Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
124 | Minho Sung, Jun (Jim) Xu, Jun Li, Li (Erran) Li |
Large-scale IP traceback in high-speed internet: practical techniques and information-theoretic foundation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE/ACM Trans. Netw. ![In: IEEE/ACM Trans. Netw. 16(6), pp. 1253-1266, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
network security, information theory, distributed denial-of-service attacks, IP traceback |
124 | Basheer Al-Duwairi, Govindarasu Manimaran |
Novel Hybrid Schemes Employing Packet Marking and Logging for IP Traceback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 17(5), pp. 403-418, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Internet security, DDoS attacks, IP traceback |
123 | Henry C. J. Lee, Vrizlynn L. L. Thing, Yi Xu, Miao Ma |
ICMP Traceback with Cumulative Path, an Efficient Solution for IP Traceback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings, pp. 124-135, 2003, Springer, 3-540-20150-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
118 | Yao Gang, Tughrul Arslan, Ahmet T. Erdogan |
An efficient pre-traceback approach for Viterbi decoding in wireless communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS (6) ![In: International Symposium on Circuits and Systems (ISCAS 2005), 23-26 May 2005, Kobe, Japan, pp. 5441-5444, 2005, IEEE, 0-7803-8834-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
118 | Jun Li, Minho Sung, Jun (Jim) Xu, Li (Erran) Li |
Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2004 IEEE Symposium on Security and Privacy (S&P 2004), 9-12 May 2004, Berkeley, CA, USA, pp. 115-129, 2004, IEEE Computer Society, 0-7695-2136-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
112 | Keisuke Takemori, Masahiko Fujinaga, Toshiya Sayama, Masakatsu Nishigaki |
Host-based traceback; tracking bot and C&C server. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICUIMC ![In: Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, ICUIMC 2009, Suwon, Korea, January 15-16, 2009, pp. 400-405, 2009, ACM, 978-1-60558-405-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
DNS reflection attack, host-based traceback, botnet, IP spoofing |
112 | Syed Obaid Amin, Muhammad Shoaib Siddiqui, Choong Seon Hong |
A novel IPv6 traceback architecture using COPS protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ann. des Télécommunications ![In: Ann. des Télécommunications 63(3-4), pp. 207-221, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Network security, Network management, IPv6, DDoS, Traceback |
112 | Udaya Kiran Tupakula, Vijay Varadharajan |
Analysis of traceback techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSW ![In: The proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), Hobart, Tasmania, Australia, January 2006, pp. 115-124, 2006, Australian Computer Society, 1-920-68236-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
DoS, denial of service, DDoS, traceback |
112 | Yongjin Kim, Ahmed Helmy |
Attacker traceback with cross-layer monitoring in wireless multi-hop networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SASN ![In: Proceedings of the 4th ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2006, Alexandria, VA, USA, October 30, 2006, pp. 123-134, 2006, ACM, 1-59593-554-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
DoS/DDoS attack, attacker traceback, cross-layer monitoring, wireless multi-hop networks |
112 | Yi-an Huang, Wenke Lee |
Hotspot-based traceback for mobile ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Workshop on Wireless Security ![In: Proceedings of the 2005 ACM Workshop on Wireless Security, Cologne, Germany, September 2, 2005, pp. 43-54, 2005, ACM, 1-59593-142-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
intrusion response, ad hoc networks, traceback |
107 | Syed Obaid Amin, Choong Seon Hong, Ki Young Kim |
Tracing the True Source of an IPv6 Datagram Using Policy Based Management System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APNOMS ![In: Management of Convergence Networks and Services, 9th Asia-Pacific Network Operations and Management Symposium, APNOMS 2006 Busan, Korea, September 27-29, 2006, Proceedings, pp. 263-272, 2006, Springer, 3-540-45776-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Network Security, IPv6, DDoS, Traceback |
105 | André O. Castelucio, Ronaldo M. Salles, Artur Ziviani |
Evaluating the partial deployment of an AS-level IP traceback system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), Fortaleza, Ceara, Brazil, March 16-20, 2008, pp. 2069-2073, 2008, ACM, 978-1-59593-753-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
AS-level packet traceback, denial of service, IP traceback |
99 | Hiroaki Hazeyama, Yoshihide Matsumoto, Youki Kadobayashi |
