|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1352 occurrences of 577 keywords
|
|
|
Results
Found 2449 publication records. Showing 2449 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
95 | Virgil D. Gligor, Matt Blaze, John Ioannidis |
Denial of Service - Panel Discussion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers, pp. 194-203, 2000, Springer, 3-540-42566-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
89 | Douglas Stebila, Berkant Ustaoglu |
Towards Denial-of-Service-Resilient Key Agreement Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 14th Australasian Conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009, Proceedings, pp. 389-406, 2009, Springer, 978-3-642-02619-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
80 | Philip L. Campbell |
The Denial-of-Service Dance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 3(6), pp. 34-40, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
network denial of service, Trinoo, TFN, Smurf, UDP flood, Land, Targa, denial of service, worms, distributed denial of service, SYN flood, spoofing |
80 | Marcus Tylutki, Karl N. Levitt |
Mitigating Distributed Denial of Service Attacks Using a Proportional-Integral-Derivative Controller. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 6th International Symposium, RAID 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings, pp. 1-16, 2003, Springer, 3-540-40878-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
PID control law, Automated Response, Denial of Service, DoS, Distributed Denial of Service, DDoS, Control Theory, Distributed Attacks |
80 | D. W. Gresty, Qi Shi 0001, Madjid Merabti |
Requirements for a General Framework for Response to Distributed Denial-of-Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 17th Annual Computer Security Applications Conference (ACSAC 2001), 11-14 December 2001, New Orleans, Louisiana, USA, pp. 422-429, 2001, IEEE Computer Society, 0-7695-1405-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
71 | Jelena Mirkovic, Peter L. Reiher, Sonia Fahmy, Roshan K. Thomas, Alefiya Hussain, Stephen Schwab, Calvin Ko |
Measuring denial Of service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QoP ![In: Proceedings of the 2nd ACM Workshop on Quality of Protection, QoP 2006, Alexandria, VA, USA, October 30, 2006, pp. 53-58, 2006, ACM, 1-59593-553-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
metrics, denial of service |
62 | David Moore 0001, Colleen Shannon, Douglas J. Brown, Geoffrey M. Voelker, Stefan Savage |
Inferring Internet denial-of-service activity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Comput. Syst. ![In: ACM Trans. Comput. Syst. 24(2), pp. 115-139, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Backscatter, network security, denial-of-service, network measurement |
62 | Wenyuan Xu 0001, Timothy Wood 0001, Wade Trappe, Yanyong Zhang |
Channel surfing and spatial retreats: defenses against wireless denial of service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Workshop on Wireless Security ![In: Proceedings of the 2004 ACM Workshop on Wireless Security, Philadelphia, PA, USA, October 1, 2004, pp. 80-89, 2004, ACM, 1-58113-925-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
denial of service, Jamming, CSMA |
57 | Jelena Mirkovic, Alefiya Hussain, Sonia Fahmy, Peter L. Reiher, Roshan K. Thomas |
Accurately Measuring Denial of Service in Simulation and Testbed Experiments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 6(2), pp. 81-95, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
56 | Nikita Borisov, George Danezis, Prateek Mittal, Parisa Tabriz |
Denial of service or denial of security? ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007, pp. 92-102, 2007, ACM, 978-1-59593-703-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
reliability, anonymity, denial of service, attacks |
54 | Che-Fn Yu, Virgil D. Gligor |
A Specification and Verification Method for Preventing Denial of Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 16(6), pp. 581-592, 1990. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
failure absence, integrity violations, user agreements, simultaneity conditions, denial-of-service prevention, formal specification, concurrent programs, security of data, specification method, verification method |
53 | Yalin Evren Sagduyu, Anthony Ephremides |
