access Networks for Defeating Internet Worms and DDoS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings, pp. 176-187, 2008, Springer, 978-3-540-79103-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
62 | Xinyu Yang, Ting Ma |
A Link Signature Based DDoS Attacker Tracing Algorithm under IPv6. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FGCN (1) ![In: Future Generation Communication and Networking, FGCN 2007, Ramada Plaza Jeju, Jeju-Island, Korea, December 6-8, 2007, Proceedings, pp. 50-55, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
62 | Mihui Kim, Jaewon Seo, Kijoon Chae |
Integrated Notification Architecture Based on Overlay Against DDoS Attacks on Convergence Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEUS ![In: Software Technologies for Embedded and Ubiquitous Systems, 5th IFIP WG 10.2 International Workshop, SEUS 2007, Santorini Island, Greece, May 2007. Revised Papers, pp. 466-476, 2007, Springer, 978-3-540-75663-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
62 | Yunhao Liu 0001, Xiaomei Liu, Chen Wang 0010, Li Xiao 0001 |
Defending P2Ps from Overlay Flooding-based DDoS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPP ![In: 2007 International Conference on Parallel Processing (ICPP 2007), September 10-14, 2007, Xi-An, China, pp. 28, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
62 | Paulo E. Ayres, H. Sun, H. Jonathan Chao, Wing Cheong Lau |
ALPi: A DDoS Defense System for High-Speed Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE J. Sel. Areas Commun. ![In: IEEE J. Sel. Areas Commun. 24(10), pp. 1864-1876, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
62 | Jian Kang 0001, Yuan Zhang, Jiu-bin Ju |
A Formalized Taxonomy of DDoS Attacks Based on Similarity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006, Proceedings, pp. 717-719, 2006, Springer, 3-540-34478-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
62 | Yang Xiang 0001, Wanlei Zhou 0001 |
Intelligent DDoS Packet Filtering in High-Speed Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPA ![In: Parallel and Distributed Processing and Applications, Third International Symposium, ISPA 2005, Nanjing, China, November 2-5, 2005, Proceedings, pp. 395-406, 2005, Springer, 3-540-29769-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
62 | Jung-Taek Seo, Cheolho Lee, Jongsub Moon |
Defending DDoS Attacks Using Network Traffic Analysis and Probabilistic Packet Drop. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC Workshops ![In: Grid and Cooperative Computing - GCC 2004 Workshops: GCC 2004 International Workshops, IGKG, SGT, GISS, AAC-GEVO, and VVS, Wuhan, China, October 21-24, 2004. Proceedings, pp. 390-397, 2004, Springer, 3-540-23578-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
62 | Bin Xiao 0001, Wei Chen 0006, Yanxiang He |
A Novel Technique for Detecting DDoS Attacks at Its Early Stage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPA ![In: Parallel and Distributed Processing and Applications, Second InternationalSymposium, ISPA 2004, Hong Kong, China, December 13-15, 2004, Proceedings, pp. 825-834, 2004, Springer, 3-540-24128-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
62 | Lukas Ruf, Arno Wagner, Károly Farkas, Bernhard Plattner |
A Detection and Filter System for Use Against Large-Scale DDoS Attacks in the Internet Backbone. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWAN ![In: Active Networks, IFIP TC6 6th International Working Conference, IWAN 2004, Lawrence, KS, USA, October 27-29, 2004. Revised Papers, pp. 169-187, 2004, Springer, 978-3-540-71499-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
62 | Roshan K. Thomas, Brian L. Mark, Tommy Johnson, James Croall |
NetBouncer: Client-legitimacy-based High-performance DDoS Filtering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DISCEX (1) ![In: 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 22-24 April 2003, Washington, DC, USA, pp. 14-25, 2003, IEEE Computer Society, 0-7695-1897-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
62 | Jelena Mirkovic, Max Robinson, Peter L. Reiher |
Alliance formation for DDoS defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSPW ![In: Proceedings of the New Security Paradigms Workshop 2003, August 18-21, 2002, Ascona, Switzerland, pp. 11-18, 2003, ACM, 1-58113-880-6. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
60 | Rasool Jalili, Fatemeh Imani-Mehr, Morteza Amini, Hamid Reza Shahriari |