Design of an FDB based Intra-domain Packet Traceback System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 1313-1318, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Intra Domain, Forwarding Data Base, Security, IP Traceback |
99 | Hyung-Woo Lee, Taekyoung Kwon 0002, Hyung-Jong Kim 0002 |
NS-2 Based IP Traceback Simulation Against Reflector Based DDoS Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AIS ![In: Artificial Intelligence and Simulation, 13th International Conference on AI, Simulation, and Planning in High Autonomy Systems, AIS 2004, Jeju Island, Korea, October 4-6, 2004, Revised Selected Papers, pp. 90-99, 2004, Springer, 3-540-24476-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Reflector Attack, Simulation, DDoS, NS-2, IP Traceback |
99 | Fan Min 0001, Jun-yan Zhang, Guo-wie Yang |
An IP Traceback Scheme Integrating DPM and PPM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings, pp. 76-85, 2003, Springer, 3-540-20208-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Deterministic Packet Marking, Denial of Service, IP traceback, IP spoofing, Probabilistic Packet Marking |
93 | Yang Xiang 0001, Wanlei Zhou 0001, Minyi Guo |
Flexible Deterministic Packet Marking: An IP Traceback System to Find the Real Source of Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 20(4), pp. 567-580, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
93 | André O. Castelucio, Artur Ziviani, Ronaldo M. Salles |
An AS-level overlay network for IP traceback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Netw. ![In: IEEE Netw. 23(1), pp. 36-41, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
93 | Muthusrinivasan Muthuprasanna, G. Manimaran, Mansoor Alicherry, Vijay Kumar |
Coloring the Internet: IP Traceback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPADS (1) ![In: 12th International Conference on Parallel and Distributed Systems, ICPADS 2006, Minneapolis, Minnesota, USA, July 12-15, 2006, pp. 589-598, 2006, IEEE Computer Society, 0-7695-2612-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
93 | Yang Xiang 0001, Wanlei Zhou 0001 |
A Defense System against DDoS Attacks by Large-Scale IP Traceback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITA (2) ![In: Third International Conference on Information Technology and Applications (ICITA 2005), 4-7 July 2005, Sydney, Australia, pp. 431-436, 2005, IEEE Computer Society, 0-7695-2316-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
93 | Andrew Ayers, Richard Schooler, Chris Metcalf, Anant Agarwal, Junghwan Rhee, Emmett Witchel |
TraceBack: first fault diagnosis by reconstruction of distributed control flow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLDI ![In: Proceedings of the ACM SIGPLAN 2005 Conference on Programming Language Design and Implementation, Chicago, IL, USA, June 12-15, 2005, pp. 201-212, 2005, ACM, 1-59593-056-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
fault diagnosis, instrumentation |
93 | Masafumi Oe, Youki Kadobayashi, Suguru Yamaguchi |
An implementation of a hierarchical IP traceback architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT Workshops ![In: 2003 Symposium on Applications and the Internet Workshops (SAINT 2003), 27-31 January 2003 - Orlando, FL, USA, Proceedings, pp. 250-253, 2003, IEEE Computer Society, 0-7695-1873-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
87 | Hung-Yuan Hsu, Sencun Zhu, Ali R. Hurson |
A hotspot-based protocol for attack traceback in mobile ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, Beijing, China, April 13-16, 2010, pp. 333-336, 2010, ACM, 978-1-60558-936-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
packet logging, path fragmentation, mobile ad-hoc networks, traceback, packet marking |
87 | Yongjin Kim |
ATTENTION: ATTackEr Traceback Using MAC Layer AbNormality DetecTION. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISA ![In: Advances in Information Security and Assurance, Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings, pp. 239-249, 2009, Springer, 978-3-642-02616-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
DoS, DDoS, Traceback |
87 | Junfeng Tian, Ning Li |
A New Proactive Defense Model Based on Intrusion Deception and Traceback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers, pp. 497-506, 2007, Springer, 978-3-540-79498-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Intrusion deception, Trap environment, Honeypot, Traceback |
82 | Hyungwoo Kang, Soon Jwa Hong, Dong Hoon Lee 0001 |
Matching Connection Pairs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDCAT ![In: Parallel and Distributed Computing: Applications and Technologies, 5th International Conference, PDCAT 2004, Singapore, December 8-10, 2004, Proceedings, pp. 642-649, 2004, Springer, 3-540-24013-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Connection pairs, Detoured attack, Traceback, Stepping stone, Backdoor |
