|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1332 occurrences of 792 keywords
|
|
|
Results
Found 12185 publication records. Showing 10178 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
179 | Siyuan Xin, Xingyuan Chen, Huilin Tang, Ning Zhu |
Research on DoS Atomic Attack Oriented to Attack Resistance Test. |
ICNSC |
2008 |
DBLP DOI BibTeX RDF |
|
86 | Imad Aad, Jean-Pierre Hubaux, Edward W. Knightly |
Impact of denial of service attacks on ad hoc networks. |
IEEE/ACM Trans. Netw. |
2008 |
DBLP DOI BibTeX RDF |
black hole attacks, ad hoc networks, DoS attacks |
86 | Mudhakar Srivatsa, Arun Iyengar, Jian Yin 0002, Ling Liu 0001 |
A Client-Transparent Approach to Defend Against Denial of Service Attacks. |
SRDS |
2006 |
DBLP DOI BibTeX RDF |
Client Transparency, Denial of Service (DoS) attacks, Authentication, Availability, Web Servers |
86 | Imad Aad, Jean-Pierre Hubaux, Edward W. Knightly |
Denial of service resilience in ad hoc networks. |
MobiCom |
2004 |
DBLP DOI BibTeX RDF |
ad hoc networks, TCP, UDP, DoS attacks |
79 | Alex Wun, Alex King Yeung Cheung, Hans-Arno Jacobsen |
A taxonomy for denial of service attacks in content-based publish/subscribe systems. |
DEBS |
2007 |
DBLP DOI BibTeX RDF |
security, denial of service, publish/subscribe |
74 | Amey Shevtekar, Nirwan Ansari |
A Proactive Test Based Differentiation Technique to Mitigate Low Rate DoS Attacks. |
ICCCN |
2007 |
DBLP DOI BibTeX RDF |
|
69 | Clayton Bolz, Gordon W. Romney, Brandon L. Rogers |
Safely train security engineers regarding the dangers presented by denial of service attacks. |
SIGITE Conference |
2004 |
DBLP DOI BibTeX RDF |
DoS lab, isolated lab, network security, information technology, DDoS |
65 | Tsuyoshi Chiba, Takashi Katoh, Bhed Bahadur Bista, Toyoo Takata |
DoS Packet Filter Using DNS Information. |
AINA (1) |
2006 |
DBLP DOI BibTeX RDF |
|
63 | Xiangbin Cheng, Jun Bi, Xing Li |
Swing - A Novel Mechanism Inspired by Shim6 Address-Switch Conception to Limit the Effectiveness of DoS Attacks. |
ICN |
2008 |
DBLP DOI BibTeX RDF |
IPv6, Shim6, DoS attack |
62 | Yuh-Min Tseng |
Efficient authenticated key agreement protocols resistant to a denial-of-service attack. |
Int. J. Netw. Manag. |
2005 |
DBLP DOI BibTeX RDF |
|
60 | Mudhakar Srivatsa, Arun Iyengar, Jian Yin 0002, Ling Liu 0001 |
Mitigating application-level denial of service attacks on Web servers: A client-transparent approach. |
ACM Trans. Web |
2008 |
DBLP DOI BibTeX RDF |
client transparency, game theory, Web servers, DoS Attacks |
56 | Ming Luo, Tao Peng 0002, Christopher Leckie |
CPU-based DoS attacks against SIP servers. |
NOMS |
2008 |
DBLP DOI BibTeX RDF |
|
56 | Bosheng Zhou, Alan Marshall 0001, Wenzhe Zhou, Kun Yang |
A Random Packet Destruction DoS Attack for Wireless Networks. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
56 | Daniel Boteanu, José M. Fernandez 0001, John McHugh, John Mullins |
Queue Management as a DoS Counter-Measure? |
ISC |
2007 |
DBLP DOI BibTeX RDF |
degradation of service attack, dynamic timeout, timeout, queue management, Denial of service attack |
56 | MyungSik Choi, Dong Jin Kwak, Sang-Jae Moon |
A Proposal for DoS-Defensive Internet Key Exchange. |
ICCSA (2) |
2003 |
DBLP DOI BibTeX RDF |