Detection of Distributed Denial of Service Attacks Using Statistical Pre-processor and Unsupervised Neural Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings, pp. 192-203, 2005, Springer, 3-540-25584-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
60 | Hyung-Woo Lee |
Advanced Packet Marking Mechanism with Pushback for IP Traceback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings, pp. 426-438, 2004, Springer, 3-540-22217-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
58 | Anjali Sardana, Ramesh Chandra Joshi |
Dual-level defense for networks under DDoS attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), Sierre, Switzerland, March 22-26, 2010, pp. 733-734, 2010, ACM, 978-1-60558-639-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
entropy, detection, DDoS, Honeypots, characterization |
58 | Ke Li, Wanlei Zhou 0001, Shui Yu 0001, Bo Dai 0006 |
Effective DDoS Attacks Detection Using Generalized Entropy Metric. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICA3PP ![In: Algorithms and Architectures for Parallel Processing, 9th International Conference, ICA3PP 2009, Taipei, Taiwan, June 8-11, 2009. Proceedings, pp. 266-280, 2009, Springer, 978-3-642-03094-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
generalized entropy, DDoS, attacks detection |
58 | George S. Oreku, Jianzhong Li 0001, Tamara Pazynyuk |
An application-driven perspective on wireless devises security: the case of distributed denial-of-service (ddos). ![Search on Bibsonomy](Pics/bibsonomy.png) |
PM2HW2N ![In: Proceedings of the 2nd ACM Workshop on Performance Monitoring and Measurement of Heterogeneous Wireless and Wired Networks, PM2HW2N 2007, Chania, Crete Island, Greece, October 22, 2007, pp. 81-83, 2007, ACM, 978-1-59593-805-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
handheld devices, distributed denial of service attacks (DDoS), wireless sensor nodes |
58 | Bin Xiao 0001, Wei Chen 0006, Yanxiang He |
A novel approach to detecting DDoS Attacks at an Early Stage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Supercomput. ![In: J. Supercomput. 36(3), pp. 235-248, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Cooperative Detection, Bloom Filter, DDoS Attack |
58 | Junfeng Tian, Min Peng, Yuling Liu |
A New Active DDoS Defense System Based on Automatic Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIAN ![In: Advances in Computer Science - ASIAN 2005, Data Management on the Web, 10th Asian Computing Science Conference, Kunming, China, December 7-9, 2005, Proceedings, pp. 249-250, 2005, Springer, 3-540-30767-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
active defense, neural network, statistical analysis, DDoS, traffic monitoring |
58 | Hyung-Woo Lee, Taekyoung Kwon 0002, Hyung-Jong Kim 0002 |
NS-2 Based IP Traceback Simulation Against Reflector Based DDoS Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AIS ![In: Artificial Intelligence and Simulation, 13th International Conference on AI, Simulation, and Planning in High Autonomy Systems, AIS 2004, Jeju Island, Korea, October 4-6, 2004, Revised Selected Papers, pp. 90-99, 2004, Springer, 3-540-24476-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Reflector Attack, Simulation, DDoS, NS-2, IP Traceback |
58 | Haining Wang, Kang G. Shin |
Transport-Aware IP Routers: A Built-In Protection Mechanism to Counter DDoS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 14(9), pp. 873-884, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Distributed Denial of Service (DDoS) attacks, layer-4 differentiation, resource isolation, packet classification |
56 | Dongqi Wang, Guiran Chang, Xiaoshuo Feng, Rui Guo |
Research on the Detection of Distributed Denial of Service Attacks Based on the Characteristics of IP Flow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NPC ![In: Network and Parallel Computing, IFIP International Conference, NPC 2008, Shanghai, China, October 18-20, 2008. Proceedings, pp. 86-93, 2008, Springer, 978-3-540-88139-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Neural Network, Detection, DDoS, IP Flow |
56 | Chwan-Hwa John Wu, Chun-Ching Andy Huang, J. David Irwin |
Using Identity-Based Privacy-Protected Access Control Filter (IPACF) to against denial of service attacks and protect user privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SpringSim (3) ![In: Proceedings of the 2007 Spring Simulation Multiconference, SpringSim 2007, Norfolk, Virginia, USA, March 25-29, 2007, Volume 3, pp. 362-369, 2007, SCS/ACM, 1-56555-314-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
privacy, network security, DDoS, wireless security |
56 | Udaya Kiran Tupakula, Vijay Varadharajan |