80 | Zaiyao Yi, Liuqing Pan, Xinmei Wang, Chen Huang 0003, Benxiong Huang |
IP Traceback Using Digital Watermark and Honeypot. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UIC ![In: Ubiquitous Intelligence and Computing, 5th International Conference, UIC 2008, Oslo, Norway, June 23-25, 2008, Proceedings, pp. 426-438, 2008, Springer, 978-3-540-69292-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
IP Tracebak, digital watermark, honeypot |
80 | Abraham Yaar, Adrian Perrig, Dawn Xiaodong Song |
FIT: fast Internet traceback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 13-17 March 2005, Miami, FL, USA, pp. 1395-1406, 2005, IEEE, 0-7803-8968-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
80 | Hyung-Woo Lee |
Advanced Packet Marking Mechanism with Pushback for IP Traceback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings, pp. 426-438, 2004, Springer, 3-540-22217-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
80 | Marcel Waldvogel |
GOSSIB vs. IP Traceback Rumors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 18th Annual Computer Security Applications Conference (ACSAC 2002), 9-13 December 2002, Las Vegas, NV, USA, pp. 5-13, 2002, IEEE Computer Society, 0-7695-1828-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
74 | Liming Lu, Mun Choon Chan, Ee-Chien Chang |
A general model of probabilistic packet marking for IP traceback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2008, Tokyo, Japan, March 18-20, 2008, pp. 179-188, 2008, ACM, 978-1-59593-979-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
probabilistic packet marking (PPM), random packet marking (RPM), network security, entropy, DDoS, IP traceback |
74 | Ahmad Fadlallah, Ahmed Serhrouchni |
PSAT: Proactive Signaling Architecture for IP Traceback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CNSR ![In: Fourth Annual Conference on Communication Networks and Services Research (CNSR 2006), 24-25 May 2006, Moncton, New Brunswick, Canada, pp. 293-299, 2006, IEEE Computer Society, 0-7695-2578-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
network security, denial of service, IP traceback |
69 | Tarik Taleb, Zubair Md. Fadlullah, Kazuo Hashimoto, Yoshiaki Nemoto, Nei Kato |
Tracing back attacks against encrypted protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the International Conference on Wireless Communications and Mobile Computing, IWCMC 2007, Honolulu, Hawaii, USA, August 12-16, 2007, pp. 121-126, 2007, ACM, 978-1-59593-695-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
encryption, intrusion detection system (IDS), traceback |
68 | Chao Gong 0006, Kamil Saraç |
A More Practical Approach for Single-Packet IP Traceback using Packet Logging and Marking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 19(10), pp. 1310-1324, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
68 | Cheng-Hung Lin, Chun-Yu Chen, An-Yeu Wu |
Low-power traceback MAP decoding for double-binary convolutional turbo decoder. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS ![In: International Symposium on Circuits and Systems (ISCAS 2008), 18-21 May 2008, Sheraton Seattle Hotel, Seattle, Washington, USA, pp. 736-739, 2008, IEEE, 978-1-4244-1683-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
68 | Dan Peng, Zhicai Shi, Longming Tao, Wu Ma |
Enhanced and Authenticated Deterministic Packet Marking for IP Traceback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APPT ![In: Advanced Parallel Processing Technologies, 7th International Symposium, APPT 2007, Guangzhou, China, November 22-23, 2007, Proceedings, pp. 508-517, 2007, Springer, 978-3-540-76836-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
68 | Hiroaki Hazeyama, Youki Kadobayashi, Daisuke Miyamoto, Masafumi Oe |
An Autonomous Architecture for Inter-Domain Traceback across the Borders of Network Operation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 26-29 June 2006, Cagliari, Sardinia, Italy, pp. 378-385, 2006, IEEE Computer Society, 0-7695-2588-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
68 | Byung Ryong Kim, Ki-Chang Kim |
Improved Technique of IP Address Fragmentation Strategies for DoS Attack Traceback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSR ![In: Computer Science - Theory and Applications, First International Symposium on Computer Science in Russia, CSR 2006, St. Petersburg, Russia, June 8-12, 2006, Proceedings, pp. 427-437, 2006, Springer, 3-540-34166-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
68 | Syed Obaid Amin, Myung Soo Kang, Choong Seon Hong |
