|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1332 occurrences of 792 keywords
|
|
|
Results
Found 12185 publication records. Showing 10178 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
179 | Siyuan Xin, Xingyuan Chen, Huilin Tang, Ning Zhu |
Research on DoS Atomic Attack Oriented to Attack Resistance Test. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNSC ![In: Proceedings of the IEEE International Conference on Networking, Sensing and Control, ICNSC 2008, Hainan, China, 6-8 April 2008, pp. 1747-1752, 2008, IEEE, 978-1-4244-1685-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
86 | Imad Aad, Jean-Pierre Hubaux, Edward W. Knightly |
Impact of denial of service attacks on ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE/ACM Trans. Netw. ![In: IEEE/ACM Trans. Netw. 16(4), pp. 791-802, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
black hole attacks, ad hoc networks, DoS attacks |
86 | Mudhakar Srivatsa, Arun Iyengar, Jian Yin 0002, Ling Liu 0001 |
A Client-Transparent Approach to Defend Against Denial of Service Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SRDS ![In: 25th IEEE Symposium on Reliable Distributed Systems (SRDS 2006),2-4 October 2006, Leeds, UK, pp. 61-70, 2006, IEEE Computer Society, 0-7695-2677-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Client Transparency, Denial of Service (DoS) attacks, Authentication, Availability, Web Servers |
86 | Imad Aad, Jean-Pierre Hubaux, Edward W. Knightly |
Denial of service resilience in ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiCom ![In: Proceedings of the 10th Annual International Conference on Mobile Computing and Networking, MOBICOM 2004, 2004, Philadelphia, PA, USA, September 26 - October 1, 2004, pp. 202-215, 2004, ACM, 1-58113-868-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
ad hoc networks, TCP, UDP, DoS attacks |
79 | Alex Wun, Alex King Yeung Cheung, Hans-Arno Jacobsen |
A taxonomy for denial of service attacks in content-based publish/subscribe systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEBS ![In: Proceedings of the 2007 Inaugural International Conference on Distributed Event-Based Systems, DEBS 2007, Toronto, Ontario, Canada, June 20-22, 2007, pp. 116-127, 2007, ACM, 978-1-59593-665-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
security, denial of service, publish/subscribe |
74 | Amey Shevtekar, Nirwan Ansari |
A Proactive Test Based Differentiation Technique to Mitigate Low Rate DoS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCN ![In: Proceedings of the 16th International Conference on Computer Communications and Networks, IEEE ICCCN 2007, Turtle Bay Resort, Honolulu, Hawaii, USA, August 13-16, 2007, pp. 639-644, 2007, IEEE, 978-1-4244-1251-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
69 | Clayton Bolz, Gordon W. Romney, Brandon L. Rogers |
Safely train security engineers regarding the dangers presented by denial of service attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGITE Conference ![In: Proceedings of the 5th Conference on Information Technology Education, SIGITE 2004, 2004, Salt Lake City, UT, USA, October 28-30, 2004, pp. 66-72, 2004, ACM, 1-58113-936-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
DoS lab, isolated lab, network security, information technology, DDoS |
65 | Tsuyoshi Chiba, Takashi Katoh, Bhed Bahadur Bista, Toyoo Takata |
DoS Packet Filter Using DNS Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (1) ![In: 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 18-20 April 2006, Vienna, Austria, pp. 116-131, 2006, IEEE Computer Society, 0-7695-2466-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
63 | Xiangbin Cheng, Jun Bi, Xing Li |
Swing - A Novel Mechanism Inspired by Shim6 Address-Switch Conception to Limit the Effectiveness of DoS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICN ![In: Seventh International Conference on Networking (ICN 2008), 13-18 April 2008, Cancun, Mexico, pp. 267-272, 2008, IEEE Computer Society, 978-0-7695-3106-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
IPv6, Shim6, DoS attack |
62 | Yuh-Min Tseng |
Efficient authenticated key agreement protocols resistant to a denial-of-service attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Netw. Manag. ![In: Int. J. Netw. Manag. 15(3), pp. 193-202, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
60 | Mudhakar Srivatsa, Arun Iyengar, Jian Yin 0002, Ling Liu 0001 |
Mitigating application-level denial of service attacks on Web servers: A client-transparent approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Web ![In: ACM Trans. Web 2(3), pp. 15:1-15:49, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
client transparency, game theory, Web servers, DoS Attacks |
56 | Ming Luo, Tao Peng 0002, Christopher Leckie |
CPU-based DoS attacks against SIP servers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NOMS ![In: IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, NOMS 2008, 7-11 April 2008, Salvador, Bahia, Brazil, pp. 41-48, 2008, IEEE, 978-1-4244-2066-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
56 | Bosheng Zhou, Alan Marshall 0001, Wenzhe Zhou, Kun Yang |
A Random Packet Destruction DoS Attack for Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2008, Beijing, China, 19-23 May 2008, pp. 1658-1662, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
56 | Daniel Boteanu, José M. Fernandez 0001, John McHugh, John Mullins |