Internet Key Exchange, Authentication and Key Agreement, Denial of Service, IPsec |
56 | Domenico Cotroneo, L. Peluso, Simon Pietro Romano, Giorgio Ventre |
An active security protocol against DoS attacks. |
ISCC |
2002 |
DBLP DOI BibTeX RDF |
Network Security, Denial of Service, Signaling protocols |
55 | Sazia Parvin, Shohrab Ali, Song Han 0004, Tharam S. Dillon |
Security against DOS attack in mobile IP communication. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
care-of-address (coa), correspondent node (cn), denial-of-service (dos), distributed denial-of-service (ddos), foreign agent (fa), home agent (ha), mobile host (mh), mobile node (mn) |
55 | Peng Ning, An Liu, Wenliang Du |
Mitigating DoS attacks against broadcast authentication in wireless sensor networks. |
ACM Trans. Sens. Networks |
2008 |
DBLP DOI BibTeX RDF |
security, Sensor networks, broadcast authentication, DoS attacks |
55 | Qi Dong 0001, Donggang Liu, Peng Ning |
Pre-authentication filters: providing dos resistance for signature-based broadcast authentication in sensor networks. |
WISEC |
2008 |
DBLP DOI BibTeX RDF |
security, sensor networks, broadcast authentication, DoS attacks |
55 | Valerio Schiavoni, Vivien Quéma |
A posteriori defensive programming: an annotation toolkit for DoS-resistant component-based architectures. |
SAC |
2006 |
DBLP DOI BibTeX RDF |
components, aspect-oriented programming, annotations, DoS attacks |
53 | Jelena Mirkovic, Peter L. Reiher, Sonia Fahmy, Roshan K. Thomas, Alefiya Hussain, Stephen Schwab, Calvin Ko |
Measuring denial Of service. |
QoP |
2006 |
DBLP DOI BibTeX RDF |
metrics, denial of service |
53 | Ting Xue, Natalija Vlajic |
Analytical and Simulation Based Evaluation of Wireless-to-Wireline TCP-SYN Attacks. |
CCECE |
2006 |
DBLP DOI BibTeX RDF |
|
53 | Srinivas Mukkamala, Andrew H. Sung |
A framework for countering denial of service attacks. |
SMC (4) |
2004 |
DBLP DOI BibTeX RDF |
|
53 | Kevin Lacoble |
Designing user services on a PC LAN. |
SIGUCCS |
1987 |
DBLP DOI BibTeX RDF |
|
50 | Guoxing Zhang, Shengming Jiang, Gang Wei, Quansheng Guan |
A prediction-based detection algorithm against distributed denial-of-service attacks. |
IWCMC |
2009 |
DBLP DOI BibTeX RDF |
available service rate, prediction-based detection of DDoS and low-rate TCP attacks, distributed DoS (DDoS), denial-of-service attacks (DoS) |
47 | Yu Zhang 0034, Xingshe Zhou 0001, Yee Wei Law, Marimuthu Palaniswami |
Insider DoS Attacks on Epidemic Propagation Strategies of Network Reprogramming in Wireless Sensor Networks. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Hailun Tan, Diethelm Ostry, John Zic, Sanjay K. Jha |
A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks. |
WISEC |
2009 |
DBLP DOI BibTeX RDF |
code dissemination protocols, sensor network security, broadcast authentication, code distribution |
47 | Hakem Beitollahi, Geert Deconinck |
FOSeL: Filtering by Helping an Overlay Security Layer to Mitigate DoS Attacks. |
NCA |
2008 |
DBLP DOI BibTeX RDF |
|
47 | Sherif M. Khattab, Sameh Gobriel, Rami G. Melhem, Daniel Mossé |
Live Baiting for Service-Level DoS Attackers. |
INFOCOM |
2008 |
DBLP DOI BibTeX RDF |
|
47 | Pravin Shinde, Srinivas Guntupalli |
Early DoS Attack Detection using Smoothened Time-Series andWavelet Analysis. |
IAS |
2007 |