A Lightweight IP Traceback Mechanism on IPv6. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC Workshops ![In: Emerging Directions in Embedded and Ubiquitous Computing, EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1-4, 2006, Proceedings, pp. 671-680, 2006, Springer, 3-540-36850-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
68 | Chao Gong 0006, Kamil Saraç |
Toward a More Practical Marking Scheme for IP Traceback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BROADNETS ![In: 3rd International Conference on Broadband Communications, Networks, and Systems (BROADNETS 2006), 1-5 October 2006, San José, California, USA, 2006, IEEE, 978-1-4244-0425-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
68 | Yinan Jing, Peng Tu, Xueping Wang, Gendu Zhang |
Distributed-Log-based Scheme for IP Traceback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: Fifth International Conference on Computer and Information Technology (CIT 2005), 21-23 September 2005, Shanghai, China, pp. 711-715, 2005, IEEE Computer Society, 0-7695-2432-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
68 | Henry C. J. Lee, Miao Ma, Vrizlynn L. L. Thing, Yi Xu |
On the Issues of IP Traceback for IPv6 and Mobile IPv6. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June - 3 July 2003, Kiris-Kemer, Turkey, pp. 582-587, 2003, IEEE Computer Society, 0-7695-1961-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
68 | Yang-Seo Choi, Dong-il Seo, Sung Won Sohn, Sang-Ho Lee |
Network-Based Real-Time Connection Traceback System (NRCTS) with Packet Marking Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2003, International Conference, Montreal, Canada, May 18-21, 2003, Proceedings, Part II, pp. 31-40, 2003, Springer, 3-540-40161-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
63 | Muthusrinivasan Muthuprasanna, G. Manimaran, Zhengdao Wang |
Unified Defense Against DDoS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Networking ![In: NETWORKING 2007. Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet, 6th International IFIP-TC6 Networking Conference, Atlanta, GA, USA, May 14-18, 2007, Proceedings, pp. 1047-1059, 2007, Springer, 978-3-540-72605-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
62 | Guang Yao, Jun Bi, Zijian Zhou |
Passive IP traceback: capturing the origin of anonymous traffic through network telescopes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 2010 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, New Delhi, India, August 30 -September 3, 2010, pp. 413-414, 2010, ACM, 978-1-4503-0201-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
network telescope, IP traceback |
62 | Vrizlynn L. L. Thing, Morris Sloman, Naranker Dulay |
Non-intrusive IP traceback for DDoS attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, Singapore, March 20-22, 2007, pp. 371-373, 2007, ACM, 1-59593-574-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
distributed denial of service attacks, IP traceback |
62 | Minho Sung, Jun (Jim) Xu |
IP Traceback-Based Intelligent Packet Filtering: A Novel Technique for Defending against Internet DDoS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 14(9), pp. 861-872, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
performance modeling and simulation, Distributed Denial of Service (DDoS), IP traceback |
62 | Cemil Kirbas, Francis K. H. Quek |
Vessel Extraction in Medical Images by 3D Wave Propagation and Traceback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BIBE ![In: 3rd IEEE International Symposium on BioInformatics and BioEngineering (BIBE 2003), 10-12 March 2003, Bethesda, MD, USA, pp. 174-181, 2003, IEEE Computer Society, 0-7695-1907-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
vascular extraction, Magnetic Resonance Angiography (MRA), traceback, Wave propagation |
62 | Drew Dean, Matthew K. Franklin, Adam Stubblefield |
An algebraic approach to IP traceback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 5(2), pp. 119-137, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Internet protocol, traceback |
56 | Ashley Chonka, Wanlei Zhou 0001, Jaipal Singh, Yang Xiang 0001 |
Detecting and Tracing DDoS Attacks by Intelligent Decision Prototype. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PerCom ![In: Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 17-21 March 2008, Hong Kong, pp. 578-583, 2008, IEEE Computer Society, 978-0-7695-3113-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Intelligent Decision Prototype, Machine Learning, Decision trees, Distributed Denial of Service, IP Traceback |
55 | Marios S. Andreou, Aad P. A. van Moorsel |
Logging based IP Traceback in switched ethernets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROSEC ![In: Proceedings of the First European Workshop on System Security, EUROSEC 2008, Glasgow, Scotland, UK, March 31, 2008, pp. 1-7, 2008, ACM, 978-1-60558-119-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
