The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for DDos with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2000-2002 (26) 2003 (40) 2004 (58) 2005 (94) 2006 (87) 2007 (92) 2008 (96) 2009 (80) 2010 (63) 2011 (56) 2012 (58) 2013 (69) 2014 (85) 2015 (94) 2016 (120) 2017 (165) 2018 (203) 2019 (210) 2020 (226) 2021 (266) 2022 (291) 2023 (318) 2024 (59)
Publication types (Num. hits)
article(1172) data(9) incollection(16) inproceedings(1636) phdthesis(23)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 538 occurrences of 244 keywords

Results
Found 2856 publication records. Showing 2856 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
122Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran, Jae-Kwang Lee Multi Layer Approach to Defend DDoS Attacks Caused by Spam. Search on Bibsonomy MUE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
112Tae Hwan Kim, Dong Seong Kim 0001, Sang Min Lee 0012, Jong Sou Park Detecting DDoS Attacks Using Dispersible Traffic Matrix and Weighted Moving Average. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Traffic visualization, Weighted moving average, Intrusion detection, Distributed Denial of Service attacks, Traffic matrix, IP spoofing
102Xin Xu, Yongqiang Sun, Zunguo Huang Defending DDoS Attacks Using Hidden Markov Models and Cooperative Reinforcement Learning. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
93Usman Tariq, Manpyo Hong, Kyung-suk Lhee A Comprehensive Categorization of DDoS Attack and DDoS Defense Techniques. Search on Bibsonomy ADMA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
92Guoxing Zhang, Shengming Jiang, Gang Wei, Quansheng Guan A prediction-based detection algorithm against distributed denial-of-service attacks. Search on Bibsonomy IWCMC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF available service rate, prediction-based detection of DDoS and low-rate TCP attacks, distributed DoS (DDoS), denial-of-service attacks (DoS)
92Hyundo Park, Peng Li 0059, Debin Gao, Heejo Lee, Robert H. Deng Distinguishing between FE and DDoS Using Randomness Check. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Flash Event, Randomness Check, Network Security, Distributed Denial of Service
86Jun (Jim) Xu, Wooyong Lee Sustaining Availability of Web Services under Distributed Denial of Service Attacks. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2003 DBLP  DOI  BibTeX  RDF World-Wide Web, game theory, Availability, survivability, Distributed Denial of Service (DDoS)
83Soon Hin Khor, Akihiro Nakao Overfort: Combating DDoS with peer-to-peer DDoS puzzle. Search on Bibsonomy IPDPS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
82Jieren Cheng, Jianping Yin, Yun Liu, Zhiping Cai, Min Li DDoS Attack Detection Algorithm Using IP Address Features. Search on Bibsonomy FAW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF IP address features value, support vector machine, network security, distributed denial of service attack
82Christos Siaterlis, Vasilis Maglaris Detecting Incoming and Outgoing DDoS Attacks at the Edge Using a Single Set of Network Characteristics. Search on Bibsonomy ISCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
82Jung-Taek Seo, Cheolho Lee, Taeshik Shon, Jongsub Moon SVM Approach with CTNT to Detect DDoS Attacks in Grid Computing. Search on Bibsonomy GCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
80Seung-Won Shin, Kwang-ho Baik, Ki-Young Kim, Jong-Soo Jang QS-Ware: The Middleware for Providing QoS and Secure Ability to Web Server. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
78Chwan-Hwa John Wu, Tong Liu Simulation for intrusion-resilient, DDoS-resistant authentication system (IDAS). Search on Bibsonomy SpringSim The full citation details ... 2008 DBLP  DOI  BibTeX  RDF computer network defense, authentication, network security, discrete event simulation, DDoS, intrusion
78Yu Chen 0002, Kai Hwang 0001, Wei-Shinn Ku Collaborative Detection of DDoS Attacks over Multiple Network Domains. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Cyber defense, network security, DDoS attacks, Internet technology
78Jian Yuan, Kevin L. Mills Monitoring the Macroscopic Effect of DDoS Flooding Attacks. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF attack dynamics, spatial-temporal pattern, monitoring, network traffic, DDoS attack
72Mohit Mehta, Kanika Thapar, George C. Oikonomou, Jelena Mirkovic Combining Speak-Up with DefCOM for Improved DDoS Defense. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
72Yi Xie 0002, Shun-Zheng Yu A Novel Model for Detecting Application Layer DDoS Attacks. Search on Bibsonomy IMSCCS (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
