The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase Denial-of-service (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1983-1997 (18) 1998-2000 (43) 2001 (40) 2002 (57) 2003 (107) 2004 (122) 2005 (184) 2006 (188) 2007 (162) 2008 (169) 2009 (117) 2010 (61) 2011 (61) 2012 (42) 2013 (43) 2014 (53) 2015 (71) 2016 (55) 2017 (61) 2018 (88) 2019 (103) 2020 (129) 2021 (131) 2022 (158) 2023 (140) 2024 (46)
Publication types (Num. hits)
article(977) book(2) data(1) incollection(18) inproceedings(1419) phdthesis(32)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1352 occurrences of 577 keywords

Results
Found 2449 publication records. Showing 2449 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
95Virgil D. Gligor, Matt Blaze, John Ioannidis Denial of Service - Panel Discussion. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
89Douglas Stebila, Berkant Ustaoglu Towards Denial-of-Service-Resilient Key Agreement Protocols. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
80Philip L. Campbell The Denial-of-Service Dance. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF network denial of service, Trinoo, TFN, Smurf, UDP flood, Land, Targa, denial of service, worms, distributed denial of service, SYN flood, spoofing
80Marcus Tylutki, Karl N. Levitt Mitigating Distributed Denial of Service Attacks Using a Proportional-Integral-Derivative Controller. Search on Bibsonomy RAID The full citation details ... 2003 DBLP  DOI  BibTeX  RDF PID control law, Automated Response, Denial of Service, DoS, Distributed Denial of Service, DDoS, Control Theory, Distributed Attacks
80D. W. Gresty, Qi Shi 0001, Madjid Merabti Requirements for a General Framework for Response to Distributed Denial-of-Service. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
71Jelena Mirkovic, Peter L. Reiher, Sonia Fahmy, Roshan K. Thomas, Alefiya Hussain, Stephen Schwab, Calvin Ko Measuring denial Of service. Search on Bibsonomy QoP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF metrics, denial of service
62David Moore 0001, Colleen Shannon, Douglas J. Brown, Geoffrey M. Voelker, Stefan Savage Inferring Internet denial-of-service activity. Search on Bibsonomy ACM Trans. Comput. Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Backscatter, network security, denial-of-service, network measurement
62Wenyuan Xu 0001, Timothy Wood 0001, Wade Trappe, Yanyong Zhang Channel surfing and spatial retreats: defenses against wireless denial of service. Search on Bibsonomy Workshop on Wireless Security The full citation details ... 2004 DBLP  DOI  BibTeX  RDF denial of service, Jamming, CSMA
57Jelena Mirkovic, Alefiya Hussain, Sonia Fahmy, Peter L. Reiher, Roshan K. Thomas Accurately Measuring Denial of Service in Simulation and Testbed Experiments. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
56Nikita Borisov, George Danezis, Prateek Mittal, Parisa Tabriz Denial of service or denial of security? Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF reliability, anonymity, denial of service, attacks
54Che-Fn Yu, Virgil D. Gligor A Specification and Verification Method for Preventing Denial of Service. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1990 DBLP  DOI  BibTeX  RDF failure absence, integrity violations, user agreements, simultaneity conditions, denial-of-service prevention, formal specification, concurrent programs, security of data, specification method, verification method
53Yalin Evren Sagduyu, Anthony Ephremides A game-theoretic analysis of denial of service attacks in wireless random access. Search on Bibsonomy Wirel. Networks The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Malicious operation, Adaptive update algorithms, Wireless networks, Game theory, Cooperation, Medium access control, Pricing, Competition, Distributed control, Random access, Denial of service attacks
53Timothy X. Brown, Amita Sethi Potential Cognitive Radio Denial-of-Service Vulnerabilities and Protection Countermeasures: a Multi-dimensional Analysis and Assessment. Search on Bibsonomy Mob. Networks Appl. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF denial of service, cognitive radio, vulnerability, countermeasure
53George S. Oreku, Jianzhong Li 0001, Tamara Pazynyuk An application-driven perspective on wireless devises security: the case of distributed denial-of-service (ddos). Search on Bibsonomy PM2HW2N The full citation details ... 2007 DBLP  DOI  BibTeX  RDF handheld devices, distributed denial of service attacks (DDoS), wireless sensor nodes