IP |
55 | Daniel Ramsbrock, Xinyuan Wang 0005, Xuxian Jiang |
A First Step towards Live Botmaster Traceback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings, pp. 59-77, 2008, Springer, 978-3-540-87402-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
55 | Wei Yu 0002, Xinwen Fu, Steve Graham, Dong Xuan, Wei Zhao 0001 |
DSSS-Based Flow Marking Technique for Invisible Traceback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2007 IEEE Symposium on Security and Privacy (S&P 2007), 20-23 May 2007, Oakland, California, USA, pp. 18-32, 2007, IEEE Computer Society, 0-7695-2848-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
55 | Vamsi Paruchuri, Arjan Durresi, Leonard Barolli |
FAST: Fast Autonomous System Traceback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 21st International Conference on Advanced Information Networking and Applications (AINA 2007), May 21-23, 2007, Niagara Falls, Canada, pp. 498-505, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
55 | Yinan Jing, Jingtao Li, Gendu Zhang |
An Adaptive Edge Marking Based Hierarchical IP Traceback System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCNMC ![In: Networking and Mobile Computing, Third International Conference, ICCNMC 2005, Zhangjiajie, China, August 2-4, 2005, Proceedings, pp. 1188-1197, 2005, Springer, 3-540-28102-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
55 | W. Timothy Strayer, Christine E. Jones, Beverly Schwartz |
Architecture for Multi-Stage Network Attack Traceback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 15-17 November 2005, Sydney, Australia, Proceedings, pp. 776-785, 2005, IEEE Computer Society, 0-7695-2421-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
55 | Hyung-Woo Lee, Min-goo Kang, Chang-Won Choi |
PTrace: Pushback/SVM Based ICMP Traceback Mechanism against DDoS Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part I, pp. 302-309, 2004, Springer, 3-540-22054-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
55 | Jeongmin Lee 0006, In Gu Han, Kyoon Ha Lee |
Design of Traceback System Using Selected Router. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICOIN ![In: Information Networking, Networking Technologies for Broadband and Mobile Networks, International Conference ICOIN 2004, Busan, Korea, February 18-20, 2004, Revised Selected Papers, pp. 877-885, 2004, Springer, 3-540-23034-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
55 | Bilal Rizvi, Emmanuel Fernández-Gaucherand |
Effectiveness of Advanced and Authenticated Packet Marking Scheme for Traceback of Denial of Service Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (2) ![In: International Conference on Information Technology: Coding and Computing (ITCC'04), Volume 2, April 5-7, 2004, Las Vegas, Nevada, USA, pp. 111-115, 2004, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
55 | K. H. Choi, H. K. Dai 0001 |
A Marking Scheme Using Huffman Codes for IP Traceback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPAN ![In: 7th International Symposium on Parallel Architectures, Algorithms, and Networks (I-SPAN 2004), 10-12 May 2004, Hong Kong, SAR, China, pp. 421-428, 2004, IEEE Computer Society, 0-7695-2135-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
55 | David Garrett, Mircea R. Stan |
A 2.5 Mb/s, 23 mW SOVA traceback chip for turbo decoding applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS (4) ![In: Proceedings of the 2001 International Symposium on Circuits and Systems, ISCAS 2001, Sydney, Australia, May 6-9, 2001, pp. 61-64, 2001, IEEE, 0-7803-6685-9. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
50 | Yi Shi, Xinyu Yang |
A Novel Architecture for Detecting and Defending Against Flooding-Based DDoS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS (2) ![In: Computational Intelligence and Security, International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II, pp. 364-374, 2005, Springer, 3-540-30819-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
49 | Michael T. Goodrich |
Probabilistic packet marking for large-scale IP traceback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE/ACM Trans. Netw. ![In: IEEE/ACM Trans. Netw. 16(1), pp. 15-24, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
associate addresses, checksum cords, denial of service (DDOS), distributed, IP, traceback, probabilistic packet marking |
49 | Denh Sy, Lichun Bao |
CAPTRA: coordinated packet traceback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPSN ![In: Proceedings of the Fifth International Conference on Information Processing in Sensor Networks, IPSN 2006, Nashville, Tennessee, USA, April 19-21, 2006, pp. 152-159, 2006, ACM, 1-59593-334-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