DBLP DOI BibTeX RDF |
|
47 | Zhen Cao, Zhi Guan, Zhong Chen 0001, Jian-bin Hu, Liyong Tang |
An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols. |
ISPEC |
2007 |
DBLP DOI BibTeX RDF |
|
47 | Sirikarn Pukkawanna, Vasaka Visoottiviseth, Panita Pongpaibool |
Lightweight Detection of DoS Attacks. |
ICON |
2007 |
DBLP DOI BibTeX RDF |
|
47 | Stephen Frechette, Dimiter R. Avresky |
A Proxy Network Topology and Reconfiguration Algorithm for Resistance to DoS Attacks. |
NCA |
2006 |
DBLP DOI BibTeX RDF |
|
47 | Taieb Znati, James Amadei, Daniel R. Pazehoski, Scott Sweeny |
Design and Analysis of an Adaptive, Global Strategy for Detecting and Mitigating Distributed DoS Attacks in GRID Environments. |
Annual Simulation Symposium |
2006 |
DBLP DOI BibTeX RDF |
|
47 | Byung Ryong Kim, Ki-Chang Kim |
Improved Technique of IP Address Fragmentation Strategies for DoS Attack Traceback. |
CSR |
2006 |
DBLP DOI BibTeX RDF |
|
47 | Wenjie Wang 0006, Yongqiang Xiong, Qian Zhang 0001, Sugih Jamin |
Ripple-Stream: Safeguarding P2P Streaming Against Dos Attacks. |
ICME |
2006 |
DBLP DOI BibTeX RDF |
|
47 | Xiaoming Fu 0001, Jon Crowcroft |
GONE: an infrastructure overlay for resilient, DoS-limiting networking. |
NOSSDAV |
2006 |
DBLP DOI BibTeX RDF |
general internet signaling transport, overlay networking, denial-of-service, resilience, host identity protocol |
47 | Fanglu Guo, Jiawu Chen, Tzi-cker Chiueh |
Spoof Detection for Preventing DoS Attacks against DNS Servers. |
ICDCS |
2006 |
DBLP DOI BibTeX RDF |
|
47 | Takayuki Furuya, Takahiro Matsuzaki, Kanta Matsuura |
Detection of Unknown DoS Attacks by Kolmogorov-Complexity Fluctuation. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
|
47 | Jun Zheng, Ming-Zeng Hu |
Intrusion Detection of DoS/DDoS and Probing Attacks for Web Services. |
WAIM |
2005 |
DBLP DOI BibTeX RDF |
|
46 | Chung-Hsin Liu, Po-Cheng Teng, Chun-Lin Lo, Kuo-Hao Lee |
The study of the wireless network DoS attack. |
ICIS |
2009 |
DBLP DOI BibTeX RDF |
routing, DoS, NS2 |
46 | Gaston Ormazabal, Sarvesh Nagpal, Eilon Yardeni, Henning Schulzrinne |
Secure SIP: A Scalable Prevention Mechanism for DoS Attacks on SIP Based VoIP Systems. |
IPTComm |
2008 |
DBLP DOI BibTeX RDF |
Signaling Attacks, Application Layer Firewall, Security, Scalability, Distributed Computing, SIP, VoIP, DoS, DDoS, Deep Packet Inspection |
46 | Sheraz Naseer, Muhammad Younus, Attiq Ahmed |
Vulnerabilities Exposing IEEE 802.16e Networks to DoS Attacks: A Survey. |
SNPD |
2008 |
DBLP DOI BibTeX RDF |
IEEE 802.16e security, Multi- and broadcast service shared key vulnerability, WiMAX, DoS Attacks |
46 | Yajuan Tang, Xiapu Luo, Rocky K. C. Chang |
Protecting Internet Services from Low-Rate DoS Attacks. |
Critical Infrastructure Protection |
2007 |
DBLP DOI BibTeX RDF |
low-rate DoS attacks, detection, Feedback control, countermeasures |
46 | Ivan Martinovic, Frank A. Zdarsky, Jens B. Schmitt |
Regional-based authentication against dos attacks in wireless networks. |
Q2SWinet |
2007 |
DBLP DOI BibTeX RDF |
denial-of-service (DoS) attacks, wireless LAN, impersonation attacks |
46 | Kuo Dong, Shoubao Yang, Shaolin Wang |
Analysis of low-rate TCP DoS attack against FAST TCP. |
ISDA (3) |
2006 |
DBLP DOI BibTeX RDF |
Denial of Service(DoS), RTO, TCP Reno, FAST TCP |
