Results
Found 66 publication records. Showing 66 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
112 | Yuh-Min Tseng |
Efficient authenticated key agreement protocols resistant to a denial-of-service attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Netw. Manag. ![In: Int. J. Netw. Manag. 15(3), pp. 193-202, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
110 | Guoxing Zhang, Shengming Jiang, Gang Wei, Quansheng Guan |
A prediction-based detection algorithm against distributed denial-of-service attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, IWCMC 2009, Leipzig, Germany, June 21-24, 2009, pp. 106-110, 2009, ACM, 978-1-60558-569-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
available service rate, prediction-based detection of DDoS and low-rate TCP attacks, distributed DoS (DDoS), denial-of-service attacks (DoS) |
99 | Jun Zheng, Ming-Zeng Hu |
Intrusion Detection of DoS/DDoS and Probing Attacks for Web Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WAIM ![In: Advances in Web-Age Information Management, 6th International Conference, WAIM 2005, Hangzhou, China, October 11-13, 2005, Proceedings, pp. 333-344, 2005, Springer, 3-540-29227-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
90 | Yi Shi, Xinyu Yang, Huijun Zhu |
A Flooding-Based DoS/DDoS Detecting Algorithm Based on Traffic Measurement and Prediction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security, First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006, Proceedings, pp. 252-267, 2006, Springer, 3-540-47699-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
89 | Yongjin Kim, Ahmed Helmy |
Attacker traceback with cross-layer monitoring in wireless multi-hop networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SASN ![In: Proceedings of the 4th ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2006, Alexandria, VA, USA, October 30, 2006, pp. 123-134, 2006, ACM, 1-59593-554-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
DoS/DDoS attack, attacker traceback, cross-layer monitoring, wireless multi-hop networks |
84 | Chwan-Hwa John Wu, Chun-Ching Andy Huang, J. David Irwin |
Using Identity-Based Privacy-Protected Access Control Filter (IPACF) to against denial of service attacks and protect user privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SpringSim (3) ![In: Proceedings of the 2007 Spring Simulation Multiconference, SpringSim 2007, Norfolk, Virginia, USA, March 25-29, 2007, Volume 3, pp. 362-369, 2007, SCS/ACM, 1-56555-314-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
privacy, network security, DDoS, wireless security |
64 | Domenico Cotroneo, L. Peluso, Simon Pietro Romano, Giorgio Ventre |
An active security protocol against DoS attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the Seventh IEEE Symposium on Computers and Communications (ISCC 2002), 1-4 July 2002, Taormina, Italy, pp. 496-501, 2002, IEEE Computer Society, 0-7695-1671-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Network Security, Denial of Service, Signaling protocols |
61 | Hong-bin Yim, Jae-Il Jung |
IP Traceback Algorithm for DoS/DDoS Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APNOMS ![In: Management of Convergence Networks and Services, 9th Asia-Pacific Network Operations and Management Symposium, APNOMS 2006 Busan, Korea, September 27-29, 2006, Proceedings, pp. 558-561, 2006, Springer, 3-540-45776-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
57 | Yongjin Kim, Ahmed Helmy |
SWAT: Small World-based Attacker Traceback in Ad-hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiQuitous ![In: 2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), 17-21 July 2005, San Diego, CA, USA, pp. 85-96, 2005, IEEE Computer Society, 0-7695-2375-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
56 | Shunsuke Oshima, Takuo Nakashima, Toshinori Sueyoshi |
Early DoS/DDoS Detection Method using Short-term Statistics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISIS ![In: CISIS 2010, The Fourth International Conference on Complex, Intelligent and Software Intensive Systems, Krakow, Poland, 15-18 February 2010, pp. 168-173, 2010, IEEE Computer Society, 978-0-7695-3967-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
DoS/DDoS attacks, Short-term entropy, A test of significance, IDS, Statistical Method |
56 | Shunsuke Oshima, Arata Hirakawa, Takuo Nakashima, Toshinori Sueyoshi |