packet traceback, wireless sensor networks, bloom filter |
49 | Yu-Kuo Tseng, You-Yi Lu, Jen-Yi Huang, Wen-Shyong Hsieh, Bao Rong Chang, Yu-Chang Chen, Shi-Huang Chen |
ID-Based PPM for IP Traceback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICIC (2) ![In: First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August - 1 September 2006, Beijing, China, pp. 262-265, 2006, IEEE Computer Society, 0-7695-2616-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Network Security, DDoS, IP traceback, PPM |
49 | Brian D. Carrier, Clay Shields |
The session token protocol for forensics and traceback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 7(3), pp. 333-362, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
TCP traceback, auditing and intrusion detection, privacy, Digital forensics, digital investigations |
49 | Vamsi Paruchuri, Arjan Durresi, Rajgopal Kannan, S. Sitharama Iyengar |
Authenticated Autonomous System Traceback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (1) ![In: 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 29-31 March 2004, Fukuoka, Japan, pp. 406-413, 2004, IEEE Computer Society, 0-7695-2051-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
network security, DDoS, traceback |
49 | Alex C. Snoeren, Craig Partridge, Luis A. Sanchez, Christine E. Jones, Fabrice Tchakountio, Beverly Schwartz, Stephen T. Kent, W. Timothy Strayer |
Single-packet IP traceback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE/ACM Trans. Netw. ![In: IEEE/ACM Trans. Netw. 10(6), pp. 721-734, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
network fault diagnosis, IP, denial of service (DoS), wide-area networks (WANs), computer network management, IP traceback, computer network security |
49 | Michael T. Goodrich |
Efficient packet marking for large-scale IP traceback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, Washington, DC, USA, November 18-22, 2002, pp. 117-126, 2002, ACM, 1-58113-612-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
denial-of-service, traceback, packet marking |
44 | Wei Yen, Jeng-Shian Sung |
Dynamic Probabilistic Packet Marking with Partial Non-Preemption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UIC ![In: Ubiquitous Intelligence and Computing, 5th International Conference, UIC 2008, Oslo, Norway, June 23-25, 2008, Proceedings, pp. 732-745, 2008, Springer, 978-3-540-69292-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
re-marking, convergence packet number, DDoS, IP traceback, probabilistic packet marking |
43 | Karima Boudaoud, F. LeBorgne |
Towards an efficient implementation of traceback mechanisms in autonomous systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NOMS ![In: IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, NOMS 2008, 7-11 April 2008, Salvador, Bahia, Brazil, pp. 1015-1018, 2008, IEEE, 978-1-4244-2066-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
43 | Sandhya Armoogum, Nawaz Mohamudally 0001 |
Mobile agent based real time IP traceback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDIM ![In: Third IEEE International Conference on Digital Information Management (ICDIM), November 13-16, 2008, London, UK, Proceedings, pp. 69-74, 2008, IEEE, 978-1-4244-2917-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
43 | Rafael P. Laufer, Pedro B. Velloso, Daniel de Oliveira Cunha, Igor M. Moraes, Marco D. D. Bicudo, Marcelo Duffles Donato Moreira, Otto Carlos Muniz Bandeira Duarte |
Towards Stateless Single-Packet IP Traceback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: 32nd Annual IEEE Conference on Local Computer Networks (LCN 2007), 15-18 October 2007, Clontarf Castle, Dublin, Ireland, Proceedings, pp. 548-555, 2007, IEEE Computer Society, 0-7695-3000-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
43 | Yi Shi, Xinyu Yang, Ning Li, Yong Qi |
Deterministic Packet Marking with Link Signatures for IP Traceback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings, pp. 144-152, 2006, Springer, 3-540-49608-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
43 | Byungryong Kim |
Efficient Technique for Fast IP Traceback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CDVE ![In: Cooperative Design, Visualization, and Engineering, Third International Conference, CDVE 2006, Mallorca, Spain, September 17-20, 2006, Proceedings, pp. 211-218, 2006, Springer, 3-540-44494-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
43 | Gwanghoon Kim, Soyeon Hwang, Deokgyu Lee |
Tracking Illegal System Access in a Ubiquitous Environment - Proposal for ATS, a Traceback System Using STOP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (4) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part IV, pp. 344-351, 2006, Springer, 3-540-34077-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