53Aleksandar Kuzmanovic, Edward W. Knightly Low-rate TCP-targeted denial of service attacks and counter strategies. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF TCP, TCP/IP, denial of service, retransmission timeout
53Amit B. Kulkarni, Stephen F. Bush Detecting Distributed Denial-of-Service Attacks Using Kolmogorov Complexity Metrics. Search on Bibsonomy J. Netw. Syst. Manag. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF complexity probes, entropy, active network, Kolmogorov Complexity, denial-of-service attack
53Valer Bocan, Vladimir Cretu Mitigating Denial of Service Threats in GSM Networks. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF 2G, security, wireless networks, denial of service, attack, GSM, GPRS
53Jason Smith 0001, Juan Manuel González Nieto, Colin Boyd Modelling denial of service attacks on JFK with Meadows's cost-based framework. Search on Bibsonomy ACSW The full citation details ... 2006 DBLP  BibTeX  RDF security analysis methodologies, cryptographic protocols, denial of service
53Ashraf Matrawy, Paul C. van Oorschot, Anil Somayaji Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF network denial of service, flash worms, network security, diversity, traffic shaping
53Sanjeev Kumar Impact of Distributed Denial of Service (DDoS) Attack Due to ARP Storm. Search on Bibsonomy ICN (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF ARP attack, Distributed Denial of Service Attacks, Computer Network Security
53Dimitris Gavrilis, Ioannis G. Tsoulos, Evangelos Dermatas Feature Selection for Robust Detection of Distributed Denial-of-Service Attacks Using Genetic Algorithms. Search on Bibsonomy SETN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Genetic Algorithms, Neural Networks, Denial of Service
53Aleksandar Kuzmanovic, Edward W. Knightly Low-rate TCP-targeted denial of service attacks: the shrew vs. the mice and elephants. Search on Bibsonomy SIGCOMM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF TCP, denial of service, retransmission timeout
53Shouhuai Xu, Ravi S. Sandhu Authenticated multicast immune to denial-of-service attack. Search on Bibsonomy SAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF multicast authentication, denial-of-service
53Srinivas Mukkamala, Andrew H. Sung Computational Intelligent Techniques for Detecting Denial of Service Attacks. Search on Bibsonomy IEA/AIE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
51Guoxing Zhang, Shengming Jiang, Gang Wei, Quansheng Guan A prediction-based detection algorithm against distributed denial-of-service attacks. Search on Bibsonomy IWCMC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF available service rate, prediction-based detection of DDoS and low-rate TCP attacks, distributed DoS (DDoS), denial-of-service attacks (DoS)
50Jelena Mirkovic, Alefiya Hussain, Brett Wilson, Sonia Fahmy, Peter L. Reiher, Roshan K. Thomas, Wei-Min Yao, Stephen Schwab Towards user-centric metrics for denial-of-service measurement. Search on Bibsonomy Experimental Computer Science The full citation details ... 2007 DBLP  DOI  BibTeX  RDF metrics, denial of service
50José Carlos Brustoloni Protecting electronic commerce from distributed denial-of-service attacks. Search on Bibsonomy WWW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF quality of service, electronic commerce, denial of service
49Marek Hejmo, Brian L. Mark, Charikleia Zouridaki, Roshan K. Thomas Denial-of-service resistant quality-of-service signaling for mobile ad hoc networks. Search on Bibsonomy SASN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF qos signaling, security, quality of service, ad hoc networks, denial of service, attacks
46Sazia Parvin, Shohrab Ali, Song Han 0004, Tharam S. Dillon Security against DOS attack in mobile IP communication. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF care-of-address (coa), correspondent node (cn), denial-of-service (dos), distributed denial-of-service (ddos), foreign agent (fa), home agent (ha), mobile host (mh), mobile node (mn)
45Chu-Hsing Lin, Jung-Chun Liu, Hsun-Chi Huang, Tsung-Che Yang Using Adaptive Bandwidth Allocation Approach to Defend DDoS Attacks. Search on Bibsonomy MUE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF bandwidth, network simulator, priority queue, DDoS attack, IP spoofing, DoS attack
45Tuomas Aura DOS-Resistant Authentication with Client Puzzles (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
45Jun (Jim) Xu, Wooyong Lee Sustaining Availability of Web Services under Distributed Denial of Service Attacks. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2003 DBLP  DOI  BibTeX  RDF World-Wide Web, game theory, Availability, survivability, Distributed Denial of Service (DDoS)