Queue Management as a DoS Counter-Measure? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings, pp. 263-280, 2007, Springer, 978-3-540-75495-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
degradation of service attack, dynamic timeout, timeout, queue management, Denial of service attack |
56 | MyungSik Choi, Dong Jin Kwak, Sang-Jae Moon |
A Proposal for DoS-Defensive Internet Key Exchange. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2003, International Conference, Montreal, Canada, May 18-21, 2003, Proceedings, Part II, pp. 328-337, 2003, Springer, 3-540-40161-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Internet Key Exchange, Authentication and Key Agreement, Denial of Service, IPsec |
56 | Domenico Cotroneo, L. Peluso, Simon Pietro Romano, Giorgio Ventre |
An active security protocol against DoS attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the Seventh IEEE Symposium on Computers and Communications (ISCC 2002), 1-4 July 2002, Taormina, Italy, pp. 496-501, 2002, IEEE Computer Society, 0-7695-1671-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Network Security, Denial of Service, Signaling protocols |
55 | Sazia Parvin, Shohrab Ali, Song Han 0004, Tharam S. Dillon |
Security against DOS attack in mobile IP communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 152-157, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
care-of-address (coa), correspondent node (cn), denial-of-service (dos), distributed denial-of-service (ddos), foreign agent (fa), home agent (ha), mobile host (mh), mobile node (mn) |
55 | Peng Ning, An Liu, Wenliang Du |
Mitigating DoS attacks against broadcast authentication in wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Sens. Networks ![In: ACM Trans. Sens. Networks 4(1), pp. 1:1-1:35, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security, Sensor networks, broadcast authentication, DoS attacks |
55 | Qi Dong 0001, Donggang Liu, Peng Ning |
Pre-authentication filters: providing dos resistance for signature-based broadcast authentication in sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the First ACM Conference on Wireless Network Security, WISEC 2008, Alexandria, VA, USA, March 31 - April 02, 2008, pp. 2-12, 2008, ACM, 978-1-59593-814-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security, sensor networks, broadcast authentication, DoS attacks |
55 | Valerio Schiavoni, Vivien Quéma |
A posteriori defensive programming: an annotation toolkit for DoS-resistant component-based architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), Dijon, France, April 23-27, 2006, pp. 1734-1738, 2006, ACM, 1-59593-108-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
components, aspect-oriented programming, annotations, DoS attacks |
53 | Jelena Mirkovic, Peter L. Reiher, Sonia Fahmy, Roshan K. Thomas, Alefiya Hussain, Stephen Schwab, Calvin Ko |
Measuring denial Of service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QoP ![In: Proceedings of the 2nd ACM Workshop on Quality of Protection, QoP 2006, Alexandria, VA, USA, October 30, 2006, pp. 53-58, 2006, ACM, 1-59593-553-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
metrics, denial of service |
53 | Ting Xue, Natalija Vlajic |
Analytical and Simulation Based Evaluation of Wireless-to-Wireline TCP-SYN Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCECE ![In: Proceedings of the Canadian Conference on Electrical and Computer Engineering, CCECE 2006, May 7-10, 2006, Ottawa Congress Centre, Ottawa, Canada, pp. 746-749, 2006, IEEE, 1-4244-0038-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
53 | Srinivas Mukkamala, Andrew H. Sung |
A framework for countering denial of service attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SMC (4) ![In: Proceedings of the IEEE International Conference on Systems, Man & Cybernetics: The Hague, Netherlands, 10-13 October 2004, pp. 3273-3278, 2004, IEEE, 0-7803-8566-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
53 | Kevin Lacoble |
Designing user services on a PC LAN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 15th Annual ACM SIGUCCS Conference on User Services, Kansas City, Missouri, USA, 1987, pp. 367-376, 1987, ACM, 0-89791-241-1. The full citation details ...](Pics/full.jpeg) |
1987 |
DBLP DOI BibTeX RDF |
|
50 | Guoxing Zhang, Shengming Jiang, Gang Wei, Quansheng Guan |
A prediction-based detection algorithm against distributed denial-of-service attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, IWCMC 2009, Leipzig, Germany, June 21-24, 2009, pp. 106-110, 2009, ACM, 978-1-60558-569-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
available service rate, prediction-based detection of DDoS and low-rate TCP attacks, distributed DoS (DDoS), denial-of-service attacks (DoS) |
47 | Yu Zhang 0034, Xingshe Zhou 0001, Yee Wei Law, Marimuthu Palaniswami |
Insider DoS Attacks on Epidemic Propagation Strategies of Network Reprogramming in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 263-266, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Hailun Tan, Diethelm Ostry, John Zic, Sanjay K. Jha |
A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009, pp. 245-252, 2009, ACM, 978-1-60558-460-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
code dissemination protocols, sensor network security, broadcast authentication, code distribution |
47 | Hakem Beitollahi, Geert Deconinck |