43 | Hyung-Woo Lee |
SVM Based Packet Marking Technique for Traceback on Malicious DDoS Traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICOIN ![In: Information Networking, Advances in Data Communications and Wireless Networks, International Conference, ICOIN 2006, Sendai, Japan, January 16-19, 2006, Revised Selected Papers, pp. 754-763, 2006, Springer, 3-540-48563-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
43 | Yinan Jing, Jingtao Li, Xueping Wang, Xiaochun Xiao, Gendu Zhang |
A Distributed-Log-based IP Traceback Scheme to Defeat DDoS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (2) ![In: 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 18-20 April 2006, Vienna, Austria, pp. 25-32, 2006, IEEE Computer Society, 0-7695-2466-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
43 | Yongjin Kim, Ahmed Helmy |
SWAT: Small World-based Attacker Traceback in Ad-hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiQuitous ![In: 2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), 17-21 July 2005, San Diego, CA, USA, pp. 85-96, 2005, IEEE Computer Society, 0-7695-2375-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
43 | Miao Ma |
Tabu Marking Scheme for IP Traceback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), CD-ROM / Abstracts Proceedings, 4-8 April 2005, Denver, CO, USA, 2005, IEEE Computer Society, 0-7695-2312-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
43 | Masahito Yamana, Katsuhiro Hirata, Hiroshi Shimizu, Hiroshige Nakatani, Toshifumi Kai, Katsuji Tsukamoto |
Simulation of IP Traceback for the Denial of Service Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT Workshops ![In: 2005 IEEE/IPSJ International Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops), 31 January - 4 February 2005, Trento, Italy, pp. 110-113, 2005, IEEE Computer Society, 0-7695-2263-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
43 | Fang-Yie Leu, Wei-Jie Yang, Wen-Kui Chang |
IFTS: Intrusion Forecast and Traceback based on Union Defense Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPADS (1) ![In: 11th International Conference on Parallel and Distributed Systems, ICPADS 2005, Fuduoka, Japan, July 20-22, 2005, pp. 716-722, 2005, IEEE Computer Society, 0-7695-2281-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
43 | Hyung-Woo Lee, Sung-Hyun Yun |
Authenticated IPv6 Packet Traceback Against Reflector Based Packet Flooding Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (1) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part I, pp. 1118-1124, 2005, Springer, 3-540-28894-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
43 | Basheer Al-Duwairi, Anirban Chakrabarti, Govindarasu Manimaran |
An Efficient Probabilistic Packet Marking Scheme for IP Traceback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NETWORKING ![In: NETWORKING 2004, Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication, Third International IFIP-TC6 Networking Conference, Athens, Greece, May 9-14, 2004, Proceedings, pp. 1263-1269, 2004, Springer, 3-540-21959-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
43 | Basheer Al-Duwairi, G. Manimaran |
A Novel Packet Marking Scheme for IP Traceback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPADS ![In: 10th International Conference on Parallel and Distributed Systems, ICPADS 2004, Newport Beach, CA, USA, July 7-9, 2004, pp. 195-, 2004, IEEE Computer Society, 0-7695-2152-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
43 | Hyung-Woo Lee, Sung-Hyun Yun, Taekyoung Kwon 0002, Jae-Sung Kim, Hee-Un Park, Nam-Ho Oh |
Reflector Attack Traceback System with Pushback Based iTrace Mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004, Proceedings, pp. 236-248, 2004, Springer, 3-540-23563-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Reflector Attack, iTrace, Authenticated Packet Marking |
43 | W. Timothy Strayer, Christine E. Jones, Fabrice Tchakountio, Alex C. Snoeren, Beverly Schwartz, Robert C. Clements, Matthew Condell, Craig Partridge |
Traceback of Single IP Packets Using SPIE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DISCEX (2) ![In: 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 22-24 April 2003, Washington, DC, USA, pp. 266-270, 2003, IEEE Computer Society, 0-7695-1897-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
43 | Ki-Chang Kim, Jin Soo Hwang, Byung Yong Kim, Soo Duk Kim |
Tagged Fragment Marking Scheme with Distance-Weighted Sampling for a Fast IP Traceback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APWeb ![In: Web Technologies and Applications, 5th Asian-Pacific Web Conference, APWeb 2003, Xian, China, April 23-25, 2002, Proceedings, pp. 442-452, 2003, Springer, 3-540-02354-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