44Gaeil An, Joon S. Park Packet Marking Based Cooperative Attack Response Service for Effectively Handling Suspicious Traffic. Search on Bibsonomy Inscrypt The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Attack Response, Quality of Service, Network Security, Packet Marking, Denial of Service Attack
44Xin Liu 0059, Xiaowei Yang 0001, Yong Xia 0008 NetFence: preventing internet denial of service from inside out. Search on Bibsonomy SIGCOMM The full citation details ... 2010 DBLP  DOI  BibTeX  RDF congestion policing, internet, denial-of-service, capability
44Jiangtao Li 0001, Ninghui Li, XiaoFeng Wang 0001, Ting Yu 0001 Denial of service attacks and defenses in decentralized trust management. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Access control, Game theory, Denial of service, Trust management, Trust negotiation
44Norman Danner, Danny Krizanc, Marc Liberatore Detecting Denial of Service Attacks in Tor. Search on Bibsonomy Financial Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF reliability, Anonymity, denial of service, detection, attack
44Jayashree Padmanabhan, K. S. Easwarakumar, Gokul B., Harishankar S. Trust based traffic monitoring approach for preventing denial of service attacks. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF clustering, networks, trust, denial of service, centroid, dos
44José M. Garrido Understanding distributed denial of service with object oriented simulation. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2009 DBLP  DOI  BibTeX  RDF network security, discrete event simulation, denial of service, protection
44Martin Eian Fragility of the Robust Security Network: 802.11 Denial of Service. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF 802.11w, Security, Wireless, Denial of Service, 802.11, 802.11i
44XiaoFeng Wang 0001, Michael K. Reiter A multi-layer framework for puzzle-based denial-of-service defense. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Denial of service, Network protocols, Client puzzles
44David R. Raymond, Scott F. Midkiff Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses. Search on Bibsonomy IEEE Pervasive Comput. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF denial-of-sleep attacks, security, wireless sensor networks, Denial-of-service attacks
44Roman Chertov, Sonia Fahmy, Ness B. Shroff Fidelity of network simulation and emulation: A case study of TCP-targeted denial of service attacks. Search on Bibsonomy ACM Trans. Model. Comput. Simul. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF low-rate TCP-targeted attacks, Simulation, congestion control, TCP, emulation, testbeds, denial of service attacks
44Rajani Muraleedharan, Lisa Ann Osadciw Secure Health Monitoring Network against Denial-Of-Service Attacks Using Cognitive Intelligence. Search on Bibsonomy CNSR The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Cognitive Intelligence, Sensor Network, Ant Colony Optimization, Denial-of-Service
44Gal Badishi, Idit Keidar Improving denial of service resistance using dynamic local adaptations. Search on Bibsonomy SAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF adaptive denial-of-service resistance, adaptive gossip-based protocols, application-level multicast
44Siddharth Maru, Timothy X. Brown Denial of service vulnerabilities in the 802.16 protocol. Search on Bibsonomy WICON The full citation details ... 2008 DBLP  DOI  BibTeX  RDF encryption, denial of service, traffic analysis, IEEE 802.16, sensing, jamming, broadband wireless access
44Marek Ostaszewski, Pascal Bouvry, Franciszek Seredynski Denial of service detection and analysis using idiotypic networks paradigm. Search on Bibsonomy GECCO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF idiotypic networks, denial of service
44Ronghua Wang, Wenliang Du, Peng Ning Containing denial-of-service attacks in broadcast authentication in sensor networks. Search on Bibsonomy MobiHoc The full citation details ... 2007 DBLP  DOI  BibTeX  RDF broadcast delay, security, wireless sensor networks, energy saving, denial of service attack
44Alex Wun, Alex King Yeung Cheung, Hans-Arno Jacobsen A taxonomy for denial of service attacks in content-based publish/subscribe systems. Search on Bibsonomy DEBS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, denial of service, publish/subscribe