DoS/DDoS Detection Scheme Using Statistical Method Based on the Destination Port Number. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), Kyoto, Japan, 12-14 September, 2009, Proceedings, pp. 206-209, 2009, IEEE Computer Society, 978-1-4244-4717-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
DoS/DDos, Detection Scheme, Chi-square Method, Destination Port Number |
51 | Bo-Chao Cheng, Huan Chen 0002, Guo-Tan Liao |
A Novel Marking Probability Distribution Using Probability Propagation in Hierarchical WSN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers, pp. 265-274, 2008, Springer, 978-3-642-01439-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
DoS/DDoS, WSN, Traceback, PPM, Convergence time |
51 | Jun-Sang Park, Myung-Sup Kim |
Design and Implementation of an SNMP-Based Traffic Flooding Attack Detection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APNOMS ![In: Challenges for Next Generation Network Operations and Service Management, 11th Asia-Pacific Network Operations and Management Symposium, APNOMS 2008, Beijing, China, October 22-24, 2008. Proceedings, pp. 380-389, 2008, Springer, 978-3-540-88622-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Traffic Flooding Attack, DoS/DDoS, Detection Time, Detection System, SNMP, MIB, Detection Algorithm |
51 | Ming-Yang Su, Kai-Chi Chang, Hua-Fu Wei, Chun-Yuen Lin |
Feature Weighting and Selection for a Real-Time Network Intrusion Detection System Based on GA with KNN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI Workshops ![In: Intelligence and Security Informatics, IEEE ISI 2008 International Workshops: PAISI, PACCF, and SOCO 2008, Taipei, Taiwan, June 17, 2008. Proceedings, pp. 195-204, 2008, Springer, 978-3-540-69136-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
NIDS (Network Intrusion Detection System), DoS/DDoS Attacks, KNN (k-Nearest Neighbor), Genetic Algorithm, Network Security |
49 | Yong Cui 0001, Lingjian Song, Ke Xu 0002 |
RCS: A Distributed Mechanism Against Link Flooding DDoS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICOIN ![In: Information Networking, Advances in Data Communications and Wireless Networks, International Conference, ICOIN 2006, Sendai, Japan, January 16-19, 2006, Revised Selected Papers, pp. 764-774, 2006, Springer, 3-540-48563-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
46 | Yongjin Kim |
ATTENTION: ATTackEr Traceback Using MAC Layer AbNormality DetecTION. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISA ![In: Advances in Information Security and Assurance, Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings, pp. 239-249, 2009, Springer, 978-3-642-02616-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
DoS, DDoS, Traceback |
46 | Aliya Awais, Muddassar Farooq, Muhammad Younus Javed |
Attack analysis & bio-inspired security framework for IPMultimedia subsystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO (Companion) ![In: Genetic and Evolutionary Computation Conference, GECCO 2008, Proceedings, Atlanta, GA, USA, July 12-16, 2008, Companion Material, pp. 2093-2098, 2008, ACM, 978-1-60558-131-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
network security, artificial immune systems, ip multimedia subsystem |
46 | Aliya Awais, Muddassar Farooq, Muhammad Younus Javed |
Attack analysis & bio-inspired security framework for IP multimedia subsystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO ![In: Genetic and Evolutionary Computation Conference, GECCO 2008, Proceedings, Atlanta, GA, USA, July 12-16, 2008, pp. 161-162, 2008, ACM, 978-1-60558-130-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
network, artificial immune systems, IP multimedia subsystem |
43 | Song Huang, Ling Zhang 0005, Shouling Dong |
A Behavior-Based Ingress Rate-Limiting Mechanism Against DoS/DDoS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings, pp. 231-242, 2005, Springer, 3-540-30934-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
38 | Fang-Yie Leu, Chia-Chi Pai |
Detecting DoS and DDoS Attacks Using Chi-Square. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 255-258, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
38 | Tong Liu, Chwan-Hwa John Wu |