FOSeL: Filtering by Helping an Overlay Security Layer to Mitigate DoS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NCA ![In: Proceedings of The Seventh IEEE International Symposium on Networking Computing and Applications, NCA 2008, July 10-12, 2008, Cambridge, Massachusetts, USA, pp. 19-28, 2008, IEEE Computer Society, 978-0-7695-3192-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
47 | Sherif M. Khattab, Sameh Gobriel, Rami G. Melhem, Daniel Mossé |
Live Baiting for Service-Level DoS Attackers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: INFOCOM 2008. 27th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 13-18 April 2008, Phoenix, AZ, USA, pp. 171-175, 2008, IEEE, 978-1-4244-2026-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
47 | Pravin Shinde, Srinivas Guntupalli |
Early DoS Attack Detection using Smoothened Time-Series andWavelet Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Third International Symposium on Information Assurance and Security, IAS 2007, August 29-31, 2007, Manchester, United Kingdom, pp. 215-220, 2007, IEEE Computer Society, 978-0-7695-2876-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
47 | Zhen Cao, Zhi Guan, Zhong Chen 0001, Jian-bin Hu, Liyong Tang |
An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007, Proceedings, pp. 129-144, 2007, Springer, 978-3-540-72159-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
47 | Sirikarn Pukkawanna, Vasaka Visoottiviseth, Panita Pongpaibool |
Lightweight Detection of DoS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICON ![In: Proceedings of the 15th IEEE International Conference on Networks, ICON 2007, 19-21 November 2007, Adelaide, Australia, pp. 77-82, 2007, IEEE, 1-4244-1230-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
47 | Stephen Frechette, Dimiter R. Avresky |
A Proxy Network Topology and Reconfiguration Algorithm for Resistance to DoS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NCA ![In: Fifth IEEE International Symposium on Network Computing and Applications, NCA 2006, 24-26 July 2006, Cambridge, Massachusetts, USA, pp. 137-144, 2006, IEEE Computer Society, 0-7695-2640-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
47 | Taieb Znati, James Amadei, Daniel R. Pazehoski, Scott Sweeny |
Design and Analysis of an Adaptive, Global Strategy for Detecting and Mitigating Distributed DoS Attacks in GRID Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Annual Simulation Symposium ![In: Proceedings 39th Annual Simulation Symposium (ANSS-39 2006), 2-6 April 2006, Huntsville, Alabama, USA, pp. 2-9, 2006, IEEE Computer Society, 0-7695-2559-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
47 | Byung Ryong Kim, Ki-Chang Kim |
Improved Technique of IP Address Fragmentation Strategies for DoS Attack Traceback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSR ![In: Computer Science - Theory and Applications, First International Symposium on Computer Science in Russia, CSR 2006, St. Petersburg, Russia, June 8-12, 2006, Proceedings, pp. 427-437, 2006, Springer, 3-540-34166-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
47 | Wenjie Wang 0006, Yongqiang Xiong, Qian Zhang 0001, Sugih Jamin |
Ripple-Stream: Safeguarding P2P Streaming Against Dos Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICME ![In: Proceedings of the 2006 IEEE International Conference on Multimedia and Expo, ICME 2006, July 9-12 2006, Toronto, Ontario, Canada, pp. 1417-1420, 2006, IEEE Computer Society, 1-4244-0367-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
47 | Xiaoming Fu 0001, Jon Crowcroft |
GONE: an infrastructure overlay for resilient, DoS-limiting networking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NOSSDAV ![In: Network and Operating System Support for Digital Audio and Video, 16th International Workshop, NOSSDAV 2006, Newport, Rhode Island, USA, November 22-23, 2006, Proceedings, pp. 18, 2006, ACM, 1-59593-285-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
general internet signaling transport, overlay networking, denial-of-service, resilience, host identity protocol |
47 | Fanglu Guo, Jiawu Chen, Tzi-cker Chiueh |
Spoof Detection for Preventing DoS Attacks against DNS Servers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: 26th IEEE International Conference on Distributed Computing Systems (ICDCS 2006), 4-7 July 2006, Lisboa, Portugal, pp. 37, 2006, IEEE Computer Society, 0-7695-2540-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
47 | Takayuki Furuya, Takahiro Matsuzaki, Kanta Matsuura |
Detection of Unknown DoS Attacks by Kolmogorov-Complexity Fluctuation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISC ![In: Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings, pp. 395-406, 2005, Springer, 3-540-30855-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
47 | Jun Zheng, Ming-Zeng Hu |
Intrusion Detection of DoS/DDoS and Probing Attacks for Web Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WAIM ![In: Advances in Web-Age Information Management, 6th International Conference, WAIM 2005, Hangzhou, China, October 11-13, 2005, Proceedings, pp. 333-344, 2005, Springer, 3-540-29227-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
47 | Chung-Hsin Liu, Po-Cheng Teng, Chun-Lin Lo, Kuo-Hao Lee |
The study of the wireless network DoS attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIS ![In: Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human (ICIS 2009), Seoul, Korea, 24-26 November 2009, pp. 418-421, 2009, ACM, 978-1-60558-710-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