A game-theoretic analysis of denial of service attacks in wireless random access. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Networks ![In: Wirel. Networks 15(5), pp. 651-666, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Malicious operation, Adaptive update algorithms, Wireless networks, Game theory, Cooperation, Medium access control, Pricing, Competition, Distributed control, Random access, Denial of service attacks |
53 | Timothy X. Brown, Amita Sethi |
Potential Cognitive Radio Denial-of-Service Vulnerabilities and Protection Countermeasures: a Multi-dimensional Analysis and Assessment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mob. Networks Appl. ![In: Mob. Networks Appl. 13(5), pp. 516-532, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
denial of service, cognitive radio, vulnerability, countermeasure |
53 | George S. Oreku, Jianzhong Li 0001, Tamara Pazynyuk |
An application-driven perspective on wireless devises security: the case of distributed denial-of-service (ddos). ![Search on Bibsonomy](Pics/bibsonomy.png) |
PM2HW2N ![In: Proceedings of the 2nd ACM Workshop on Performance Monitoring and Measurement of Heterogeneous Wireless and Wired Networks, PM2HW2N 2007, Chania, Crete Island, Greece, October 22, 2007, pp. 81-83, 2007, ACM, 978-1-59593-805-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
handheld devices, distributed denial of service attacks (DDoS), wireless sensor nodes |
53 | Aleksandar Kuzmanovic, Edward W. Knightly |
Low-rate TCP-targeted denial of service attacks and counter strategies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE/ACM Trans. Netw. ![In: IEEE/ACM Trans. Netw. 14(4), pp. 683-696, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
TCP, TCP/IP, denial of service, retransmission timeout |
53 | Amit B. Kulkarni, Stephen F. Bush |
Detecting Distributed Denial-of-Service Attacks Using Kolmogorov Complexity Metrics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Netw. Syst. Manag. ![In: J. Netw. Syst. Manag. 14(1), pp. 69-80, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
complexity probes, entropy, active network, Kolmogorov Complexity, denial-of-service attack |
53 | Valer Bocan, Vladimir Cretu |
Mitigating Denial of Service Threats in GSM Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The First International Conference on Availability, Reliability and Security, ARES 2006, The International Dependability Conference - Bridging Theory and Practice, April 20-22 2006, Vienna University of Technology, Austria, pp. 523-528, 2006, IEEE Computer Society, 0-7695-2567-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
2G, security, wireless networks, denial of service, attack, GSM, GPRS |
53 | Jason Smith 0001, Juan Manuel González Nieto, Colin Boyd |
Modelling denial of service attacks on JFK with Meadows's cost-based framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSW ![In: The proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), Hobart, Tasmania, Australia, January 2006, pp. 125-134, 2006, Australian Computer Society, 1-920-68236-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
security analysis methodologies, cryptographic protocols, denial of service |
53 | Ashraf Matrawy, Paul C. van Oorschot, Anil Somayaji |
Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings, pp. 104-121, 2005, 3-540-26223-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
network denial of service, flash worms, network security, diversity, traffic shaping |
53 | Sanjeev Kumar |
Impact of Distributed Denial of Service (DDoS) Attack Due to ARP Storm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICN (2) ![In: Networking - ICN 2005, 4th International Conference on Networking, ReunionIsland, France, April 17-21, 2005, Proceedings, Part II, pp. 997-1002, 2005, Springer, 3-540-25338-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
ARP attack, Distributed Denial of Service Attacks, Computer Network Security |
53 | Dimitris Gavrilis, Ioannis G. Tsoulos, Evangelos Dermatas |
Feature Selection for Robust Detection of Distributed Denial-of-Service Attacks Using Genetic Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SETN ![In: Methods and Applications of Artificial Intelligence, Third Helenic Conference on AI, SETN 2004, Samos, Greece, May 5-8, 2004, Proceedings, pp. 276-281, 2004, Springer, 3-540-21937-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Genetic Algorithms, Neural Networks, Denial of Service |
53 | Aleksandar Kuzmanovic, Edward W. Knightly |
Low-rate TCP-targeted denial of service attacks: the shrew vs. the mice and elephants. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 25-29, 2003, Karlsruhe, Germany, pp. 75-86, 2003, ACM, 1-58113-735-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