44Baruch Awerbuch, Christian Scheideler A denial-of-service resistant DHT. Search on Bibsonomy PODC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF distributed information systems, denial-of-service attacks
44Joseph Chee Ming Teo, Chik How Tan Denial-of-service resilience password-based group key agreement for wireless networks. Search on Bibsonomy Q2SWinet The full citation details ... 2007 DBLP  DOI  BibTeX  RDF denial-of-service, group key agreement, secure group communication, password-based authentication
44Glenn Carl, George Kesidis, Richard R. Brooks, Suresh Rai Denial-of-Service Attack-Detection Techniques. Search on Bibsonomy IEEE Internet Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF denial-of-service, DoS, flooding attacks
44Steven Cheung Denial of Service against the Domain Name System. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF denial of service, countermeasures, domain name system, threat analysis, network infrastructure
44Mudhakar Srivatsa, Arun Iyengar, Jian Yin 0002, Ling Liu 0001 A Client-Transparent Approach to Defend Against Denial of Service Attacks. Search on Bibsonomy SRDS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Client Transparency, Denial of Service (DoS) attacks, Authentication, Availability, Web Servers
44Ying Xu, Roch Guérin On the robustness of router-based denial-of-service (DoS) defense systems. Search on Bibsonomy Comput. Commun. Rev. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF router-based defense, denial-of-service
44David K. Y. Yau, John C. S. Lui, Feng Liang, Yeung Yam Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF router throttling, network security, congestion control, distributed denial of service
44Dan Dumitriu, Edward W. Knightly, Aleksandar Kuzmanovic, Ion Stoica, Willy Zwaenepoel Denial-of-service resilience in peer-to-peer file sharing systems. Search on Bibsonomy SIGMETRICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF file pollution, network-targeted attacks, peer-to-peer, denial of service
44Alefiya Hussain, John S. Heidemann, Christos Papadopoulos A framework for classifying denial of service attacks. Search on Bibsonomy SIGCOMM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF security, measurement, time series analysis, denial of service attacks
44P. Sharma, P. Shah, S. Bhattacharya Mirror Hopping Approach for Selective Denial of Service Prevention. Search on Bibsonomy WORDS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Mirror sites, E-Commerce, Information Security, Denial of Service, HTTP
44Jaeyeon Jung, Balachander Krishnamurthy, Michael Rabinovich Flash crowds and denial of service attacks: characterization and implications for CDNs and web sites. Search on Bibsonomy WWW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF content distribution network performance, web workload characterization, World Wide Web (WWW), flash crowd, denial of service attack
44Nathalie Weiler Honeypots for Distributed Denial of Service Attacks. Search on Bibsonomy WETICE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Security Practices, Honeypot, Distributed Denial of Service Attacks
44Stamatis Karnouskos Dealing with Denial-of-Service Attacks in Agent-enabled Active and Programmable Infrastructures. Search on Bibsonomy COMPSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Intrusion Detection Systems, Active Networks, Agent Technology, Distributed Denial of Service Attacks
44E. Strother Denial of Service Protection - The Nozzle. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF denial of service protection, nozzle, domain name server, network pumps, untrusted user, trusted traffic, packet placement, protocols, protocol, intrusion detection, computer networks, Web server, firewalls, cost, authorisation, telecommunication security, network resource
44H. R. Nagesh, K. Chandra Sekaran, Adarsh Rao Kordcal Proactive model for Mitigating Internet Denial-of-Service Attacks. Search on Bibsonomy ITNG The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
44Tao Peng 0002, Christopher Leckie, Kotagiri Ramamohanarao Proactively Detecting Distributed Denial of Service Attacks Using Source IP Address Monitoring. Search on Bibsonomy NETWORKING The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
42Seonho Choi Denial-of-Service Resistant Multicast Authentication Protocol with Prediction Hashing and One-way Key Chain. Search on Bibsonomy ISM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
41Srinivas Padmanabhuni, Vineet Singh, K. M. Senthil Kumar, Abhishek Chatterjee Preventing Service Oriented Denial of Service (PreSODoS): A Proposed Approach. Search on Bibsonomy ICWS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
