The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase DoS/DDos (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2001-2005 (15) 2006-2008 (19) 2009-2017 (15) 2018-2023 (17)
Publication types (Num. hits)
article(15) inproceedings(51)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 45 occurrences of 34 keywords

Results
Found 66 publication records. Showing 66 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
112Yuh-Min Tseng Efficient authenticated key agreement protocols resistant to a denial-of-service attack. Search on Bibsonomy Int. J. Netw. Manag. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
110Guoxing Zhang, Shengming Jiang, Gang Wei, Quansheng Guan A prediction-based detection algorithm against distributed denial-of-service attacks. Search on Bibsonomy IWCMC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF available service rate, prediction-based detection of DDoS and low-rate TCP attacks, distributed DoS (DDoS), denial-of-service attacks (DoS)
99Jun Zheng, Ming-Zeng Hu Intrusion Detection of DoS/DDoS and Probing Attacks for Web Services. Search on Bibsonomy WAIM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
90Yi Shi, Xinyu Yang, Huijun Zhu A Flooding-Based DoS/DDoS Detecting Algorithm Based on Traffic Measurement and Prediction. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
89Yongjin Kim, Ahmed Helmy Attacker traceback with cross-layer monitoring in wireless multi-hop networks. Search on Bibsonomy SASN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF DoS/DDoS attack, attacker traceback, cross-layer monitoring, wireless multi-hop networks
84Chwan-Hwa John Wu, Chun-Ching Andy Huang, J. David Irwin Using Identity-Based Privacy-Protected Access Control Filter (IPACF) to against denial of service attacks and protect user privacy. Search on Bibsonomy SpringSim (3) The full citation details ... 2007 DBLP  BibTeX  RDF privacy, network security, DDoS, wireless security
64Domenico Cotroneo, L. Peluso, Simon Pietro Romano, Giorgio Ventre An active security protocol against DoS attacks. Search on Bibsonomy ISCC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Network Security, Denial of Service, Signaling protocols
61Hong-bin Yim, Jae-Il Jung IP Traceback Algorithm for DoS/DDoS Attack. Search on Bibsonomy APNOMS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
57Yongjin Kim, Ahmed Helmy SWAT: Small World-based Attacker Traceback in Ad-hoc Networks. Search on Bibsonomy MobiQuitous The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
56Shunsuke Oshima, Takuo Nakashima, Toshinori Sueyoshi Early DoS/DDoS Detection Method using Short-term Statistics. Search on Bibsonomy CISIS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF DoS/DDoS attacks, Short-term entropy, A test of significance, IDS, Statistical Method
56Shunsuke Oshima, Arata Hirakawa, Takuo Nakashima, Toshinori Sueyoshi DoS/DDoS Detection Scheme Using Statistical Method Based on the Destination Port Number. Search on Bibsonomy IIH-MSP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF DoS/DDos, Detection Scheme, Chi-square Method, Destination Port Number
51Bo-Chao Cheng, Huan Chen 0002, Guo-Tan Liao A Novel Marking Probability Distribution Using Probability Propagation in Hierarchical WSN. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF DoS/DDoS, WSN, Traceback, PPM, Convergence time
51Jun-Sang Park, Myung-Sup Kim Design and Implementation of an SNMP-Based Traffic Flooding Attack Detection System. Search on Bibsonomy APNOMS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Traffic Flooding Attack, DoS/DDoS, Detection Time, Detection System, SNMP, MIB, Detection Algorithm
51Ming-Yang Su, Kai-Chi Chang, Hua-Fu Wei, Chun-Yuen Lin Feature Weighting and Selection for a Real-Time Network Intrusion Detection System Based on GA with KNN. Search on Bibsonomy ISI Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF NIDS (Network Intrusion Detection System), DoS/DDoS Attacks, KNN (k-Nearest Neighbor), Genetic Algorithm, Network Security