TCP, denial of service, retransmission timeout |
53 | Shouhuai Xu, Ravi S. Sandhu |
Authenticated multicast immune to denial-of-service attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2002 ACM Symposium on Applied Computing (SAC), March 10-14, 2002, Madrid, Spain, pp. 196-200, 2002, ACM, 1-58113-445-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
multicast authentication, denial-of-service |
53 | Srinivas Mukkamala, Andrew H. Sung |
Computational Intelligent Techniques for Detecting Denial of Service Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEA/AIE ![In: Innovations in Applied Artificial Intelligence, 17th International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems, IEA/AIE 2004, Ottawa, Canada, May 17-20, 2004. Proceedings, pp. 616-624, 2004, Springer, 3-540-22007-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
51 | Guoxing Zhang, Shengming Jiang, Gang Wei, Quansheng Guan |
A prediction-based detection algorithm against distributed denial-of-service attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, IWCMC 2009, Leipzig, Germany, June 21-24, 2009, pp. 106-110, 2009, ACM, 978-1-60558-569-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
available service rate, prediction-based detection of DDoS and low-rate TCP attacks, distributed DoS (DDoS), denial-of-service attacks (DoS) |
50 | Jelena Mirkovic, Alefiya Hussain, Brett Wilson, Sonia Fahmy, Peter L. Reiher, Roshan K. Thomas, Wei-Min Yao, Stephen Schwab |
Towards user-centric metrics for denial-of-service measurement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Experimental Computer Science ![In: Proceedings of the Workshop on Experimental Computer Science, Part of ACM FCRC, San Diego, CA, USA, 13-14 June 2007, pp. 8, 2007, ACM, 978-1-59593-751-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
metrics, denial of service |
50 | José Carlos Brustoloni |
Protecting electronic commerce from distributed denial-of-service attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the Eleventh International World Wide Web Conference, WWW 2002, May 7-11, 2002, Honolulu, Hawaii, USA, pp. 553-561, 2002, ACM, 1-58113-449-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
quality of service, electronic commerce, denial of service |
49 | Marek Hejmo, Brian L. Mark, Charikleia Zouridaki, Roshan K. Thomas |
Denial-of-service resistant quality-of-service signaling for mobile ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SASN ![In: Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2004, Washington, DC, USA, October 25, 2004, pp. 23-28, 2004, ACM, 1-58113-972-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
qos signaling, security, quality of service, ad hoc networks, denial of service, attacks |
46 | Sazia Parvin, Shohrab Ali, Song Han 0004, Tharam S. Dillon |
Security against DOS attack in mobile IP communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 152-157, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
care-of-address (coa), correspondent node (cn), denial-of-service (dos), distributed denial-of-service (ddos), foreign agent (fa), home agent (ha), mobile host (mh), mobile node (mn) |
45 | Chu-Hsing Lin, Jung-Chun Liu, Hsun-Chi Huang, Tsung-Che Yang |
Using Adaptive Bandwidth Allocation Approach to Defend DDoS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MUE ![In: 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 24-26 April 2008, Busan, Korea, pp. 176-181, 2008, IEEE Computer Society, 978-0-7695-3134-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
bandwidth, network simulator, priority queue, DDoS attack, IP spoofing, DoS attack |
45 | Tuomas Aura |
DOS-Resistant Authentication with Client Puzzles (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers, pp. 178-181, 2000, Springer, 3-540-42566-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
45 | Jun (Jim) Xu, Wooyong Lee |
Sustaining Availability of Web Services under Distributed Denial of Service Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 52(2), pp. 195-208, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
World-Wide Web, game theory, Availability, survivability, Distributed Denial of Service (DDoS) |
44 | Gaeil An, Joon S. Park |
Packet Marking Based Cooperative Attack Response Service for Effectively Handling Suspicious Traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings, pp. 182-195, 2006, Springer, 3-540-49608-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Attack Response, Quality of Service, Network Security, Packet Marking, Denial of Service Attack |