37Chang-Lung Tsai, Allen Y. Chang, Ming-Szu Huang Early Warning System for DDoS Attacking Based on Multilayer Deployment of Time Delay Neural Network. Search on Bibsonomy IIH-MSP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Internet hacking, Information security, Denial of service, Distributed denial of service, Time-delay neural network
36Haining Wang, Kang G. Shin Transport-Aware IP Routers: A Built-In Protection Mechanism to Counter DDoS Attacks. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Distributed Denial of Service (DDoS) attacks, layer-4 differentiation, resource isolation, packet classification
36Zhang Fu, Marina Papatriantafilou, Philippas Tsigas, Wei Wei 0013 Mitigating denial of capability attacks using sink tree based quota allocation. Search on Bibsonomy SAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF denial-of-capability, sink tree, denial-of-service
36Iftikhar Ahmad 0002, Azween B. Abdullah, Abdullah Sharaf Alghamdi Application of artificial neural network in detection of DOS attacks. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF internet control message protocol, multiple layered perceptron, resilient backpropagation, neural network, artificial neural network, false positive, dataset, false negative, detection rate, denial of service attack
36Steven Cheung, Bruno Dutertre, Ulf Lindqvist Detecting Disruptive Routers in Wireless Sensor Networks. Search on Bibsonomy ADHOC-NOW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF sensor networks, intrusion detection, Denial of service, routing security
36Eun-Jun Yoon, Kee-Young Yoo One-Time Password Authentication Scheme Using Smart Cards Providing User Anonymity. Search on Bibsonomy ICCSA (5) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Security, Cryptography, Smart card, User authentication, One-time password, Denial-of-Service attacks
36Seonho Choi, Yanggon Kim Resource Requirement Analysis for a Predictive-Hashing Based Multicast Authentication Protocol. Search on Bibsonomy EUC Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cryptographic hashing, authentication, protocol, multicast, denial-of-service, resource requirement
36Bernardo Alarcos, María Calderón, Marifeli Sedano, Juan R. Velasco DoS Protection for a Pragmatic Multiservice Network Based on Programmable Networks. Search on Bibsonomy Autonomic Networking The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Security, Denial of Service, Active Networks
36Ya-Fen Chang, Chin-Chen Chang 0001 A secure and efficient strong-password authentication protocol. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF strong password, smart card, password authentication, mutual authentication, denial-of-service attack, stolen-verifier attack
36Mike Just, Evangelos Kranakis, Tao Wan 0004 Resisting Malicious Packet Dropping in Wireless Ad Hoc Networks. Search on Bibsonomy ADHOC-NOW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Distributed Probing, Security, Wireless Ad Hoc Networks, Denial of Service (DoS), Secure Routing Protocols
36Fan Min 0001, Jun-yan Zhang, Guo-wie Yang An IP Traceback Scheme Integrating DPM and PPM. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Deterministic Packet Marking, Denial of Service, IP traceback, IP spoofing, Probabilistic Packet Marking
36Christopher D. Gill RT-POD: A Framework for Real-Time Systems Participation in Own Defense. Search on Bibsonomy WORDS Fall The full citation details ... 2003 DBLP  DOI  BibTeX  RDF real-time security, temporal signatures, denial of service, middleware frameworks
36Xianglin Deng, Malcolm Shore Advanced Flooding Attack on a SIP Server. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
36Tao Peng 0002, Christopher Leckie, Kotagiri Ramamohanarao Survey of network-based defense mechanisms countering the DoS and DDoS problems. Search on Bibsonomy ACM Comput. Surv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF DNS reflector attack, bandwidth attack, resource management, DoS, DDoS, Botnet, Internet security, IP traceback, IRC, IP spoofing, SYN flood, VoIP security
36Yuh-Min Tseng Efficient authenticated key agreement protocols resistant to a denial-of-service attack. Search on Bibsonomy Int. J. Netw. Manag. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
36Roger M. Needham Denial of Service. Search on Bibsonomy CCS The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