49Yong Cui 0001, Lingjian Song, Ke Xu 0002 RCS: A Distributed Mechanism Against Link Flooding DDoS Attacks. Search on Bibsonomy ICOIN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
46Yongjin Kim ATTENTION: ATTackEr Traceback Using MAC Layer AbNormality DetecTION. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF DoS, DDoS, Traceback
46Aliya Awais, Muddassar Farooq, Muhammad Younus Javed Attack analysis & bio-inspired security framework for IPMultimedia subsystem. Search on Bibsonomy GECCO (Companion) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF network security, artificial immune systems, ip multimedia subsystem
46Aliya Awais, Muddassar Farooq, Muhammad Younus Javed Attack analysis & bio-inspired security framework for IP multimedia subsystem. Search on Bibsonomy GECCO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF network, artificial immune systems, IP multimedia subsystem
43Song Huang, Ling Zhang 0005, Shouling Dong A Behavior-Based Ingress Rate-Limiting Mechanism Against DoS/DDoS Attacks. Search on Bibsonomy ICICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
38Fang-Yie Leu, Chia-Chi Pai Detecting DoS and DDoS Attacks Using Chi-Square. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
38Tong Liu, Chwan-Hwa John Wu Intrusion-resilient, DDoS-resistant and agent-assisted network security system. Search on Bibsonomy BROADNETS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
38Fang-Yie Leu, Jia-Chun Lin, Ming-Chang Li, Chao-Tung Yang A Performance-Based Grid Intrusion Detection System. Search on Bibsonomy COMPSAC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF PGIDS, Grid, DoS, DDoS, SSA, BPNN, SAA
38Kihong Park, Heejo Lee On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets. Search on Bibsonomy SIGCOMM The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
36Gitae Kim, Tony J. Bogovic, Dana Chee ACtive edge-Tagging (ACT): An Intruder Identification & Isolation Scheme in Active Networks. Search on Bibsonomy ISCC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Intruder Identification & Isolation, Distributed Denial of Service (DDoS) Attacks, Active (or Programmable) Networks, Network Security, Traffic Monitoring
32Shunsuke Oshima, Takuo Nakashima, Toshinori Sueyoshi Comparison of Properties between Entropy and Chi-Square Based Anomaly Detection Method. Search on Bibsonomy NBiS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF DoS/DDoS detection, chi-square value, Entropy, anomaly detection, statistical approach
29Muthusrinivasan Muthuprasanna, G. Manimaran, Zhengdao Wang Unified Defense Against DDoS Attacks. Search on Bibsonomy Networking The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Fazirulhisyam Hashim, M. Rubaiyat Kibria, Abbas Jamalipour A Detection and Recovery Architecture Against DoS and Worm Attacks in NGMN. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28RongJie Gu, Puliu Yan, Tao Zou, Chengcheng Guo An Automatic and Generic Early-Bird System for Internet Backbone Based on Traffic Anomaly Detection. Search on Bibsonomy ICN (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Henry C. J. Lee, Miao Ma, Vrizlynn L. L. Thing, Yi Xu On the Issues of IP Traceback for IPv6 and Mobile IPv6. Search on Bibsonomy ISCC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