routing, DoS, NS2 |
47 | Gaston Ormazabal, Sarvesh Nagpal, Eilon Yardeni, Henning Schulzrinne |
Secure SIP: A Scalable Prevention Mechanism for DoS Attacks on SIP Based VoIP Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPTComm ![In: Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks, Second International Conference, IPTComm 2008, Heidelberg, Germany, July 1-2, 2008. Revised Selected Papers, pp. 107-132, 2008, Springer, 978-3-540-89053-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Signaling Attacks, Application Layer Firewall, Security, Scalability, Distributed Computing, SIP, VoIP, DoS, DDoS, Deep Packet Inspection |
47 | Brent Waters, Ari Juels, J. Alex Halderman, Edward W. Felten |
New client puzzle outsourcing techniques for DoS resistance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington, DC, USA, October 25-29, 2004, pp. 246-256, 2004, ACM, 1-58113-961-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
DoS, denial-of-service, client puzzles |
47 | Charlie Kaufman, Radia J. Perlman, Bill Sommerfeld |
DoS protection for UDP-based protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, Washington, DC, USA, October 27-30, 2003, pp. 2-7, 2003, ACM, 1-58113-738-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
buffer exhaustion, network security, DoS, denial of service, fragmentation, IPsec, protocol design, IKE |
47 | Daniel B. Faria, David R. Cheriton |
DoS and authentication in wireless public access networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Workshop on Wireless Security ![In: Proceedings of the 2002 ACM Workshop on Wireless Security, Atlanta, GA, USA, September 28, 2002, pp. 47-56, 2002, ACM, 1-58113-585-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
security, wireless networks, DoS |
47 | Richard R. N. Eller |
A Modern APL Windows User Interface with DOS Downwards Compatibility: the Solution for two Years Onwards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APL ![In: Proceedings of the International Conference on APL 1993, Toronto, Ontario, Canada, August 15-19, 1993., pp. 88-96, 1993, ACM, 0-89791-612-3. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
APL, Windows, DOS |
46 | Sheraz Naseer, Muhammad Younus, Attiq Ahmed |
Vulnerabilities Exposing IEEE 802.16e Networks to DoS Attacks: A Survey. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD ![In: Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2008, In conjunction with Second International Workshop on Advanced Internet Technology and Applications, August 6-8, 2008, Phuket, Thailand, pp. 344-349, 2008, IEEE Computer Society, 978-0-7695-3263-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
IEEE 802.16e security, Multi- and broadcast service shared key vulnerability, WiMAX, DoS Attacks |
46 | Yajuan Tang, Xiapu Luo, Rocky K. C. Chang |
Protecting Internet Services from Low-Rate DoS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection ![In: Critical Infrastructure Protection, Post-Proceedings of the First Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection, Dartmouth College, Hanover, New Hampshire, USA, March 19-21, 2007, pp. 251-265, 2007, Springer, 978-0-387-75461-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
low-rate DoS attacks, detection, Feedback control, countermeasures |
46 | Ivan Martinovic, Frank A. Zdarsky, Jens B. Schmitt |
Regional-based authentication against dos attacks in wireless networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Q2SWinet ![In: Q2SWinet'07 - Proceedings of the Third ACM Workshop on Q2S and Security for Wireless and Mobile Networks, Chania, Crete Island, Greece, October 22, 2007, pp. 176-179, 2007, ACM, 978-1-59593-806-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
denial-of-service (DoS) attacks, wireless LAN, impersonation attacks |
46 | Kuo Dong, Shoubao Yang, Shaolin Wang |
Analysis of low-rate TCP DoS attack against FAST TCP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISDA (3) ![In: Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications (ISDA 2006), October 16-18, 2006, Jinan, China, pp. 86-91, 2006, IEEE Computer Society, 0-7695-2528-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Denial of Service(DoS), RTO, TCP Reno, FAST TCP |
46 | Haining Wang, Danlu Zhang, Kang G. Shin |
Change-Point Monitoring for the Detection of DoS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 1(4), pp. 193-208, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
CUSUM algorithm, protocol behavior, intrusion detection, DoS attacks |
44 | Dong Zheng 0004, Weiyan Ge, Junshan Zhang |
Distributed Opportunistic Scheduling for Ad Hoc Networks With Random Access: An Optimal Stopping Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Theory ![In: IEEE Trans. Inf. Theory 55(1), pp. 205-222, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
44 | Hakem Beitollahi, Geert Deconinck |
An overlay protection layer against Denial-of-Service attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 22nd IEEE International Symposium on Parallel and Distributed Processing, IPDPS 2008, Miami, Florida USA, April 14-18, 2008, pp. 1-8, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
44 | Gal Badishi, Amir Herzberg, Idit Keidar, Oleg Romanov, Avital Yachin |