Analysis of traceback techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSW ![In: The proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), Hobart, Tasmania, Australia, January 2006, pp. 115-124, 2006, Australian Computer Society, 1-920-68236-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
DoS, denial of service, DDoS, traceback |
52 | Mun Choon Chan, Ee-Chien Chang, Liming Lu, Peng Song Ngiam |
Effect of Malicious Synchronization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings, pp. 114-129, 2006, 3-540-34703-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Distributed Denial of Service (DDoS) attacks, low rate DDoS attack, herding, synchronization, Network security, periodicity |
52 | Anna T. Lawniczak, Hao Wu 0002, Bruno N. Di Stefano |
Entropy Based Detection of DDoS Attacks in Packet Switching Network Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Complex (2) ![In: Complex Sciences, First International Conference, Complex 2009, Shanghai, China, February 23-25, 2009. Revised Papers, Part 2, pp. 1810-1822, 2009, Springer, 978-3-642-02468-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
entropy, packet switching network, distributed denial of service attack |
52 | Ashley Chonka, Wanlei Zhou 0001, Jaipal Singh, Yang Xiang 0001 |
Detecting and Tracing DDoS Attacks by Intelligent Decision Prototype. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PerCom ![In: Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 17-21 March 2008, Hong Kong, pp. 578-583, 2008, IEEE Computer Society, 978-0-7695-3113-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Intelligent Decision Prototype, Machine Learning, Decision trees, Distributed Denial of Service, IP Traceback |
52 | Shui Yu 0001, Wanlei Zhou 0001 |
Entropy-Based Collaborative Detection of DDOS Attacks on Community Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PerCom ![In: Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 17-21 March 2008, Hong Kong, pp. 566-571, 2008, IEEE Computer Society, 978-0-7695-3113-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
52 | Brij B. Gupta, Manoj Misra, Ramesh Chandra Joshi |
FVBA: A combined statistical approach for low rate degrading and high bandwidth disruptive DDoS attacks detection in ISP domain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICON ![In: Proceedings of the 16th International Conference on Networks, ICON 2008, December 12-14, 2008, held at India Habitat Centre, New Delhi, India, pp. 1-4, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
52 | Yun Huang 0001, Xianjun Geng, Andrew B. Whinston |
Defeating DDoS attacks by fixing the incentive chain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Internet Techn. ![In: ACM Trans. Internet Techn. 7(1), pp. 5, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
security, Denial-of-service, incentive, pricing |
52 | Yi Shi, Xinyu Yang, Huijun Zhu |
A Flooding-Based DoS/DDoS Detecting Algorithm Based on Traffic Measurement and Prediction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security, First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006, Proceedings, pp. 252-267, 2006, Springer, 3-540-47699-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
52 | Yong Cui 0001, Lingjian Song, Ke Xu 0002 |
RCS: A Distributed Mechanism Against Link Flooding DDoS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICOIN ![In: Information Networking, Advances in Data Communications and Wireless Networks, International Conference, ICOIN 2006, Sendai, Japan, January 16-19, 2006, Revised Selected Papers, pp. 764-774, 2006, Springer, 3-540-48563-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
52 | Hyung-Woo Lee |
SVM Based Packet Marking Technique for Traceback on Malicious DDoS Traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICOIN ![In: Information Networking, Advances in Data Communications and Wireless Networks, International Conference, ICOIN 2006, Sendai, Japan, January 16-19, 2006, Revised Selected Papers, pp. 754-763, 2006, Springer, 3-540-48563-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
52 | Naoum Naoumov, Keith W. Ross |
Exploiting P2P systems for DDoS attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Infoscale ![In: Proceedings of the 1st International Conference on Scalable Information Systems, Infoscale 2006, Hong Kong, May 30-June 1, 2006, pp. 47, 2006, ACM, 1-59593-428-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
52 | George C. Oikonomou, Jelena Mirkovic, Peter L. Reiher, Max Robinson |