24Xuan-Ha Nguyen, Kim-Hung Le Robust detection of unknown DoS/DDoS attacks in IoT networks using a hybrid learning model. Search on Bibsonomy Internet Things The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Alaa Alatram, Leslie F. Sikos, Mike Johnstone, Patryk Szewczyk, James Jin Kang DoS/DDoS-MQTT-IoT: A dataset for evaluating intrusions in IoT networks using the MQTT protocol. Search on Bibsonomy Comput. Networks The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Peyman Khordadpour, Saeed Ahmadi FIDS: Fuzzy Intrusion Detection System for simultaneous detection of DoS/DDoS attacks in Cloud computing. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Farouq Aliyu, Tarek R. Sheltami, Marwan H. Abu-Amara, Mohamed Deriche 0001, Ashraf S. Mahmoud Evaluation of Human Immune-Based IDPS Under DoS/DDoS Attacks. Search on Bibsonomy ACR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Saida Farhat, Manel Abdelkader, Amel Meddeb-Makhlouf, Faouzi Zarai Evaluation of DoS/DDoS Attack Detection with ML Techniques on CIC-IDS2017 Dataset. Search on Bibsonomy ICISSP The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Hikofumi Suzuki, Akiyoshi Iwasa, Takumi Uchiyama, Katsumi Wasaki Man-machine Cooperative Monitoring System to Support Detection of DoS/DDoS Attacks Through Continuous SOM Diagram Generation. Search on Bibsonomy NaNA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Bushra Alhijawi, Sufyan Almajali, Hany Elgala, Haythem Bany Salameh, Moussa Ayyash A survey on DoS/DDoS mitigation techniques in SDNs: Classification, comparison, solutions, testing tools and datasets. Search on Bibsonomy Comput. Electr. Eng. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Md Sajid Khan, Behnam Farzaneh, Nashid Shahriar, Niloy Saha, Raouf Boutaba SliceSecure: Impact and Detection of DoS/DDoS Attacks on 5G Network Slices. Search on Bibsonomy FNWF The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Shih-Ting Chiu, Heru Susanto, Fang-Yie Leu Shannon Entropy Mixing Cumulative Sum Algorithm for DoS/DDoS Detection and Defense. Search on Bibsonomy MobiSec The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Jorge Steven Martinez Osorio, Jaime Alberto Vergara Tejada, Juan Felipe Botero Detection of DoS/DDoS attacks: the UBM and GMM approach. Search on Bibsonomy IM The full citation details ... 2021 DBLP  BibTeX  RDF
24Giorgi Iashvili, Maksim Iavich, Razvan Bocu, Roman Odarchenko, Sergiy Gnatyuk Intrusion Detection System for 5G with a Focus on DOS/DDOS Attacks. Search on Bibsonomy IDAACS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Leonid Galchynsky, Mykola Graivoronskyi, Oleh O. Dmytrenko Evaluation of Machine Learning Methods to Detect DoS / DDoS Attacks on IoT. Search on Bibsonomy ITS The full citation details ... 2021 DBLP  BibTeX  RDF
24Jia Chen, Haiyu Jia, Qi Liu 0003 Dual-collaborative DoS/DDoS mitigation approach in information-centric mobile Internet. Search on Bibsonomy Int. J. Commun. Syst. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Liming Fang 0001, Bo Zhao, Yang Li 0103, Zhe Liu 0001, Chunpeng Ge, Weizhi Meng 0001 Countermeasure Based on Smart Contracts and AI against DoS/DDoS Attack in 5G Circumstances. Search on Bibsonomy IEEE Netw. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Francisco Sales de Lima Filho, Frederico Augusto Fernandes Silveira, Agostinho de Medeiros Brito Júnior, Genoveva Vargas-Solar, Luiz Felipe Q. Silveira Smart Detection: An Online Approach for DoS/DDoS Attack Detection Using Machine Learning. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
24Rajendra Patil, Harsha Dudeja, Snehal Gawade, Chirag Modi 0001 Protocol Specific Multi-Threaded Network Intrusion Detection System (PM-NIDS) for DoS/DDoS Attack Detection in Cloud. Search on Bibsonomy ICCCNT The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
24Osman Ali, Paul Cotae Towards DoS/DDoS Attack Detection Using Artificial Neural Networks. Search on Bibsonomy UEMCON The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
24Marcos V. O. de Assis, Anderson H. Hamamoto, Taufik Abrão, Mario Lemes Proença Jr. A Game Theoretical Based System Using Holt-Winters and Genetic Algorithm With Fuzzy Logic for DoS/DDoS Mitigation on SDN Networks. Search on Bibsonomy IEEE Access The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