An Empirical Study of Denial of Service Mitigation Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SRDS ![In: 27th IEEE Symposium on Reliable Distributed Systems (SRDS 2008), Napoli, Italy, October 6-8, 2008, pp. 115-124, 2008, IEEE Computer Society, 978-0-7695-3410-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
44 | Chwan-Hwa John Wu, Chun-Ching Andy Huang, J. David Irwin |
Using Identity-Based Privacy-Protected Access Control Filter (IPACF) to against denial of service attacks and protect user privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SpringSim (3) ![In: Proceedings of the 2007 Spring Simulation Multiconference, SpringSim 2007, Norfolk, Virginia, USA, March 25-29, 2007, Volume 3, pp. 362-369, 2007, SCS/ACM, 1-56555-314-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
privacy, network security, DDoS, wireless security |
44 | Jelena Mirkovic, Alefiya Hussain, Brett Wilson, Sonia Fahmy, Peter L. Reiher, Roshan K. Thomas, Wei-Min Yao, Stephen Schwab |
Towards user-centric metrics for denial-of-service measurement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Experimental Computer Science ![In: Proceedings of the Workshop on Experimental Computer Science, Part of ACM FCRC, San Diego, CA, USA, 13-14 June 2007, pp. 8, 2007, ACM, 978-1-59593-751-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
metrics, denial of service |
44 | Yinqing Li, Jianhui Chen |
A Denial-of-Service Resistant Authentication Solution for Security Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IITA ![In: Proceedings of the Workshop on Intelligent Information Technology Application, IITA 2007, Zhang Jiajie, China, December 2-3, 2007, pp. 103-106, 2007, IEEE Computer Society, 0-7695-3063-X. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Dong Seong Kim 0001, Sang Min Lee 0018, Jong Sou Park |
Toward Lightweight Detection and Visualization for Denial of Service Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MICAI ![In: MICAI 2006: Advances in Artificial Intelligence, 5th Mexican International Conference on Artificial Intelligence, Apizaco, Mexico, November 13-17, 2006, Proceedings, pp. 632-640, 2006, Springer, 3-540-49026-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Chia-Mei Chen, Bingchiang Jeng, Chia Ru Yang, Gu Hsin Lai |
Tracing Denial of Service Origin: Ant Colony Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EvoWorkshops ![In: Applications of Evolutionary Computing, EvoWorkshops 2006: EvoBIO, EvoCOMNET, EvoHOT, EvoIASP, EvoINTERACTION, EvoMUSART, and EvoSTOC, Budapest, Hungary, April 10-12, 2006, Proceedings, pp. 286-295, 2006, Springer, 3-540-33237-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Scott Fowler, Sherali Zeadally |
Defending against Distributed Denial of Service (DDoS) Attacks with Queue Traffic Differentiation over Micro-MPLS-based Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSNC ![In: Proceedings of the International Conference on Systems and Networks Communications (ICSNC 2006), October 29 - November 3, 2006, Papeete, Tahiti, French Polynesia, pp. 8, 2006, IEEE Computer Society, 0-7695-2699-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Mudhakar Srivatsa, Arun Iyengar, Jian Yin 0002, Ling Liu 0001 |
A Middleware System for Protecting Against Application Level Denial of Service Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Middleware ![In: Middleware 2006, ACM/IFIP/USENIX 7th International Middleware Conference, Melbourne, Australia, November 27-December 1, 2006, Proceedings, pp. 260-280, 2006, Springer, 3-540-49023-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Srinivas Mukkamala, Andrew H. Sung |
Computational Intelligent Techniques for Detecting Denial of Service Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEA/AIE ![In: Innovations in Applied Artificial Intelligence, 17th International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems, IEA/AIE 2004, Ottawa, Canada, May 17-20, 2004. Proceedings, pp. 616-624, 2004, Springer, 3-540-22007-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
43 | Yongjin Kim |
ATTENTION: ATTackEr Traceback Using MAC Layer AbNormality DetecTION. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISA ![In: Advances in Information Security and Assurance, Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings, pp. 239-249, 2009, Springer, 978-3-642-02616-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
DoS, DDoS, Traceback |
42 | Manhee Lee, Eun Jung Kim 0001 |
A Comprehensive Framework for Enhancing Security in InfiniBand Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 18(10), pp. 1393-1406, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Cluster Security, InfiniBand Architecture, Galois/Counter Mode, Availability DoS, Authentication, Encryption |
42 | Joseph Chee Ming Teo, Chik How Tan, Jim Mee Ng |
Denial-of-service attack resilience dynamic group key agreement for heterogeneous networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Telecommun. Syst. ![In: Telecommun. Syst. 35(3-4), pp. 141-160, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Authenticated group key agreement, Dynamic group membership, Heterogeneous networks, Secure group communication, DoS attacks |
42 | Yongjin Kim, Ahmed Helmy |
Attacker traceback with cross-layer monitoring in wireless multi-hop networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SASN ![In: Proceedings of the 4th ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2006, Alexandria, VA, USA, October 30, 2006, pp. 123-134, 2006, ACM, 1-59593-554-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