A Framework for a Collaborative DDoS Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 22nd Annual Computer Security Applications Conference (ACSAC 2006), 11-15 December 2006, Miami Beach, Florida, USA, pp. 33-42, 2006, IEEE Computer Society, 0-7695-2716-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
52 | Shigang Chen, Qingguo Song |
Perimeter-Based Defense against High Bandwidth DDoS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 16(6), pp. 526-537, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Network-level security and protection |
52 | Lan Li, Gyungho Lee |
DDoS Attack Detection and Wavelets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Telecommun. Syst. ![In: Telecommun. Syst. 28(3-4), pp. 435-451, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
energy distribution, distributed denial of service, wavelet analysis, traffic characterization, attack detection |
52 | Jung-Taek Seo, Cheolho Lee, Jungtae Kim, Taeshik Shon, Jongsub Moon |
Probabilistic Packet Filtering Model to Protect Web Server from DDoS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NPC ![In: Network and Parallel Computing, IFIP International Conference, NPC 2005, Beijing, China, November 30 - December 3, 2005, Proceedings, pp. 351-354, 2005, Springer, 3-540-29810-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
52 | Jun Zheng, Ming-Zeng Hu |
Intrusion Detection of DoS/DDoS and Probing Attacks for Web Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WAIM ![In: Advances in Web-Age Information Management, 6th International Conference, WAIM 2005, Hangzhou, China, October 11-13, 2005, Proceedings, pp. 333-344, 2005, Springer, 3-540-29227-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
52 | Jung-Taek Seo, Cheolho Lee, Jungtae Kim, Taeshik Shon, Jongsub Moon |
PPF Model with CTNT to Defend Web Server from DDoS Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC Workshops ![In: Embedded and Ubiquitous Computing - EUC 2005 Workshops, EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December 6-9, 2005, Proceedings, pp. 986-995, 2005, Springer, 3-540-30803-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
52 | Yanxiang He, Wei Chen 0006, Wenling Peng, Min Yang 0001 |
Efficient and Beneficial Defense Against DDoS Direct Attack and Reflector Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPA ![In: Parallel and Distributed Processing and Applications, Third International Symposium, ISPA 2005, Nanjing, China, November 2-5, 2005, Proceedings, pp. 576-587, 2005, Springer, 3-540-29769-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
52 | Yang Xiang 0001, Wanlei Zhou 0001 |
Safeguard Information Infrastructure Against DDoS Attacks: Experiments and Modeling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005, Proceedings, pp. 320-333, 2005, Springer, 3-540-30849-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
52 | Eric Y. Chen, Akinori Yonezawa |
Practical techniques for defending against DDoS attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AICCSA ![In: 2005 ACS / IEEE International Conference on Computer Systems and Applications (AICCSA 2005), January 3-6, 2005, Cairo, Egypt, pp. 72, 2005, IEEE Computer Society, 0-7803-8735-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
52 | Sleiman Itani, Najwa Aaraj, Darine Abdelahad, Ayman I. Kayssi |
Neighbor stranger discrimination: a new defense mechanism against Internet DDOS attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AICCSA ![In: 2005 ACS / IEEE International Conference on Computer Systems and Applications (AICCSA 2005), January 3-6, 2005, Cairo, Egypt, pp. 95, 2005, IEEE Computer Society, 0-7803-8735-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
52 | Yi Shi, Xinyu Yang |
A Novel Architecture for Detecting and Defending Against Flooding-Based DDoS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS (2) ![In: Computational Intelligence and Security, International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II, pp. 364-374, 2005, Springer, 3-540-30819-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
52 | Guoyin Zhang, Jian Li, Guo-Chang Gu |
Research on defending DDoS attack - an expert system approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SMC (4) ![In: Proceedings of the IEEE International Conference on Systems, Man & Cybernetics: The Hague, Netherlands, 10-13 October 2004, pp. 3554-3558, 2004, IEEE, 0-7803-8566-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
52 | Xinyu Yang, Yong Liu, Ming Zeng, Yi Shi |