46 | Haining Wang, Danlu Zhang, Kang G. Shin |
Change-Point Monitoring for the Detection of DoS Attacks. |
IEEE Trans. Dependable Secur. Comput. |
2004 |
DBLP DOI BibTeX RDF |
CUSUM algorithm, protocol behavior, intrusion detection, DoS attacks |
46 | Brent Waters, Ari Juels, J. Alex Halderman, Edward W. Felten |
New client puzzle outsourcing techniques for DoS resistance. |
CCS |
2004 |
DBLP DOI BibTeX RDF |
DoS, denial-of-service, client puzzles |
46 | Charlie Kaufman, Radia J. Perlman, Bill Sommerfeld |
DoS protection for UDP-based protocols. |
CCS |
2003 |
DBLP DOI BibTeX RDF |
buffer exhaustion, network security, DoS, denial of service, fragmentation, IPsec, protocol design, IKE |
46 | Daniel B. Faria, David R. Cheriton |
DoS and authentication in wireless public access networks. |
Workshop on Wireless Security |
2002 |
DBLP DOI BibTeX RDF |
security, wireless networks, DoS |
46 | Richard R. N. Eller |
A Modern APL Windows User Interface with DOS Downwards Compatibility: the Solution for two Years Onwards. |
APL |
1993 |
DBLP DOI BibTeX RDF |
APL, Windows, DOS |
44 | Dong Zheng 0004, Weiyan Ge, Junshan Zhang |
Distributed Opportunistic Scheduling for Ad Hoc Networks With Random Access: An Optimal Stopping Approach. |
IEEE Trans. Inf. Theory |
2009 |
DBLP DOI BibTeX RDF |
|
44 | Hakem Beitollahi, Geert Deconinck |
An overlay protection layer against Denial-of-Service attacks. |
IPDPS |
2008 |
DBLP DOI BibTeX RDF |
|
44 | Gal Badishi, Amir Herzberg, Idit Keidar, Oleg Romanov, Avital Yachin |
An Empirical Study of Denial of Service Mitigation Techniques. |
SRDS |
2008 |
DBLP DOI BibTeX RDF |
|
44 | Chwan-Hwa John Wu, Chun-Ching Andy Huang, J. David Irwin |
Using Identity-Based Privacy-Protected Access Control Filter (IPACF) to against denial of service attacks and protect user privacy. |
SpringSim (3) |
2007 |
DBLP BibTeX RDF |
privacy, network security, DDoS, wireless security |
44 | Jelena Mirkovic, Alefiya Hussain, Brett Wilson, Sonia Fahmy, Peter L. Reiher, Roshan K. Thomas, Wei-Min Yao, Stephen Schwab |
Towards user-centric metrics for denial-of-service measurement. |
Experimental Computer Science |
2007 |
DBLP DOI BibTeX RDF |
metrics, denial of service |
44 | Yinqing Li, Jianhui Chen |
A Denial-of-Service Resistant Authentication Solution for Security Protocols. |
IITA |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Dong Seong Kim 0001, Sang Min Lee 0018, Jong Sou Park |
Toward Lightweight Detection and Visualization for Denial of Service Attacks. |
MICAI |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Chia-Mei Chen, Bingchiang Jeng, Chia Ru Yang, Gu Hsin Lai |
Tracing Denial of Service Origin: Ant Colony Approach. |
EvoWorkshops |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Scott Fowler, Sherali Zeadally |
Defending against Distributed Denial of Service (DDoS) Attacks with Queue Traffic Differentiation over Micro-MPLS-based Wireless Networks. |
ICSNC |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Mudhakar Srivatsa, Arun Iyengar, Jian Yin 0002, Ling Liu 0001 |
A Middleware System for Protecting Against Application Level Denial of Service Attacks. |
Middleware |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Srinivas Mukkamala, Andrew H. Sung |