Intrusion-resilient, DDoS-resistant and agent-assisted network security system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BROADNETS ![In: Fourth International Conference on Broadband Communications, Networks and Systems, (BROADNETS 2007), 10-14 September 2007, Raleigh, North-Carolina, USA, pp. 306-308, 2007, IEEE, 978-1-4244-1432-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
38 | Fang-Yie Leu, Jia-Chun Lin, Ming-Chang Li, Chao-Tung Yang |
A Performance-Based Grid Intrusion Detection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC (1) ![In: 29th Annual International Computer Software and Applications Conference, COMPSAC 2005, Edinburgh, Scotland, UK, July 25-28, 2005. Volume 1, pp. 525-530, 2005, IEEE Computer Society, 0-7695-2413-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
PGIDS, Grid, DoS, DDoS, SSA, BPNN, SAA |
38 | Kihong Park, Heejo Lee |
On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 27-31, 2001, San Diego, CA, USA, pp. 15-26, 2001, ACM, 1-58113-411-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
36 | Gitae Kim, Tony J. Bogovic, Dana Chee |
ACtive edge-Tagging (ACT): An Intruder Identification & Isolation Scheme in Active Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the Sixth IEEE Symposium on Computers and Communications (ISCC 2001), 3-5 July 2001, Hammamet, Tunisia, pp. 29-34, 2001, IEEE Computer Society, 0-7695-1177-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Intruder Identification & Isolation, Distributed Denial of Service (DDoS) Attacks, Active (or Programmable) Networks, Network Security, Traffic Monitoring |
32 | Shunsuke Oshima, Takuo Nakashima, Toshinori Sueyoshi |
Comparison of Properties between Entropy and Chi-Square Based Anomaly Detection Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NBiS ![In: The 14th International Conference on Network-Based Information Systems, NBiS 2011, Tirana, Albania, September 7-9, 2011, pp. 221-228, 2011, IEEE Computer Society, 978-1-4577-0789-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
DoS/DDoS detection, chi-square value, Entropy, anomaly detection, statistical approach |
29 | Muthusrinivasan Muthuprasanna, G. Manimaran, Zhengdao Wang |
Unified Defense Against DDoS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Networking ![In: NETWORKING 2007. Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet, 6th International IFIP-TC6 Networking Conference, Atlanta, GA, USA, May 14-18, 2007, Proceedings, pp. 1047-1059, 2007, Springer, 978-3-540-72605-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Fazirulhisyam Hashim, M. Rubaiyat Kibria, Abbas Jamalipour |
A Detection and Recovery Architecture Against DoS and Worm Attacks in NGMN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2008, Beijing, China, 19-23 May 2008, pp. 1675-1679, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
28 | RongJie Gu, Puliu Yan, Tao Zou, Chengcheng Guo |
An Automatic and Generic Early-Bird System for Internet Backbone Based on Traffic Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICN (1) ![In: Networking - ICN 2005, 4th International Conference on Networking, ReunionIsland, France, April 17-21, 2005, Proceedings, Part I, pp. 740-748, 2005, Springer, 3-540-25339-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Henry C. J. Lee, Miao Ma, Vrizlynn L. L. Thing, Yi Xu |
On the Issues of IP Traceback for IPv6 and Mobile IPv6. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June - 3 July 2003, Kiris-Kemer, Turkey, pp. 582-587, 2003, IEEE Computer Society, 0-7695-1961-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
24 | Xuan-Ha Nguyen, Kim-Hung Le |
Robust detection of unknown DoS/DDoS attacks in IoT networks using a hybrid learning model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Things ![In: Internet Things 23, pp. 100851, October 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Alaa Alatram, Leslie F. Sikos, Mike Johnstone, Patryk Szewczyk, James Jin Kang |
DoS/DDoS-MQTT-IoT: A dataset for evaluating intrusions in IoT networks using the MQTT protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Networks ![In: Comput. Networks 231, pp. 109809, July 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Peyman Khordadpour, Saeed Ahmadi |
FIDS: Fuzzy Intrusion Detection System for simultaneous detection of DoS/DDoS attacks in Cloud computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2305.16389, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Farouq Aliyu, Tarek R. Sheltami, Marwan H. Abu-Amara, Mohamed Deriche 0001, Ashraf S. Mahmoud |