DoS/DDoS attack, attacker traceback, cross-layer monitoring, wireless multi-hop networks |
42 | Mike Just, Evangelos Kranakis, Tao Wan 0004 |
Resisting Malicious Packet Dropping in Wireless Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ADHOC-NOW ![In: Ad-Hoc, Mobile, and Wireless Networks, Second International Conference, ADHOC-NOW 2003 Montreal, Canada, October 8-10, 2003, Proceedings, pp. 151-163, 2003, Springer, 3-540-20260-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Distributed Probing, Security, Wireless Ad Hoc Networks, Denial of Service (DoS), Secure Routing Protocols |
39 | Ayesha Altaf, Rabia Sirhindi, Attiq Ahmed |
A Novel Approach against DoS Attacks in WiMAX Authentication Using Visual Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Proceedings of the Second International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2008, August 25-31, 2008, Cap Esterel, France, pp. 238-242, 2008, IEEE Computer Society, 978-0-7695-3329-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
39 | Gaeil An, Kiyoung Kim |
Real-Time IP Checking and Packet Marking for Preventing ND-DoS Attack Employing Fake Source IP in IPv6 LAN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATC ![In: Autonomic and Trusted Computing, 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008, Proceedings, pp. 36-46, 2008, Springer, 978-3-540-69294-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
39 | Rohit Chadha, Carl A. Gunter, José Meseguer 0001, Ravinder Shankesi, Mahesh Viswanathan 0001 |
Modular Preservation of Safety Properties by Cookie-Based DoS-Protection Wrappers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMOODS ![In: Formal Methods for Open Object-Based Distributed Systems, 10th IFIP WG 6.1 International Conference, FMOODS 2008, Oslo, Norway, June 4-6, 2008, Proceedings, pp. 39-58, 2008, Springer, 978-3-540-68862-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
39 | Qing Li 0034, Wade Trappe |
Reducing delay and enhancing DoS resistance in multicast authentication through multigrade security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 1(2), pp. 190-204, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
39 | Nils Gruschka, Norbert Luttenberger |
Protecting Web Services from DoS Attacks by SOAP Message Validation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Security and Privacy in Dynamic Environments, Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden, pp. 171-182, 2006, Springer, 0-387-33405-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
39 | Suratose Tritilanunt, Colin Boyd, Ernest Foo, Juan Manuel González Nieto |
Examining the DoS Resistance of HIP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Workshops (1) ![In: On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, OTM Confederated International Workshops and Posters, AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET, OnToContent, ORM, PerSys, OTM Academy Doctoral Consortium, RDDS, SWWS, and SeBGIS 2006, Montpellier, France, October 29 - November 3, 2006. Proceedings, Part I, pp. 616-625, 2006, Springer, 3-540-48269-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
39 | Yi Shi, Xinyu Yang, Huijun Zhu |
A Flooding-Based DoS/DDoS Detecting Algorithm Based on Traffic Measurement and Prediction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security, First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006, Proceedings, pp. 252-267, 2006, Springer, 3-540-47699-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
39 | Stephen Frechette |
A Proxy-Network Based Overlay Topology Resistant to DoS Attacks and Partitioning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), CD-ROM / Abstracts Proceedings, 4-8 April 2005, Denver, CO, USA, 2005, IEEE Computer Society, 0-7695-2312-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
39 | Hao Yang 0004, Haiyun Luo, Yi Yang, Songwu Lu, Lixia Zhang 0001 |
HOURS: Achieving DoS Resilience in an Open Service Hierarchy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June - 1 July 2004, Florence, Italy, Proceedings, pp. 83-92, 2004, IEEE Computer Society, 0-7695-2052-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
39 | Christos Siaterlis, Basil S. Maglaris |
Towards multisensor data fusion for DoS detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), Nicosia, Cyprus, March 14-17, 2004, pp. 439-446, 2004, ACM, 1-58113-812-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
anomaly detection, data fusion, Denial of Service |
38 | Udaya Kiran Tupakula, Vijay Varadharajan, Srini Rao Pandalaneni |
DoSTRACK: a system for defending against DoS attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), Honolulu, Hawaii, USA, March 9-12, 2009, pp. 47-53, 2009, ACM, 978-1-60558-166-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Smurf, TCP SYN flood, DoS, DDoS, reflection attacks |
38 | Deven Shah, Ashish Mangal, Mayank Agarwal, Mahendra Mehra, Tushar Dave, Dhiren R. Patel |
Protecting Global SOA from DoS and Other Security Threats. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISA ![In: Advances in Information Security and Assurance, Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings, pp. 652-661, 2009, Springer, 978-3-642-02616-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Global SOA, Handlers, Security, Simulation, Web Services, SOA, DoS, Denial of Service |
38 | László Csaba |