72Zhongwen Li, Yang Xiang 0001, Dongsheng He Simulation and Analysis of DDoS in Active Defense Environment. Search on Bibsonomy CIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
72Sanguk Noh, Cheolho Lee, Kyunghee Choi, Gihyun Jung Detecting Distributed Denial of Service (DDoS) Attacks through Inductive Learning. Search on Bibsonomy IDEAL The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
68Yi Xie 0002, Shun-Zheng Yu Monitoring the application-layer DDoS attacks for popular websites. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF popular Website, distributed denial of service (DDoS), application-layer
68Markus Goldstein, Christoph H. Lampert, Matthias Reif, Armin Stahl, Thomas M. Breuel Bayes Optimal DDoS Mitigation by Adaptive History-Based IP Filtering. Search on Bibsonomy ICN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF History-Based IP Filtering, DDoS, Bayes, Mitigation
68Pan Shi, Yifeng Lian Game-Theoretical Effectiveness Evaluation of DDoS Defense. Search on Bibsonomy ICN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF effectiveness evaluation, Game Theory, congestion control, DDoS
68Jun Yang, Ying Li 0002, Benxiong Huang, Jiuqiang Ming Preventing DDoS Attacks Based on Credit Model for P2P Streaming System. Search on Bibsonomy ATC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Distributed Denial of Service (DDoS), peer-to-peer (P2P), Credit
68Liying Li, Jianying Zhou 0001, Ning Xiao DDoS Attack Detection Algorithms Based on Entropy Computing. Search on Bibsonomy ICICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF DDoS detection, entropy computing, network security
68Igor V. Kotenko, Alexander Ulanov Simulation of Internet DDoS Attacks and Defense. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Security modeling and architecture, Security models for ambient intelligence environments, Security simulation, DDoS, Infrastructure security
68Minho Sung, Jun (Jim) Xu IP Traceback-Based Intelligent Packet Filtering: A Novel Technique for Defending against Internet DDoS Attacks. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF performance modeling and simulation, Distributed Denial of Service (DDoS), IP traceback
66Xun Wang, Sriram Chellappan, Phillip Boyer, Dong Xuan On the Effectiveness of Secure Overlay Forwarding Systems under Intelligent Distributed DoS Attacks. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Secure overlay forwarding system, DDoS attacks
63Supranamaya Ranjan, Ram Swaminathan, Mustafa Uysal, Antonio Nucci, Edward W. Knightly DDoS-shield: DDoS-resilient scheduling to counter application layer attacks. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF application layer attacks, site security monitoring, anomaly detection, information entropy, denial-of-service attacks
62Huizhong Sun, Yan Zhaung, H. Jonathan Chao A Principal Components Analysis-Based Robust DDoS Defense System. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
62Sanjam Garg, Huzur Saran Anti-DDoS Virtualized Operating System. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Performance, Virtualization, Malware, Distributed Denial of Service Attack
62Wei Zhang, Shize Guo, Kangfeng Zheng, Yixian Yang A Defending Mechanism against DDoS Based on Registration and Authentication. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
62Zonglin Li, Guangmin Hu, Dan Yang Global abnormal correlation analysis for DDoS attack detection. Search on Bibsonomy ISCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
62Keun Park, Dongwon Seo, Jaewon Yoo, Heejo Lee, Hyogon Kim Unified Rate Limiting in Broadband Access Networks for Defeating Internet Worms and DDoS Attacks. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
62Xinyu Yang, Ting Ma A Link Signature Based DDoS Attacker Tracing Algorithm under IPv6. Search on Bibsonomy FGCN (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
62Mihui Kim, Jaewon Seo, Kijoon Chae Integrated Notification Architecture Based on Overlay Against DDoS Attacks on Convergence Network. Search on Bibsonomy SEUS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
62Yunhao Liu 0001, Xiaomei Liu, Chen Wang 0010, Li Xiao 0001 Defending P2Ps from Overlay Flooding-based DDoS. Search on Bibsonomy ICPP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
62Paulo E. Ayres, H. Sun, H. Jonathan Chao, Wing Cheong Lau ALPi: A DDoS Defense System for High-Speed Networks. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
62Jian Kang 0001, Yuan Zhang, Jiu-bin Ju A Formalized Taxonomy of DDoS Attacks Based on Similarity. Search on Bibsonomy ISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
62Yang Xiang 0001, Wanlei Zhou 0001 Intelligent DDoS Packet Filtering in High-Speed Networks. Search on Bibsonomy ISPA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