35Suriadi Suriadi, Douglas Stebila, Andrew J. Clark, Hua Liu Defending Web Services against Denial of Service Attacks Using Client Puzzles. Search on Bibsonomy ICWS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF web services, client puzzles, denial of service attacks
35Mohammed A. Alhabeeb, Phu Dung Le, Bala Srinivasan 0002 Preventing Denial of Service Attacks in Government E-Services Using a New Efficient Packet Filtering Technique. Search on Bibsonomy ISPA The full citation details ... 2011 DBLP  DOI  BibTeX  RDF Token Filtering Technique, Denial of Service, flooding attack
35Mohammed A. Alhabeeb, Phu Dung Le, Bala Srinivasan 0002 Evaluating the Functionality of the Token Filtering Technique in Filtering Denial of Service Packets Using a New Formal Evaluation Model. Search on Bibsonomy ISPA The full citation details ... 2011 DBLP  DOI  BibTeX  RDF Token Filtering Technique, Denial of Service, packet filtering, flooding attack
35Raja Sekhar Reddy Gade, Hari Krishna Vellalacheruvu, Sanjeev Kumar Performance of Windows XP, Windows Vista and Apple's Leopard Computers under a Denial of Service Attack. Search on Bibsonomy ICDS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Denial of Service (DoS) Attack, Internet Control Message Protocol (ICMP), Land Attack, Ping utility
35Richard M. Chang, Guofei Jiang, Franjo Ivancic, Sriram Sankaranarayanan 0001, Vitaly Shmatikov Inputs of Coma: Static Detection of Denial-of-Service Vulnerabilities. Search on Bibsonomy CSF The full citation details ... 2009 DBLP  DOI  BibTeX  RDF network security, static analysis, Denial-of-service
35R. Gunasekaran, V. Rhymend Uthariaraj Prevention of Denial of Service Attacks and Performance Enhancement in Mobile Ad hoc Networks. Search on Bibsonomy ITNG The full citation details ... 2009 DBLP  DOI  BibTeX  RDF DoSP-MAC, Quick Exchange, MANET, Denial of Service, AODV
35Thomas Dreibholz, Erwin P. Rathgeb, Xing Zhou On Robustness and Countermeasures of Reliable Server Pooling Systems Against Denial of Service Attacks. Search on Bibsonomy Networking The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Robustness, Denial of Service, Attacks, Countermeasures, Reliable Server Pooling
35Qingtao Wu, Haichao Zhang, Jiexin Pu Mitigating distributed denial-of-service attacks using network connection control charts. Search on Bibsonomy Infoscale The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Shewhart's control charts, automated response model, network security, distributed denial-of-service
35Frank Kargl, Jörn Maier, Michael Weber 0001 Protecting web servers from distributed denial of service attacks. Search on Bibsonomy WWW The full citation details ... 2001 DBLP  DOI  BibTeX  RDF class based routing, web server security, Linux, UNIX, DDoS, distributed denial of service attacks
35Alberto López Toledo, Xiaodong Wang 0001 Robust Detection of MAC Layer Denial-of-Service Attacks in CSMA/CA Wireless Networks. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
35William Conner, Klara Nahrstedt Protecting SIP Proxy Servers from Ringing-Based Denial-of-Service Attacks. Search on Bibsonomy ISM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
35Erol Gelenbe, Michael Gellman, George Loukas An Autonomic Approach to Denial of Service Defence. Search on Bibsonomy WOWMOM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
35Bao-Tung Wang, Henning Schulzrinne A denial-of-service-resistant IP traceback approach. Search on Bibsonomy ISCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
35Clayton Bolz, Gordon W. Romney, Brandon L. Rogers Safely train security engineers regarding the dangers presented by denial of service attacks. Search on Bibsonomy SIGITE Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF DoS lab, isolated lab, network security, information technology, DDoS
35Tao Peng 0002, Christopher Leckie, Kotagiri Ramamohanarao Detecting Distributed Denial of Service Attacks by Sharing Distributed Beliefs. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
35W. J. Blackert, Donna M. Gregg, A. K. Castner, E. M. Kyle, R. L. Hom, R. M. Jokerst Analyzing Interaction Between Distributed Denial of Service Attacks And Mitigation Technologies. Search on Bibsonomy DISCEX (1) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
35Anthony D. Wood, John A. Stankovic Denial of Service in Sensor Networks. Search on Bibsonomy Computer The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
35Biljana Cubaleska, Markus Schneider 0002 A Method for Protecting Mobile Agents against Denial of Service Attacks. Search on Bibsonomy CIA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 2449 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license