A Novel DDoS Attack Detecting Algorithm Based on the Continuous Wavelet Transform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AWCC ![In: Content Computing, Advanced Workshop on Content Computing, AWCC 2004, ZhenJiang, JiangSu, China, November 15-17, 2004, Proceedings, pp. 173-181, 2004, Springer, 3-540-23898-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
52 | Eric Y. K. Chan, H. W. Chan, K. M. Chan, Vivien P. S. Chan, Samuel T. Chanson, Matthew M. H. Cheung, C. F. Chong, Kam-Pui Chow, Albert K. T. Hui, Lucas Chi Kwong Hui, Luke C. K. Lam, W. C. Lau, Kevin K. H. Pun, Anthony Y. F. Tsang, Wai Wan Tsang, Sam C. W. Tso, Dit-Yan Yeung, Kwun Yin Yu |
IDR: An Intrusion Detection Router for Defending against Distributed Denial-of-Service (DDoS) Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPAN ![In: 7th International Symposium on Parallel Architectures, Algorithms, and Networks (I-SPAN 2004), 10-12 May 2004, Hong Kong, SAR, China, pp. 581-586, 2004, IEEE Computer Society, 0-7695-2135-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
52 | Abraham Yaar, Adrian Perrig, Dawn Xiaodong Song |
Pi: A Path Identification Mechanism to Defend against DDoS Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2003 IEEE Symposium on Security and Privacy (S&P 2003), 11-14 May 2003, Berkeley, CA, USA, pp. 93-, 2003, IEEE Computer Society, 0-7695-1940-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
52 | Minho Sung, Jun (Jim) Xu |
IP Traceback-Based Intelligent Packet Filtering: A Novel Technique for Defending against Internet DDoS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNP ![In: 10th IEEE International Conference on Network Protocols (ICNP 2002), 12-15 November 2002, Paris, France, Proceedings, pp. 302-311, 2002, IEEE Computer Society, 0-7695-1856-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
50 | Yuh-Min Tseng |
Efficient authenticated key agreement protocols resistant to a denial-of-service attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Netw. Manag. ![In: Int. J. Netw. Manag. 15(3), pp. 193-202, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
48 | Jie Yu 0008, Chengfang Fang, Liming Lu, Zhoujun Li 0001 |
A Lightweight Mechanism to Mitigate Application Layer DDoS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Infoscale ![In: Scalable Information Systems, 4th International ICST Conference, Infoscale 2009, Hong Kong, June 10-11, 2009, Revised Selected Papers, pp. 175-191, 2009, Springer, 978-3-642-10484-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Trust, DDoS Attacks, Lightweight, Application layer |
48 | Do-Yoon Ha, Hwan-Kuk Kim, KyoungHee Ko, Chang-Yong Lee, JeongWook Kim, Hyun-Cheol Jeong |
Design and implementation of SIP-aware DDoS attack detection system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIS ![In: Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human (ICIS 2009), Seoul, Korea, 24-26 November 2009, pp. 1167-1171, 2009, ACM, 978-1-60558-710-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
IP telephony security, session initiation protocol, DDoS |
48 | Rui Guo, Guiran Chang, Yuhai Qin, Baojing Sun, An Liu, Bencheng Zhang, Dan Peng |
DG-Based Active Defense Strategy to Defend against DDoS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MUE ![In: 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 24-26 April 2008, Busan, Korea, pp. 191-196, 2008, IEEE Computer Society, 978-0-7695-3134-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Active defense, Nash Equilibrium, DDoS, Differential Games |
48 | Yi-Tung F. Chan, Charles A. Shoniregun, Galyna A. Akmayeva |
A novel approach in securing DDoS attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSTST ![In: CSTST 2008: Proceedings of the 5th International Conference on Soft Computing as Transdisciplinary Science and Technology, Cergy-Pontoise, France, October 28-31, 2008, pp. 59-64, 2008, ACM, 978-1-60558-046-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
bypass guardian system (BGS), distributed denial of service (DDoS) attack, overload protection, congestion, router |
48 | Zhijun Wu 0001, Dong Zhang |
Scheme of Defending Against DDoS Attacks in Large-Scale ISP Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NPC ![In: Network and Parallel Computing, IFIP International Conference, NPC 2007, Dalian, China, September 18-21, 2007, Proceedings, pp. 296-305, 2007, Springer, 978-3-540-74783-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Distribution-based Secure Overlay Nodes (DSON), China Education & Research Network (CERNET), Large-scale ISP Network, Router, Distributed Denial of Service (DDoS) |
48 | Yu Chen 0002, Kai Hwang 0001, Yu-Kwong Kwok |