62Jung-Taek Seo, Cheolho Lee, Jongsub Moon Defending DDoS Attacks Using Network Traffic Analysis and Probabilistic Packet Drop. Search on Bibsonomy GCC Workshops The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
62Bin Xiao 0001, Wei Chen 0006, Yanxiang He A Novel Technique for Detecting DDoS Attacks at Its Early Stage. Search on Bibsonomy ISPA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
62Lukas Ruf, Arno Wagner, Károly Farkas, Bernhard Plattner A Detection and Filter System for Use Against Large-Scale DDoS Attacks in the Internet Backbone. Search on Bibsonomy IWAN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
62Roshan K. Thomas, Brian L. Mark, Tommy Johnson, James Croall NetBouncer: Client-legitimacy-based High-performance DDoS Filtering. Search on Bibsonomy DISCEX (1) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
62Jelena Mirkovic, Max Robinson, Peter L. Reiher Alliance formation for DDoS defense. Search on Bibsonomy NSPW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
60Rasool Jalili, Fatemeh Imani-Mehr, Morteza Amini, Hamid Reza Shahriari Detection of Distributed Denial of Service Attacks Using Statistical Pre-processor and Unsupervised Neural Networks. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
60Hyung-Woo Lee Advanced Packet Marking Mechanism with Pushback for IP Traceback. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
58Anjali Sardana, Ramesh Chandra Joshi Dual-level defense for networks under DDoS attacks. Search on Bibsonomy SAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF entropy, detection, DDoS, Honeypots, characterization
58Ke Li, Wanlei Zhou 0001, Shui Yu 0001, Bo Dai 0006 Effective DDoS Attacks Detection Using Generalized Entropy Metric. Search on Bibsonomy ICA3PP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF generalized entropy, DDoS, attacks detection
58George S. Oreku, Jianzhong Li 0001, Tamara Pazynyuk An application-driven perspective on wireless devises security: the case of distributed denial-of-service (ddos). Search on Bibsonomy PM2HW2N The full citation details ... 2007 DBLP  DOI  BibTeX  RDF handheld devices, distributed denial of service attacks (DDoS), wireless sensor nodes
58Bin Xiao 0001, Wei Chen 0006, Yanxiang He A novel approach to detecting DDoS Attacks at an Early Stage. Search on Bibsonomy J. Supercomput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cooperative Detection, Bloom Filter, DDoS Attack
58Junfeng Tian, Min Peng, Yuling Liu A New Active DDoS Defense System Based on Automatic Learning. Search on Bibsonomy ASIAN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF active defense, neural network, statistical analysis, DDoS, traffic monitoring
58Hyung-Woo Lee, Taekyoung Kwon 0002, Hyung-Jong Kim 0002 NS-2 Based IP Traceback Simulation Against Reflector Based DDoS Attack. Search on Bibsonomy AIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Reflector Attack, Simulation, DDoS, NS-2, IP Traceback
58Haining Wang, Kang G. Shin Transport-Aware IP Routers: A Built-In Protection Mechanism to Counter DDoS Attacks. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Distributed Denial of Service (DDoS) attacks, layer-4 differentiation, resource isolation, packet classification
56Dongqi Wang, Guiran Chang, Xiaoshuo Feng, Rui Guo Research on the Detection of Distributed Denial of Service Attacks Based on the Characteristics of IP Flow. Search on Bibsonomy NPC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Neural Network, Detection, DDoS, IP Flow
56Chwan-Hwa John Wu, Chun-Ching Andy Huang, J. David Irwin Using Identity-Based Privacy-Protected Access Control Filter (IPACF) to against denial of service attacks and protect user privacy. Search on Bibsonomy SpringSim (3) The full citation details ... 2007 DBLP  BibTeX  RDF privacy, network security, DDoS, wireless security
56Udaya Kiran Tupakula, Vijay Varadharajan Analysis of traceback techniques. Search on Bibsonomy ACSW The full citation details ... 2006 DBLP  BibTeX  RDF DoS, denial of service, DDoS, traceback
52Mun Choon Chan, Ee-Chien Chang, Liming Lu, Peng Song Ngiam Effect of Malicious Synchronization. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Distributed Denial of Service (DDoS) attacks, low rate DDoS attack, herding, synchronization, Network security, periodicity
52Anna T. Lawniczak, Hao Wu 0002, Bruno N. Di Stefano Entropy Based Detection of DDoS Attacks in Packet Switching Network Models. Search on Bibsonomy Complex (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF entropy, packet switching network, distributed denial of service attack
52Ashley Chonka, Wanlei Zhou 0001, Jaipal Singh, Yang Xiang 0001 Detecting and Tracing DDoS Attacks by Intelligent Decision Prototype. Search on Bibsonomy PerCom The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Intelligent Decision Prototype, Machine Learning, Decision trees, Distributed Denial of Service, IP Traceback