Evaluation of Human Immune-Based IDPS Under DoS/DDoS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACR ![In: Proceedings of the 2023 International Conference on Advances in Computing Research (ACR'23), Orlando, FL, USA, 8-10 May 2023, pp. 500-510, 2023, Springer, 978-3-031-33742-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Saida Farhat, Manel Abdelkader, Amel Meddeb-Makhlouf, Faouzi Zarai |
Evaluation of DoS/DDoS Attack Detection with ML Techniques on CIC-IDS2017 Dataset. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISSP ![In: Proceedings of the 9th International Conference on Information Systems Security and Privacy, ICISSP 2023, Lisbon, Portugal, February 22-24, 2023, pp. 287-295, 2023, SciTePress, 978-989-758-624-8. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Hikofumi Suzuki, Akiyoshi Iwasa, Takumi Uchiyama, Katsumi Wasaki |
Man-machine Cooperative Monitoring System to Support Detection of DoS/DDoS Attacks Through Continuous SOM Diagram Generation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NaNA ![In: International Conference on Networking and Network Applications, NaNA 2023, Qingdao, China, August 18-21, 2023, pp. 558-567, 2023, IEEE, 979-8-3503-2738-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Bushra Alhijawi, Sufyan Almajali, Hany Elgala, Haythem Bany Salameh, Moussa Ayyash |
A survey on DoS/DDoS mitigation techniques in SDNs: Classification, comparison, solutions, testing tools and datasets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Electr. Eng. ![In: Comput. Electr. Eng. 99, pp. 107706, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Md Sajid Khan, Behnam Farzaneh, Nashid Shahriar, Niloy Saha, Raouf Boutaba |
SliceSecure: Impact and Detection of DoS/DDoS Attacks on 5G Network Slices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FNWF ![In: 2022 IEEE Future Networks World Forum, FNWF 2022, Montreal, QC, Canada, October 10-14, 2022, pp. 639-642, 2022, IEEE, 978-1-6654-6250-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Shih-Ting Chiu, Heru Susanto, Fang-Yie Leu |
Shannon Entropy Mixing Cumulative Sum Algorithm for DoS/DDoS Detection and Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiSec ![In: Mobile Internet Security - 6th International Symposium, MobiSec 2022, Jeju, South Korea, December 15-17, 2022, Revised Selected Papers, pp. 243-253, 2022, Springer, 978-981-99-4429-3. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Jorge Steven Martinez Osorio, Jaime Alberto Vergara Tejada, Juan Felipe Botero |
Detection of DoS/DDoS attacks: the UBM and GMM approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IM ![In: 17th IFIP/IEEE International Symposium on Integrated Network Management, IM 2021, Bordeaux, France, May 17-21, 2021, pp. 866-871, 2021, IEEE, 978-3-903176-32-4. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
24 | Giorgi Iashvili, Maksim Iavich, Razvan Bocu, Roman Odarchenko, Sergiy Gnatyuk |
Intrusion Detection System for 5G with a Focus on DOS/DDOS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDAACS ![In: 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), Cracow, Poland, September 22-25, 2021, pp. 861-864, 2021, IEEE, 978-1-6654-4209-1. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
24 | Leonid Galchynsky, Mykola Graivoronskyi, Oleh O. Dmytrenko |
Evaluation of Machine Learning Methods to Detect DoS / DDoS Attacks on IoT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITS ![In: Selected Papers of the XXI International Scientific and Practical Conference `Information Technologies and Security` (ITS 2021), Kyiv, Ukraine, December 9, 2021., pp. 225-236, 2021, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
24 | Jia Chen, Haiyu Jia, Qi Liu 0003 |
Dual-collaborative DoS/DDoS mitigation approach in information-centric mobile Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Commun. Syst. ![In: Int. J. Commun. Syst. 33(4), 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
24 | Liming Fang 0001, Bo Zhao, Yang Li 0103, Zhe Liu 0001, Chunpeng Ge, Weizhi Meng 0001 |
Countermeasure Based on Smart Contracts and AI against DoS/DDoS Attack in 5G Circumstances. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Netw. ![In: IEEE Netw. 34(6), pp. 54-61, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