Experience with User Interface Reengineering Transferring DOS Panels to Windows. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSMR ![In: 1st Euromicro Working Conference on Software Maintenance and Reengineering (CSMR '97), 17-19 March 1997, Berlin, Germany, pp. 150-156, 1997, IEEE Computer Society, 0-8186-7892-5. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
Artificial User Program, S-Prog, Word Basic, Windows, Remote Controlling, DOS, User Interface Reengineering |
37 | Sangwon Hyun, Peng Ning, An Liu, Wenliang Du |
Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPSN ![In: Proceedings of the 7th International Conference on Information Processing in Sensor Networks, IPSN 2008, St. Louis, Missouri, USA, April 22-24, 2008, pp. 445-456, 2008, IEEE Computer Society, 978-0-7695-3157-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
secure remote programming, Wireless sensor network security, DoS attacks |
37 | An Liu, Young-Hyun Oh, Peng Ning |
Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks Using Seluge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPSN ![In: Proceedings of the 7th International Conference on Information Processing in Sensor Networks, IPSN 2008, St. Louis, Missouri, USA, April 22-24, 2008, pp. 561-562, 2008, IEEE Computer Society, 978-0-7695-3157-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Seluge, secure and DoS-resistant code dissemination, WiSeNeT, demo |
37 | Amar Aissani |
Queueing Analysis for Networks Under DoS Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2008, International Conference, Perugia, Italy, June 30 - July 3, 2008, Proceedings, Part II, pp. 500-513, 2008, Springer, 978-3-540-69840-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Network security, Queueing, Timeout, Steady-state distribution, DoS attack |
37 | Toshikazu Uemura, Tadashi Dohi |
Quantitative Evaluation of Intrusion Tolerant Systems Subject to DoS Attacks Via Semi-Markov Cost Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC Workshops ![In: Emerging Directions in Embedded and Ubiquitous Computing, EUC 2007 Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei, Taiwan, December 17-20, 2007, Proceedings, pp. 31-42, 2007, Springer, 978-3-540-77089-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
long-run average cost, information security, intrusion tolerance, preventive maintenance, semi-Markov models, DoS attack |
37 | Antonio Fernandez Gómez-Skarmeta, Angel L. Mateo-Martinez, Pedro M. Ruiz-Martinez |
IGMPv3-Based Method for Avoiding DoS Attacks in Multicast-Enabled Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: Proceedings 27th Conference on Local Computer Networks, Tampa, Florida, USA, 8-10 November, 2000, pp. 94-95, 2000, IEEE Computer Society, 0-7695-0912-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
DoS attack avoidance, IGMPv3-based method, IP multicast-enabled networks, security protection, Internet, authentication, transport protocols, multimedia communication, multimedia communications, video conferencing, teleconferencing, multicast communication, message authentication, telecommunication security, billing, Internet service providers, audio conferencing |
36 | Shigeo Akashi, Yao Tong |
On the Distributed DoS Attacks Targeting at the Bottlenecked Links: More Threatening DoS Attacks than Server Targeting DoS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CNIOT ![In: CNIOT 2021: 2nd International Conference on Computing, Networks and Internet of Things, Beijing, China, May 20-22, 2021, pp. 40:1-40:7, 2021, ACM, 978-1-4503-8969-3. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
36 | Carlos Alberto Ferreira Bispo, Edson Walmir Cazarini |
A Evolução, a Situação Atual e a Tendência de Alguns Itens que Influenciam a Qualidade dos Processos e dos Produtos e Também o Nível de Exigência dos Consumidores. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QUATIC ![In: Proceedings of the 4th International Conference on the Quality of Information and Communications Technology, Lisboa, Portugal, March 12-14, 2001., pp. 133-138, 2001, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP BibTeX RDF |
|
36 | Ana Larissa Ribeiro de Freitas, Liana Oighenstein Anderson, Paulo Henrique Alves Leão, João Bosco Coura dos Reis, Celso Henrique Leite Silva Junior, Nathália S. Carvalho, Ana Carolina M. Pessôa, Wanderson Henrique dos Santos |
Previsão da probabilidade de fogo: ocorrências pós-alerta na Amazônia Maranhense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GEOINFO ![In: XXIII Brazilian Symposium on Geoinformatics - GEOINFO 2022, São José dos Campos, SP, Brazil, November 28 30, 2022., pp. 259-263, 2022, MCTIC/INPE. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
36 | Lina Maria Osorio Olivos, Arisvaldo Vieira Méllo Junior, Silvana Susko Marcellini, Dário Hachisu Hossoda, Rogério Moreira Chagas, Gabriel A. dos Santos Soares, Flávia Ribeiro dos Santos Jacobsem, André Schardong |
Development of a data set for distributed hydrological simulation of Paraiba do Sul Basin. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GEOINFO ![In: XXIII Brazilian Symposium on Geoinformatics - GEOINFO 2022, São José dos Campos, SP, Brazil, November 28 30, 2022., pp. 395-401, 2022, MCTIC/INPE. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
36 | Talita N. Terra, Ana Cláudia dos Santos Luciano, Júlio C. D. M. Esquerdo, Alexandre Camargo Coutinho, João F. G. Antunes, João Luis dos Santos, Lídia S. Bertolo |