Computational Intelligent Techniques for Detecting Denial of Service Attacks. |
IEA/AIE |
2004 |
DBLP DOI BibTeX RDF |
|
42 | Yongjin Kim |
ATTENTION: ATTackEr Traceback Using MAC Layer AbNormality DetecTION. |
ISA |
2009 |
DBLP DOI BibTeX RDF |
DoS, DDoS, Traceback |
42 | Manhee Lee, Eun Jung Kim 0001 |
A Comprehensive Framework for Enhancing Security in InfiniBand Architecture. |
IEEE Trans. Parallel Distributed Syst. |
2007 |
DBLP DOI BibTeX RDF |
Cluster Security, InfiniBand Architecture, Galois/Counter Mode, Availability DoS, Authentication, Encryption |
42 | Joseph Chee Ming Teo, Chik How Tan, Jim Mee Ng |
Denial-of-service attack resilience dynamic group key agreement for heterogeneous networks. |
Telecommun. Syst. |
2007 |
DBLP DOI BibTeX RDF |
Authenticated group key agreement, Dynamic group membership, Heterogeneous networks, Secure group communication, DoS attacks |
42 | Yongjin Kim, Ahmed Helmy |
Attacker traceback with cross-layer monitoring in wireless multi-hop networks. |
SASN |
2006 |
DBLP DOI BibTeX RDF |
DoS/DDoS attack, attacker traceback, cross-layer monitoring, wireless multi-hop networks |
42 | Mike Just, Evangelos Kranakis, Tao Wan 0004 |
Resisting Malicious Packet Dropping in Wireless Ad Hoc Networks. |
ADHOC-NOW |
2003 |
DBLP DOI BibTeX RDF |
Distributed Probing, Security, Wireless Ad Hoc Networks, Denial of Service (DoS), Secure Routing Protocols |
39 | Ayesha Altaf, Rabia Sirhindi, Attiq Ahmed |
A Novel Approach against DoS Attacks in WiMAX Authentication Using Visual Cryptography. |
SECURWARE |
2008 |
DBLP DOI BibTeX RDF |
|
39 | Gaeil An, Kiyoung Kim |
Real-Time IP Checking and Packet Marking for Preventing ND-DoS Attack Employing Fake Source IP in IPv6 LAN. |
ATC |
2008 |
DBLP DOI BibTeX RDF |
|
39 | Rohit Chadha, Carl A. Gunter, José Meseguer 0001, Ravinder Shankesi, Mahesh Viswanathan 0001 |
Modular Preservation of Safety Properties by Cookie-Based DoS-Protection Wrappers. |
FMOODS |
2008 |
DBLP DOI BibTeX RDF |
|
39 | Qing Li 0034, Wade Trappe |
Reducing delay and enhancing DoS resistance in multicast authentication through multigrade security. |
IEEE Trans. Inf. Forensics Secur. |
2006 |
DBLP DOI BibTeX RDF |
|
39 | Nils Gruschka, Norbert Luttenberger |
Protecting Web Services from DoS Attacks by SOAP Message Validation. |
SEC |
2006 |
DBLP DOI BibTeX RDF |
|
39 | Suratose Tritilanunt, Colin Boyd, Ernest Foo, Juan Manuel González Nieto |
Examining the DoS Resistance of HIP. |
OTM Workshops (1) |
2006 |
DBLP DOI BibTeX RDF |
|
39 | Yi Shi, Xinyu Yang, Huijun Zhu |
A Flooding-Based DoS/DDoS Detecting Algorithm Based on Traffic Measurement and Prediction. |
IWSEC |
2006 |
DBLP DOI BibTeX RDF |
|
39 | Stephen Frechette |
A Proxy-Network Based Overlay Topology Resistant to DoS Attacks and Partitioning. |
IPDPS |
2005 |
DBLP DOI BibTeX RDF |
|
39 | Hao Yang 0004, Haiyun Luo, Yi Yang, Songwu Lu, Lixia Zhang 0001 |
HOURS: Achieving DoS Resilience in an Open Service Hierarchy. |
DSN |
2004 |
DBLP DOI BibTeX RDF |
|
39 | Christos Siaterlis, Basil S. Maglaris |
Towards multisensor data fusion for DoS detection. |
SAC |
2004 |
DBLP DOI BibTeX RDF |
anomaly detection, data fusion, Denial of Service |
37 | Udaya Kiran Tupakula, Vijay Varadharajan, Srini Rao Pandalaneni |
DoSTRACK: a system for defending against DoS attacks. |
SAC |
2009 |