24 | Francisco Sales de Lima Filho, Frederico Augusto Fernandes Silveira, Agostinho de Medeiros Brito Júnior, Genoveva Vargas-Solar, Luiz Felipe Q. Silveira |
Smart Detection: An Online Approach for DoS/DDoS Attack Detection Using Machine Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 2019, pp. 1574749:1-1574749:15, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
24 | Rajendra Patil, Harsha Dudeja, Snehal Gawade, Chirag Modi 0001 |
Protocol Specific Multi-Threaded Network Intrusion Detection System (PM-NIDS) for DoS/DDoS Attack Detection in Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCNT ![In: 9th International Conference on Computing, Communication and Networking Technologies, ICCCNT 2018, Bengaluru, India, July 10-12, 2018, pp. 1-7, 2018, IEEE, 978-1-5386-4430-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
24 | Osman Ali, Paul Cotae |
Towards DoS/DDoS Attack Detection Using Artificial Neural Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UEMCON ![In: 9th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference, UEMCON 2018, New York City, NY, USA, November 8-10, 2018, pp. 229-234, 2018, IEEE, 978-1-5386-7693-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
24 | Marcos V. O. de Assis, Anderson H. Hamamoto, Taufik Abrão, Mario Lemes Proença Jr. |
A Game Theoretical Based System Using Holt-Winters and Genetic Algorithm With Fuzzy Logic for DoS/DDoS Mitigation on SDN Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 5, pp. 9485-9496, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
24 | Linzhi Jiang, Chunxiang Xu, Xiaofang Wang, Yanghong Zhou |
Analysis and Comparison of the Network Security Protocol with DoS/DDoS Attack Resistance Performance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPCC/CSS/ICESS ![In: 17th IEEE International Conference on High Performance Computing and Communications, HPCC 2015, 7th IEEE International Symposium on Cyberspace Safety and Security, CSS 2015, and 12th IEEE International Conference on Embedded Software and Systems, ICESS 2015, New York, NY, USA, August 24-26, 2015, pp. 1785-1790, 2015, IEEE, 978-1-4799-8937-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
24 | |
Radware Lagebericht: DoS-/DDoS-Attacken unter den aktuell größten Gefahren für die IT-Sicherheit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Datenschutz und Datensicherheit ![In: Datenschutz und Datensicherheit 38(3), pp. 212, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
24 | Mohammed A. Saleh, Azizah Abdul Manaf |
Protective Frameworks and Schemes to Detect and Prevent High Rate DoS/DDoS and Flash Crowd Attacks: A Comprehensive Review. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AMLTA ![In: Advanced Machine Learning Technologies and Applications - Second International Conference, AMLTA 2014, Cairo, Egypt, November 28-30, 2014. Proceedings, pp. 145-152, 2014, Springer, 978-3-319-13460-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
24 | Alex Doyal, Justin Zhan |
Triple DoS: DDoS defence and traceback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Priv. Secur. Integr. ![In: Int. J. Inf. Priv. Secur. Integr. 1(4), pp. 299-311, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
24 | Daeyoub Kim, Jihoon Lee |
How to Make Content Centric Network (CCN) More Robust against DoS/DDoS Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Commun. ![In: IEICE Trans. Commun. 96-B(1), pp. 313-316, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
24 | Theodoros Spyridopoulos, G. Karanikas, Theodore Tryfonas, Georgios Oikonomou |
A game theoretic defence framework against DoS/DDoS cyber attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 38, pp. 39-50, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
24 | Uliana Yatsykovska, Mykola Karpinski, Ihor Vasyltsov, Pavlo Bykovyy |
The monitoring system of DoS/DDoS attacks in the global network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDAACS (2) ![In: IEEE 6th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, IDAACS 2011, Prague, Czech Republic, September 15-17, 2011, Volume 2, pp. 791-794, 2011, IEEE. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
24 | PyungKoo Park, HeeKyoung Yi, Sangjin Hong, Jaecheol Ryou 0001 |