52Shui Yu 0001, Wanlei Zhou 0001 Entropy-Based Collaborative Detection of DDOS Attacks on Community Networks. Search on Bibsonomy PerCom The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
52Brij B. Gupta, Manoj Misra, Ramesh Chandra Joshi FVBA: A combined statistical approach for low rate degrading and high bandwidth disruptive DDoS attacks detection in ISP domain. Search on Bibsonomy ICON The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
52Yun Huang 0001, Xianjun Geng, Andrew B. Whinston Defeating DDoS attacks by fixing the incentive chain. Search on Bibsonomy ACM Trans. Internet Techn. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, Denial-of-service, incentive, pricing
52Yi Shi, Xinyu Yang, Huijun Zhu A Flooding-Based DoS/DDoS Detecting Algorithm Based on Traffic Measurement and Prediction. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
52Yong Cui 0001, Lingjian Song, Ke Xu 0002 RCS: A Distributed Mechanism Against Link Flooding DDoS Attacks. Search on Bibsonomy ICOIN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
52Hyung-Woo Lee SVM Based Packet Marking Technique for Traceback on Malicious DDoS Traffic. Search on Bibsonomy ICOIN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
52Naoum Naoumov, Keith W. Ross Exploiting P2P systems for DDoS attacks. Search on Bibsonomy Infoscale The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
52George C. Oikonomou, Jelena Mirkovic, Peter L. Reiher, Max Robinson A Framework for a Collaborative DDoS Defense. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
52Shigang Chen, Qingguo Song Perimeter-Based Defense against High Bandwidth DDoS Attacks. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Network-level security and protection
52Lan Li, Gyungho Lee DDoS Attack Detection and Wavelets. Search on Bibsonomy Telecommun. Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF energy distribution, distributed denial of service, wavelet analysis, traffic characterization, attack detection
52Jung-Taek Seo, Cheolho Lee, Jungtae Kim, Taeshik Shon, Jongsub Moon Probabilistic Packet Filtering Model to Protect Web Server from DDoS Attacks. Search on Bibsonomy NPC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
52Jun Zheng, Ming-Zeng Hu Intrusion Detection of DoS/DDoS and Probing Attacks for Web Services. Search on Bibsonomy WAIM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
52Jung-Taek Seo, Cheolho Lee, Jungtae Kim, Taeshik Shon, Jongsub Moon PPF Model with CTNT to Defend Web Server from DDoS Attack. Search on Bibsonomy EUC Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
52Yanxiang He, Wei Chen 0006, Wenling Peng, Min Yang 0001 Efficient and Beneficial Defense Against DDoS Direct Attack and Reflector Attack. Search on Bibsonomy ISPA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
52Yang Xiang 0001, Wanlei Zhou 0001 Safeguard Information Infrastructure Against DDoS Attacks: Experiments and Modeling. Search on Bibsonomy CANS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
52Eric Y. Chen, Akinori Yonezawa Practical techniques for defending against DDoS attacks. Search on Bibsonomy AICCSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
52Sleiman Itani, Najwa Aaraj, Darine Abdelahad, Ayman I. Kayssi Neighbor stranger discrimination: a new defense mechanism against Internet DDOS attacks. Search on Bibsonomy AICCSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
52Yi Shi, Xinyu Yang A Novel Architecture for Detecting and Defending Against Flooding-Based DDoS Attacks. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
52Guoyin Zhang, Jian Li, Guo-Chang Gu Research on defending DDoS attack - an expert system approach. Search on Bibsonomy SMC (4) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
52Xinyu Yang, Yong Liu, Ming Zeng, Yi Shi A Novel DDoS Attack Detecting Algorithm Based on the Continuous Wavelet Transform. Search on Bibsonomy AWCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
52Eric Y. K. Chan, H. W. Chan, K. M. Chan, Vivien P. S. Chan, Samuel T. Chanson, Matthew M. H. Cheung, C. F. Chong, Kam-Pui Chow, Albert K. T. Hui, Lucas Chi Kwong Hui, Luke C. K. Lam, W. C. Lau, Kevin K. H. Pun, Anthony Y. F. Tsang, Wai Wan Tsang, Sam C. W. Tso, Dit-Yan Yeung, Kwun Yin Yu IDR: An Intrusion Detection Router for Defending against Distributed Denial-of-Service (DDoS) Attacks. Search on Bibsonomy ISPAN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
52Abraham Yaar, Adrian Perrig, Dawn Xiaodong Song Pi: A Path Identification Mechanism to Defend against DDoS Attack. Search on Bibsonomy S&P The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