Filtering of Shrew DDoS Attacks in Frequency Domain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 15-17 November 2005, Sydney, Australia, Proceedings, pp. 786-793, 2005, IEEE Computer Society, 0-7695-2421-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
reduction of quality (RoQ), Internet traffic analysis, Network security, digital signal processing (DSP), distributed denial of service (DDoS) |
48 | Ming Li 0002, Jingao Liu, Dongyang Long |
Probability Principle of a Reliable Approach to Detect Signs of DDOS Flood Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDCAT ![In: Parallel and Distributed Computing: Applications and Technologies, 5th International Conference, PDCAT 2004, Singapore, December 8-10, 2004, Proceedings, pp. 596-599, 2004, Springer, 3-540-24013-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Anomaly intrusion detection, DDOS, statistical detection, reliability, probability, intrusion prevention |
46 | Chu-Hsing Lin, Fuu-Cheng Jiang, Wei-Shen Lai, Wei-Yuah Lee, Wei-Cheng Hsu |
Counteract SYN flooding using second chance packet filtering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICUIMC ![In: Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, ICUIMC 2009, Suwon, Korea, January 15-16, 2009, pp. 216-220, 2009, ACM, 978-1-60558-405-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
second chance packet filter, security, wireless LAN, DDoS, SYN flooding |
46 | Yongjin Kim, Ahmed Helmy |
Attacker traceback with cross-layer monitoring in wireless multi-hop networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SASN ![In: Proceedings of the 4th ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2006, Alexandria, VA, USA, October 30, 2006, pp. 123-134, 2006, ACM, 1-59593-554-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
DoS/DDoS attack, attacker traceback, cross-layer monitoring, wireless multi-hop networks |
46 | Marcus Tylutki, Karl N. Levitt |
Mitigating Distributed Denial of Service Attacks Using a Proportional-Integral-Derivative Controller. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 6th International Symposium, RAID 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings, pp. 1-16, 2003, Springer, 3-540-40878-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
PID control law, Automated Response, Denial of Service, DoS, Distributed Denial of Service, DDoS, Control Theory, Distributed Attacks |
43 | Jelena Mirkovic, Peter L. Reiher |
A taxonomy of DDoS attack and DDoS defense mechanisms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Commun. Rev. ![In: Comput. Commun. Rev. 34(2), pp. 39-53, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
42 | Hamza Rahmani, Nabil Sahli, Farouk Kamoun |
Joint Entropy Analysis Model for DDoS Attack Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 267-271, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
42 | Jelena Mirkovic, Peter L. Reiher, Christos Papadopoulos, Alefiya Hussain, Marla Shepard, Michael Berg, Robert Jung |
Testing a Collaborative DDoS Defense In a Red Team/Blue Team Exercise. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 57(8), pp. 1098-1112, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
42 | Guanhua Yan, Stephan J. Eidenbenz |
DDoS Mitigation in Non-cooperative Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Networking ![In: NETWORKING 2008, Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet , 7th International IFIP-TC6 Networking Conference, Singapore, May 5-9, 2008, Proceedings, pp. 599-611, 2008, Springer, 978-3-540-79548-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
42 | Yonghua You, Mohammad Zulkernine, Anwar Haque |
A Distributed Defense Framework for Flooding-Based DDoS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 245-252, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Unwanted Traffic, Intrusion Detection, Distributed Denial of Service |
42 | Kai Bu, Zhixin Sun |
A Method Based on AMHI for DDoS Attacks Detection and Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICYCS ![In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 1571-1576, 2008, IEEE Computer Society, 978-0-7695-3398-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
42 | Xiaolin Chen, Hui Deng, Feng Wang 0039, Mu Mu 0001, Sanglu Lu |
A Deployable Architecture against Application-level DDoS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICYCS ![In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 2180-2185, 2008, IEEE Computer Society, 978-0-7695-3398-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 2856 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|