An effective defense mechanism against DoS/DDoS attacks in flow-based routers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MoMM ![In: MoMM'2010 - The Eighth International Conference on Advances in Mobile Computing and Multimedia, 8-10 November 2010, Paris, France, pp. 442-446, 2010, ACM, 978-1-4503-0440-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Ping Du, Shunji Abe |
IP Packet Size Entropy-Based Scheme for Detection of DoS/DDoS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Inf. Syst. ![In: IEICE Trans. Inf. Syst. 91-D(5), pp. 1274-1281, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Takanori Komatsu, Akira Namatame |
On the Effectiveness of Rate-Limiting Methods to Mitigate Distributed DoS (DDoS) Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Commun. ![In: IEICE Trans. Commun. 90-B(10), pp. 2665-2672, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Jin Shu, Fengyu Liu, Manwu Xu |
Baseline - A Passive Approach to Tolerate and Detect DoS/DDoS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security and Management ![In: Proceedings of The 2005 International Conference on Security and Management, SAM 2005, Las Vegas, Nevada, USA, June 20-23, 2005, pp. 104-110, 2005, CSREA Press, 1-932415-82-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
24 | Vrizlynn L. L. Thing, Henry C. J. Lee, Morris Sloman |
Traffic Redirection Attack Protection System (TRAPS) - A Full-Fledged Adaptive DoS/DDoS Attack Mitigation Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30 - June 1, 2005, Chiba, Japan, pp. 309-326, 2005, Springer, 0-387-25658-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
19 | Jun Bi, Ping Hu, Lizhong Xie |
Shim6: Reference Implementation and Optimization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Networking ![In: NETWORKING 2008, Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet , 7th International IFIP-TC6 Networking Conference, Singapore, May 5-9, 2008, Proceedings, pp. 302-313, 2008, Springer, 978-3-540-79548-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
IPv6, Multihoming, Shim6 |
19 | Yan Shen, Jun Bi, Jianping Wu, Qiang Liu |
The Automatic Peer-to-Peer Signature for Source Address Validation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (1) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 11th International Conference, KES 2007, XVII Italian Workshop on Neural Networks, Vietri sul Mare, Italy, September 12-14, 2007. Proceedings, Part I, pp. 855-863, 2007, Springer, 978-3-540-74817-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Source Address Spoofing, Spoofing Prevention, Key Management |
19 | Yang Li 0002, Binxing Fang |
A Lightweight Online Network Anomaly Detection Scheme Based on Data Mining Methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNP ![In: Proceedings of the IEEE International Conference on Network Protocols, ICNP 2007, October 16-19, 2007, Beijing, China, pp. 340-341, 2007, IEEE Computer Society, 1-4244-1588-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Muthusrinivasan Muthuprasanna, G. Manimaran, Mansoor Alicherry, Vijay Kumar |
Coloring the Internet: IP Traceback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPADS (1) ![In: 12th International Conference on Parallel and Distributed Systems, ICPADS 2006, Minneapolis, Minnesota, USA, July 12-15, 2006, pp. 589-598, 2006, IEEE Computer Society, 0-7695-2612-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Hai-Tao He, Xiao-Nan Luo, Bao-Lu Liu |
Detecting Anomalous Network Traffic with Combined Fuzzy-Based Approaches. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIC (2) ![In: Advances in Intelligent Computing, International Conference on Intelligent Computing, ICIC 2005, Hefei, China, August 23-26, 2005, Proceedings, Part II, pp. 433-442, 2005, Springer, 3-540-28227-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Fu-Hau Hsu, Tzi-cker Chiueh |
CTCP: A Transparent Centralized TCP/IP Architecture for Network Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 20th Annual Computer Security Applications Conference (ACSAC 2004), 6-10 December 2004, Tucson, AZ, USA, pp. 335-344, 2004, IEEE Computer Society, 0-7695-2252-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Henry C. J. Lee, Vrizlynn L. L. Thing, Yi Xu, Miao Ma |
ICMP Traceback with Cumulative Path, an Efficient Solution for IP Traceback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings, pp. 124-135, 2003, Springer, 3-540-20150-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #66 of 66 (100 per page; Change: )
|