Dinâmica da intensificação da agricultura temporária na Área de Proteção Ambiental Ilha do Bananal-Cantão. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GEOINFO ![In: XXI Brazilian Symposium on Geoinformatics - GEOINFO 2020, São José dos Campos, SP, Brazil, November 30 - December 03, 2020., pp. 246-251, 2020, MCTIC/INPE. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
36 | Patrícia dos Santos Teixeira, Afonso de Paula dos Santos |
Implementação de ferramenta para Controle de Qualidade Cartográfica no software QGIS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GEOINFO ![In: XX Brazilian Symposium on Geoinformatics - GEOINFO 2019, São José dos Campos, SP, Brazil, November 11-13, 2019., pp. 212-217, 2019, MCTIC/INPE. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
36 | Eunice P. dos Santos Nunes, Fátima de Lourdes dos Santos Nunes, Rafael Luiz Testa, Licínio G. Roque |
Um estudo experimental sobre a captura automática dos dados de interação em ambientes virtuais tridimensionais. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IHC ![In: Proceedings of the 13th Brazilian Symposium on Human Factors in Computing Systems, IHC 2014, Foz do Iguaçu, Brazil, October 27-31, 2014, pp. 313-322, 2014, ACM, 978-85-7669-291-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
36 | Karla Donato Fook, Daniela Leal Musa, Nandamudi Vijaykumar, Rodrigo M. Mariano, Gabriel dos Reis Morais, Raphael Augusto O. Silva, Gabriel Sansigolo, Luciana Brasil Rebelo dos Santos, Luís Antônio Coelho Ferla, Cintia Almeida, Luanna G. M. do Nascimento, Vitória Martins Fontes da Silva, Monaliza C. dos Santos, Aracele Torres, Ângela Pereira, Fernando Atique, Jeffrey Lesser, Thomas D. Rogers, Andrew G. Britt, Rafael Laguardia, Ana Maria Alves Barbour, Orlando Guarnier Farias, Ariana Marco, Caróu Dickinson, Sand Tamires P. Camargo |
Collaborative Historical Platform for Historians: Extended Functionalities in Pauliceia 2.0. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WEBIST ![In: Proceedings of the 17th International Conference on Web Information Systems and Technologies, WEBIST 2021, October 26-28, 2021, pp. 460-466, 2021, SCITEPRESS, 978-989-758-536-4. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
36 | Rosangela Monteiro dos Santos, João Eduardo Guarnetti dos Santos, Ademir Marques Junior, Flavio Cardoso Ventura, João Victor Gomes dos Santos, Pedro Yuri Kovatch, Luis Carlos Paschoarelli, Fausto Orsi Medola |
Women's Footwear Sole for the Elderly Produced with Sustainable Material: Friction Coefficient Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AHFE (15) ![In: Advances in Physical, Social & Occupational Ergonomics - Proceedings of the AHFE 2020 Virtual Conferences on Physical Ergonomics and Human Factors, Social & Occupational Ergonomics and Cross-Cultural Decision Making, July 16-20, 2020, USA, pp. 192-196, 2020, Springer, 978-3-030-51548-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
36 | Yuri Santa Rosa Nassar dos Santos, Aruanda Simões Goncalves Meiguins, Diego Hortencio dos Santos, Carlos Gustavo Resque dos Santos, Jefferson Magalhães de Morais, Bianchi Serique Meiguins |
Data Visualization Scenarios for the Analysis of Computational Evolutionary Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IV (1) ![In: 23rd International Conference on Information Visualisation, IV 2019, Paris, France, July 2-5, 2019, Part I, pp. 292-299, 2019, IEEE, 978-1-7281-2838-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
36 | Rosana Abutakka Vasconcelos dos Anjos, Katia Morosov Alonso, Cristiano Maciel, Alexandre Martins dos Anjos, Eunice P. dos Santos Nunes |
Pedagogical standard for the Analysis of Virtual Learning Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FIE ![In: 2016 IEEE Frontiers in Education Conference, FIE 2015, Eire, PA, USA, October 12-15, 2016, pp. 1-8, 2016, IEEE Computer Society, 978-1-5090-1790-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
36 | José Elias Claudio Arroyo, Paula M. dos Santos, Michele dos Santos Soares, André Gustavo dos Santos |
A Multi-Objective Genetic Algorithm with Path Relinking for the p-Median Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IBERAMIA ![In: Advances in Artificial Intelligence - IBERAMIA 2010, 12th Ibero-American Conference on AI, Bahía Blanca, Argentina, November 1-5, 2010. Proceedings, pp. 70-79, 2010, Springer, 978-3-642-16951-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
35 | Xin Liu 0059, Xiaowei Yang 0001, Yong Xia 0008 |
NetFence: preventing internet denial of service from inside out. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 2010 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, New Delhi, India, August 30 -September 3, 2010, pp. 255-266, 2010, ACM, 978-1-4503-0201-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
congestion policing, internet, denial-of-service, capability |
35 | XiaoFeng Wang 0001, Michael K. Reiter |
A multi-layer framework for puzzle-based denial-of-service defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 7(4), pp. 243-263, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Denial of service, Network protocols, Client puzzles |
35 | Hongbin Xia, Wenbo Xu |
Research on Method of Network Abnormal Detection Based on Hurst Parameter Estimation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (3) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China, pp. 559-562, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 10178 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|