DBLP DOI BibTeX RDF |
Smurf, TCP SYN flood, DoS, DDoS, reflection attacks |
37 | Deven Shah, Ashish Mangal, Mayank Agarwal, Mahendra Mehra, Tushar Dave, Dhiren R. Patel |
Protecting Global SOA from DoS and Other Security Threats. |
ISA |
2009 |
DBLP DOI BibTeX RDF |
Global SOA, Handlers, Security, Simulation, Web Services, SOA, DoS, Denial of Service |
37 | Sangwon Hyun, Peng Ning, An Liu, Wenliang Du |
Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks. |
IPSN |
2008 |
DBLP DOI BibTeX RDF |
secure remote programming, Wireless sensor network security, DoS attacks |
37 | An Liu, Young-Hyun Oh, Peng Ning |
Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks Using Seluge. |
IPSN |
2008 |
DBLP DOI BibTeX RDF |
Seluge, secure and DoS-resistant code dissemination, WiSeNeT, demo |
37 | Amar Aissani |
Queueing Analysis for Networks Under DoS Attack. |
ICCSA (2) |
2008 |
DBLP DOI BibTeX RDF |
Network security, Queueing, Timeout, Steady-state distribution, DoS attack |
37 | Toshikazu Uemura, Tadashi Dohi |
Quantitative Evaluation of Intrusion Tolerant Systems Subject to DoS Attacks Via Semi-Markov Cost Models. |
EUC Workshops |
2007 |
DBLP DOI BibTeX RDF |
long-run average cost, information security, intrusion tolerance, preventive maintenance, semi-Markov models, DoS attack |
37 | Antonio Fernandez Gómez-Skarmeta, Angel L. Mateo-Martinez, Pedro M. Ruiz-Martinez |
IGMPv3-Based Method for Avoiding DoS Attacks in Multicast-Enabled Networks. |
LCN |
2000 |
DBLP DOI BibTeX RDF |
DoS attack avoidance, IGMPv3-based method, IP multicast-enabled networks, security protection, Internet, authentication, transport protocols, multimedia communication, multimedia communications, video conferencing, teleconferencing, multicast communication, message authentication, telecommunication security, billing, Internet service providers, audio conferencing |
37 | László Csaba |
Experience with User Interface Reengineering Transferring DOS Panels to Windows. |
CSMR |
1997 |
DBLP DOI BibTeX RDF |
Artificial User Program, S-Prog, Word Basic, Windows, Remote Controlling, DOS, User Interface Reengineering |
36 | Shigeo Akashi, Yao Tong |
On the Distributed DoS Attacks Targeting at the Bottlenecked Links: More Threatening DoS Attacks than Server Targeting DoS Attacks. |
CNIOT |
2021 |
DBLP DOI BibTeX RDF |
|
36 | Carlos Alberto Ferreira Bispo, Edson Walmir Cazarini |
A Evolução, a Situação Atual e a Tendência de Alguns Itens que Influenciam a Qualidade dos Processos e dos Produtos e Também o Nível de Exigência dos Consumidores. |
QUATIC |
2001 |
DBLP BibTeX RDF |
|
36 | Ana Larissa Ribeiro de Freitas, Liana Oighenstein Anderson, Paulo Henrique Alves Leão, João Bosco Coura dos Reis, Celso Henrique Leite Silva Junior, Nathália S. Carvalho, Ana Carolina M. Pessôa, Wanderson Henrique dos Santos |
Previsão da probabilidade de fogo: ocorrências pós-alerta na Amazônia Maranhense. |
GEOINFO |
2022 |
DBLP BibTeX RDF |
|
36 | Lina Maria Osorio Olivos, Arisvaldo Vieira Méllo Junior, Silvana Susko Marcellini, Dário Hachisu Hossoda, Rogério Moreira Chagas, Gabriel A. dos Santos Soares, Flávia Ribeiro dos Santos Jacobsem, André Schardong |
Development of a data set for distributed hydrological simulation of Paraiba do Sul Basin. |
GEOINFO |
2022 |
DBLP BibTeX RDF |