24Linzhi Jiang, Chunxiang Xu, Xiaofang Wang, Yanghong Zhou Analysis and Comparison of the Network Security Protocol with DoS/DDoS Attack Resistance Performance. Search on Bibsonomy HPCC/CSS/ICESS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
24 Radware Lagebericht: DoS-/DDoS-Attacken unter den aktuell größten Gefahren für die IT-Sicherheit. Search on Bibsonomy Datenschutz und Datensicherheit The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
24Mohammed A. Saleh, Azizah Abdul Manaf Protective Frameworks and Schemes to Detect and Prevent High Rate DoS/DDoS and Flash Crowd Attacks: A Comprehensive Review. Search on Bibsonomy AMLTA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
24Alex Doyal, Justin Zhan Triple DoS: DDoS defence and traceback. Search on Bibsonomy Int. J. Inf. Priv. Secur. Integr. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
24Daeyoub Kim, Jihoon Lee How to Make Content Centric Network (CCN) More Robust against DoS/DDoS Attack. Search on Bibsonomy IEICE Trans. Commun. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
24Theodoros Spyridopoulos, G. Karanikas, Theodore Tryfonas, Georgios Oikonomou A game theoretic defence framework against DoS/DDoS cyber attacks. Search on Bibsonomy Comput. Secur. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
24Uliana Yatsykovska, Mykola Karpinski, Ihor Vasyltsov, Pavlo Bykovyy The monitoring system of DoS/DDoS attacks in the global network. Search on Bibsonomy IDAACS (2) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
24PyungKoo Park, HeeKyoung Yi, Sangjin Hong, Jaecheol Ryou 0001 An effective defense mechanism against DoS/DDoS attacks in flow-based routers. Search on Bibsonomy MoMM The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Ping Du, Shunji Abe IP Packet Size Entropy-Based Scheme for Detection of DoS/DDoS Attacks. Search on Bibsonomy IEICE Trans. Inf. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Takanori Komatsu, Akira Namatame On the Effectiveness of Rate-Limiting Methods to Mitigate Distributed DoS (DDoS) Attacks. Search on Bibsonomy IEICE Trans. Commun. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Jin Shu, Fengyu Liu, Manwu Xu Baseline - A Passive Approach to Tolerate and Detect DoS/DDoS Attacks. Search on Bibsonomy Security and Management The full citation details ... 2005 DBLP  BibTeX  RDF
24Vrizlynn L. L. Thing, Henry C. J. Lee, Morris Sloman Traffic Redirection Attack Protection System (TRAPS) - A Full-Fledged Adaptive DoS/DDoS Attack Mitigation Scheme. Search on Bibsonomy SEC The full citation details ... 2005 DBLP  BibTeX  RDF
19Jun Bi, Ping Hu, Lizhong Xie Shim6: Reference Implementation and Optimization. Search on Bibsonomy Networking The full citation details ... 2008 DBLP  DOI  BibTeX  RDF IPv6, Multihoming, Shim6
19Yan Shen, Jun Bi, Jianping Wu, Qiang Liu The Automatic Peer-to-Peer Signature for Source Address Validation. Search on Bibsonomy KES (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Source Address Spoofing, Spoofing Prevention, Key Management
19Yang Li 0002, Binxing Fang A Lightweight Online Network Anomaly Detection Scheme Based on Data Mining Methods. Search on Bibsonomy ICNP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Muthusrinivasan Muthuprasanna, G. Manimaran, Mansoor Alicherry, Vijay Kumar Coloring the Internet: IP Traceback. Search on Bibsonomy ICPADS (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Hai-Tao He, Xiao-Nan Luo, Bao-Lu Liu Detecting Anomalous Network Traffic with Combined Fuzzy-Based Approaches. Search on Bibsonomy ICIC (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Fu-Hau Hsu, Tzi-cker Chiueh CTCP: A Transparent Centralized TCP/IP Architecture for Network Security. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
19Henry C. J. Lee, Vrizlynn L. L. Thing, Yi Xu, Miao Ma ICMP Traceback with Cumulative Path, an Efficient Solution for IP Traceback. Search on Bibsonomy ICICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #66 of 66 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license