44 | Xin Liu 0059, Xiaowei Yang 0001, Yong Xia 0008 |
NetFence: preventing internet denial of service from inside out. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 2010 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, New Delhi, India, August 30 -September 3, 2010, pp. 255-266, 2010, ACM, 978-1-4503-0201-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
congestion policing, internet, denial-of-service, capability |
44 | Jiangtao Li 0001, Ninghui Li, XiaoFeng Wang 0001, Ting Yu 0001 |
Denial of service attacks and defenses in decentralized trust management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 8(2), pp. 89-101, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Access control, Game theory, Denial of service, Trust management, Trust negotiation |
44 | Norman Danner, Danny Krizanc, Marc Liberatore |
Detecting Denial of Service Attacks in Tor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers, pp. 273-284, 2009, Springer. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
reliability, Anonymity, denial of service, detection, attack |
44 | Jayashree Padmanabhan, K. S. Easwarakumar, Gokul B., Harishankar S. |
Trust based traffic monitoring approach for preventing denial of service attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 200-206, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
clustering, networks, trust, denial of service, centroid, dos |
44 | José M. Garrido |
Understanding distributed denial of service with object oriented simulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference ![In: Proceedings of the 47th Annual Southeast Regional Conference, 2009, Clemson, South Carolina, USA, March 19-21, 2009, 2009, ACM, 978-1-60558-421-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
network security, discrete event simulation, denial of service, protection |
44 | Martin Eian |
Fragility of the Robust Security Network: 802.11 Denial of Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings, pp. 400-416, 2009, 978-3-642-01956-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
802.11w, Security, Wireless, Denial of Service, 802.11, 802.11i |
44 | XiaoFeng Wang 0001, Michael K. Reiter |
A multi-layer framework for puzzle-based denial-of-service defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 7(4), pp. 243-263, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Denial of service, Network protocols, Client puzzles |
44 | David R. Raymond, Scott F. Midkiff |
Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Pervasive Comput. ![In: IEEE Pervasive Comput. 7(1), pp. 74-81, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
denial-of-sleep attacks, security, wireless sensor networks, Denial-of-service attacks |
44 | Roman Chertov, Sonia Fahmy, Ness B. Shroff |
Fidelity of network simulation and emulation: A case study of TCP-targeted denial of service attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Model. Comput. Simul. ![In: ACM Trans. Model. Comput. Simul. 19(1), pp. 4:1-4:29, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
low-rate TCP-targeted attacks, Simulation, congestion control, TCP, emulation, testbeds, denial of service attacks |
44 | Rajani Muraleedharan, Lisa Ann Osadciw |
Secure Health Monitoring Network against Denial-Of-Service Attacks Using Cognitive Intelligence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CNSR ![In: Sixth Annual Conference on Communication Networks and Services Research (CNSR 2008), 5-8 May 2008, Halifax, Nova Scotia, Canada, pp. 165-170, 2008, IEEE Computer Society, 978-0-7695-3135-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Cognitive Intelligence, Sensor Network, Ant Colony Optimization, Denial-of-Service |
44 | Gal Badishi, Idit Keidar |
Improving denial of service resistance using dynamic local adaptations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), Fortaleza, Ceara, Brazil, March 16-20, 2008, pp. 2212-2218, 2008, ACM, 978-1-59593-753-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
adaptive denial-of-service resistance, adaptive gossip-based protocols, application-level multicast |
44 | Siddharth Maru, Timothy X. Brown |
Denial of service vulnerabilities in the 802.16 protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WICON ![In: Proceedings of the 4th Annual International Conference on Wireless Internet, WICON 2008, Maui, Hawaii, USA, November 17-19, 2008, pp. 37, 2008, ICST, 978-963-9799-36-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