|
36 | Talita N. Terra, Ana Cláudia dos Santos Luciano, Júlio C. D. M. Esquerdo, Alexandre Camargo Coutinho, João F. G. Antunes, João Luis dos Santos, Lídia S. Bertolo |
Dinâmica da intensificação da agricultura temporária na Área de Proteção Ambiental Ilha do Bananal-Cantão. |
GEOINFO |
2020 |
DBLP BibTeX RDF |
|
36 | Patrícia dos Santos Teixeira, Afonso de Paula dos Santos |
Implementação de ferramenta para Controle de Qualidade Cartográfica no software QGIS. |
GEOINFO |
2019 |
DBLP BibTeX RDF |
|
36 | Eunice P. dos Santos Nunes, Fátima de Lourdes dos Santos Nunes, Rafael Luiz Testa, Licínio G. Roque |
Um estudo experimental sobre a captura automática dos dados de interação em ambientes virtuais tridimensionais. |
IHC |
2014 |
DBLP BibTeX RDF |
|
36 | Karla Donato Fook, Daniela Leal Musa, Nandamudi Vijaykumar, Rodrigo M. Mariano, Gabriel dos Reis Morais, Raphael Augusto O. Silva, Gabriel Sansigolo, Luciana Brasil Rebelo dos Santos, Luís Antônio Coelho Ferla, Cintia Almeida, Luanna G. M. do Nascimento, Vitória Martins Fontes da Silva, Monaliza C. dos Santos, Aracele Torres, Ângela Pereira, Fernando Atique, Jeffrey Lesser, Thomas D. Rogers, Andrew G. Britt, Rafael Laguardia, Ana Maria Alves Barbour, Orlando Guarnier Farias, Ariana Marco, Caróu Dickinson, Sand Tamires P. Camargo |
Collaborative Historical Platform for Historians: Extended Functionalities in Pauliceia 2.0. |
WEBIST |
2021 |
DBLP DOI BibTeX RDF |
|
36 | Rosangela Monteiro dos Santos, João Eduardo Guarnetti dos Santos, Ademir Marques Junior, Flavio Cardoso Ventura, João Victor Gomes dos Santos, Pedro Yuri Kovatch, Luis Carlos Paschoarelli, Fausto Orsi Medola |
Women's Footwear Sole for the Elderly Produced with Sustainable Material: Friction Coefficient Analysis. |
AHFE (15) |
2020 |
DBLP DOI BibTeX RDF |
|
36 | Yuri Santa Rosa Nassar dos Santos, Aruanda Simões Goncalves Meiguins, Diego Hortencio dos Santos, Carlos Gustavo Resque dos Santos, Jefferson Magalhães de Morais, Bianchi Serique Meiguins |
Data Visualization Scenarios for the Analysis of Computational Evolutionary Techniques. |
IV (1) |
2019 |
DBLP DOI BibTeX RDF |
|
36 | Rosana Abutakka Vasconcelos dos Anjos, Katia Morosov Alonso, Cristiano Maciel, Alexandre Martins dos Anjos, Eunice P. dos Santos Nunes |
Pedagogical standard for the Analysis of Virtual Learning Environments. |
FIE |
2016 |
DBLP DOI BibTeX RDF |
|
36 | José Elias Claudio Arroyo, Paula M. dos Santos, Michele dos Santos Soares, André Gustavo dos Santos |
A Multi-Objective Genetic Algorithm with Path Relinking for the p-Median Problem. |
IBERAMIA |
2010 |
DBLP DOI BibTeX RDF |
|
35 | Xin Liu 0059, Xiaowei Yang 0001, Yong Xia 0008 |
NetFence: preventing internet denial of service from inside out. |
SIGCOMM |
2010 |
DBLP DOI BibTeX RDF |
congestion policing, internet, denial-of-service, capability |
35 | XiaoFeng Wang 0001, Michael K. Reiter |
A multi-layer framework for puzzle-based denial-of-service defense. |
Int. J. Inf. Sec. |
2008 |
DBLP DOI BibTeX RDF |
Denial of service, Network protocols, Client puzzles |
35 | Hongbin Xia, Wenbo Xu |
Research on Method of Network Abnormal Detection Based on Hurst Parameter Estimation. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 10178 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|