52Minho Sung, Jun (Jim) Xu IP Traceback-Based Intelligent Packet Filtering: A Novel Technique for Defending against Internet DDoS Attacks. Search on Bibsonomy ICNP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
50Yuh-Min Tseng Efficient authenticated key agreement protocols resistant to a denial-of-service attack. Search on Bibsonomy Int. J. Netw. Manag. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
48Jie Yu 0008, Chengfang Fang, Liming Lu, Zhoujun Li 0001 A Lightweight Mechanism to Mitigate Application Layer DDoS Attacks. Search on Bibsonomy Infoscale The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Trust, DDoS Attacks, Lightweight, Application layer
48Do-Yoon Ha, Hwan-Kuk Kim, KyoungHee Ko, Chang-Yong Lee, JeongWook Kim, Hyun-Cheol Jeong Design and implementation of SIP-aware DDoS attack detection system. Search on Bibsonomy ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF IP telephony security, session initiation protocol, DDoS
48Rui Guo, Guiran Chang, Yuhai Qin, Baojing Sun, An Liu, Bencheng Zhang, Dan Peng DG-Based Active Defense Strategy to Defend against DDoS. Search on Bibsonomy MUE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Active defense, Nash Equilibrium, DDoS, Differential Games
48Yi-Tung F. Chan, Charles A. Shoniregun, Galyna A. Akmayeva A novel approach in securing DDoS attack. Search on Bibsonomy CSTST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF bypass guardian system (BGS), distributed denial of service (DDoS) attack, overload protection, congestion, router
48Zhijun Wu 0001, Dong Zhang Scheme of Defending Against DDoS Attacks in Large-Scale ISP Networks. Search on Bibsonomy NPC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Distribution-based Secure Overlay Nodes (DSON), China Education & Research Network (CERNET), Large-scale ISP Network, Router, Distributed Denial of Service (DDoS)
48Yu Chen 0002, Kai Hwang 0001, Yu-Kwong Kwok Filtering of Shrew DDoS Attacks in Frequency Domain. Search on Bibsonomy LCN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF reduction of quality (RoQ), Internet traffic analysis, Network security, digital signal processing (DSP), distributed denial of service (DDoS)
48Ming Li 0002, Jingao Liu, Dongyang Long Probability Principle of a Reliable Approach to Detect Signs of DDOS Flood Attacks. Search on Bibsonomy PDCAT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Anomaly intrusion detection, DDOS, statistical detection, reliability, probability, intrusion prevention
46Chu-Hsing Lin, Fuu-Cheng Jiang, Wei-Shen Lai, Wei-Yuah Lee, Wei-Cheng Hsu Counteract SYN flooding using second chance packet filtering. Search on Bibsonomy ICUIMC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF second chance packet filter, security, wireless LAN, DDoS, SYN flooding
46Yongjin Kim, Ahmed Helmy Attacker traceback with cross-layer monitoring in wireless multi-hop networks. Search on Bibsonomy SASN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF DoS/DDoS attack, attacker traceback, cross-layer monitoring, wireless multi-hop networks
46Marcus Tylutki, Karl N. Levitt Mitigating Distributed Denial of Service Attacks Using a Proportional-Integral-Derivative Controller. Search on Bibsonomy RAID The full citation details ... 2003 DBLP  DOI  BibTeX  RDF PID control law, Automated Response, Denial of Service, DoS, Distributed Denial of Service, DDoS, Control Theory, Distributed Attacks
43Jelena Mirkovic, Peter L. Reiher A taxonomy of DDoS attack and DDoS defense mechanisms. Search on Bibsonomy Comput. Commun. Rev. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
42Hamza Rahmani, Nabil Sahli, Farouk Kamoun Joint Entropy Analysis Model for DDoS Attack Detection. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
42Jelena Mirkovic, Peter L. Reiher, Christos Papadopoulos, Alefiya Hussain, Marla Shepard, Michael Berg, Robert Jung Testing a Collaborative DDoS Defense In a Red Team/Blue Team Exercise. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
42Guanhua Yan, Stephan J. Eidenbenz DDoS Mitigation in Non-cooperative Environments. Search on Bibsonomy Networking The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
42Yonghua You, Mohammad Zulkernine, Anwar Haque A Distributed Defense Framework for Flooding-Based DDoS Attacks. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Unwanted Traffic, Intrusion Detection, Distributed Denial of Service
42Kai Bu, Zhixin Sun A Method Based on AMHI for DDoS Attacks Detection and Defense. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
42Xiaolin Chen, Hui Deng, Feng Wang 0039, Mu Mu 0001, Sanglu Lu A Deployable Architecture against Application-level DDoS Attacks. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 2856 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license