43 | Minho Sung, Jun (Jim) Xu |
IP Traceback-Based Intelligent Packet Filtering: A Novel Technique for Defending against Internet DDoS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNP ![In: 10th IEEE International Conference on Network Protocols (ICNP 2002), 12-15 November 2002, Paris, France, Proceedings, pp. 302-311, 2002, IEEE Computer Society, 0-7695-1856-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
43 | Vadim Kuznetsov, Helena Sandström, Andrei Simkin |
An Evaluation of Different IP Traceback Approaches. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings, pp. 37-48, 2002, Springer, 3-540-00164-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
43 | Stefan Savage, David Wetherall, Anna R. Karlin, Thomas E. Anderson |
Network support for IP traceback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE/ACM Trans. Netw. ![In: IEEE/ACM Trans. Netw. 9(3), pp. 226-237, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
wide-area networks, stochastic approximation, computer network management, network servers, computer network security |
43 | Francis K. H. Quek, Cemil Kirbas |
Simulated Wave Propagation and Traceback in Vascular Extraction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MIAR ![In: Medical Imaging and Augmented Reality: First International Workshop, MIAR 2001, Hong Kong, China, June 10-12, 2001. Proceedings, pp. 229-234, 2001, IEEE Computer Society, 0-7695-1113-9. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
43 | Stefan Savage, David Wetherall, Anna R. Karlin, Thomas E. Anderson |
Practical network support for IP traceback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 2000 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 28 - September 1, 2000, Stockholm, Sweden, pp. 295-306, 2000, ACM, 1-58113-223-9. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
TCP/IP |
38 | Soon Hin Khor, Akihiro Nakao |
Overfort: Combating DDoS with peer-to-peer DDoS puzzle. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 22nd IEEE International Symposium on Parallel and Distributed Processing, IPDPS 2008, Miami, Florida USA, April 14-18, 2008, pp. 1-8, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
38 | Ming-Hour Yang, Chien-Si Chiu, Shiuhpyng Shieh |
Tracing Mobile Attackers in Wireless Ad-Hoc Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIW ![In: Third International Conference on Internet and Web Applications and Services, ICIW 2008, 8-13 June 2008, Athens, Greece, pp. 7-12, 2008, IEEE Computer Society, 978-0-7695-3163-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Shui Yu 0001, Wanlei Zhou 0001, Robin Doss, Weijia Jia 0001 |
Traceback of DDoS Attacks Using Entropy Variations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 22(3), pp. 412-425, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
entropy variation, DDoS, flow, IP traceback |
36 | Turker Akyuz, Ibrahim Sogukpinar |
Packet Marking with Distance Based Probabilities for IP Traceback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NetCoM ![In: First International Conference on Networks and Communications, NetCoM 2009, Chennai, India, December 27-29, 2009, pp. 433-438, 2009, IEEE Computer Society, 978-0-7695-3924-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
network security, DDoS attacks, IP Traceback, Probabilistic Packet Marking |
36 | Jongho Ryu, Jungchan Na |
Security Requirement for Cyber Attack Traceback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NCM (2) ![In: NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008 - Volume 2, pp. 653-658, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Requirement, Traceback |
36 | Zhaoyang Qu, Chunfeng Huang |
A Fractional-Step DDoS Attack Source Traceback Algorithm Based on Autonomous System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), Harbin, China, 15-17 August 2008, Proceedings, pp. 1383-1387, 2008, IEEE Computer Society, 978-0-7695-3278-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
DDoS Attack, IP Traceback, Packet Marking, AS |
35 | Subramaniam Malliga, C. S. Kanimozhiselvi, Shanmuga Vadivel Kogilavani |
Low Storage and Traceback Overhead IP Traceback System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Sci. Eng. ![In: J. Inf. Sci. Eng. 32(1), pp. 27-45, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
31 | Bo-Chao Cheng, Huan Chen 0002, Guo-Tan Liao |
A Novel Marking Probability Distribution Using Probability Propagation in Hierarchical WSN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers, pp. 265-274, 2008, Springer, 978-3-642-01439-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
DoS/DDoS, WSN, Traceback, PPM, Convergence time |