encryption, denial of service, traffic analysis, IEEE 802.16, sensing, jamming, broadband wireless access |
44 | Marek Ostaszewski, Pascal Bouvry, Franciszek Seredynski |
Denial of service detection and analysis using idiotypic networks paradigm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO ![In: Genetic and Evolutionary Computation Conference, GECCO 2008, Proceedings, Atlanta, GA, USA, July 12-16, 2008, pp. 79-86, 2008, ACM, 978-1-60558-130-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
idiotypic networks, denial of service |
44 | Ronghua Wang, Wenliang Du, Peng Ning |
Containing denial-of-service attacks in broadcast authentication in sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiHoc ![In: Proceedings of the 8th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2007, Montreal, Quebec, Canada, September 9-14, 2007, pp. 71-79, 2007, ACM, 978-1-59593-684-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
broadcast delay, security, wireless sensor networks, energy saving, denial of service attack |
44 | Alex Wun, Alex King Yeung Cheung, Hans-Arno Jacobsen |
A taxonomy for denial of service attacks in content-based publish/subscribe systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEBS ![In: Proceedings of the 2007 Inaugural International Conference on Distributed Event-Based Systems, DEBS 2007, Toronto, Ontario, Canada, June 20-22, 2007, pp. 116-127, 2007, ACM, 978-1-59593-665-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
security, denial of service, publish/subscribe |
44 | Baruch Awerbuch, Christian Scheideler |
A denial-of-service resistant DHT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODC ![In: Proceedings of the Twenty-Sixth Annual ACM Symposium on Principles of Distributed Computing, PODC 2007, Portland, Oregon, USA, August 12-15, 2007, pp. 370-371, 2007, ACM, 978-1-59593-616-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
distributed information systems, denial-of-service attacks |
44 | Joseph Chee Ming Teo, Chik How Tan |
Denial-of-service resilience password-based group key agreement for wireless networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Q2SWinet ![In: Q2SWinet'07 - Proceedings of the Third ACM Workshop on Q2S and Security for Wireless and Mobile Networks, Chania, Crete Island, Greece, October 22, 2007, pp. 136-143, 2007, ACM, 978-1-59593-806-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
denial-of-service, group key agreement, secure group communication, password-based authentication |
44 | Glenn Carl, George Kesidis, Richard R. Brooks, Suresh Rai |
Denial-of-Service Attack-Detection Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Comput. ![In: IEEE Internet Comput. 10(1), pp. 82-89, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
denial-of-service, DoS, flooding attacks |
44 | Steven Cheung |
Denial of Service against the Domain Name System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 4(1), pp. 40-45, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
denial of service, countermeasures, domain name system, threat analysis, network infrastructure |
44 | Mudhakar Srivatsa, Arun Iyengar, Jian Yin 0002, Ling Liu 0001 |
A Client-Transparent Approach to Defend Against Denial of Service Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SRDS ![In: 25th IEEE Symposium on Reliable Distributed Systems (SRDS 2006),2-4 October 2006, Leeds, UK, pp. 61-70, 2006, IEEE Computer Society, 0-7695-2677-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Client Transparency, Denial of Service (DoS) attacks, Authentication, Availability, Web Servers |
44 | Ying Xu, Roch Guérin |
On the robustness of router-based denial-of-service (DoS) defense systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Commun. Rev. ![In: Comput. Commun. Rev. 35(3), pp. 47-60, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
router-based defense, denial-of-service |
44 | David K. Y. Yau, John C. S. Lui, Feng Liang, Yeung Yam |
Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE/ACM Trans. Netw. ![In: IEEE/ACM Trans. Netw. 13(1), pp. 29-42, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
router throttling, network security, congestion control, distributed denial of service |
44 | Dan Dumitriu, Edward W. Knightly, Aleksandar Kuzmanovic, Ion Stoica, Willy Zwaenepoel |
Denial-of-service resilience in peer-to-peer file sharing systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMETRICS ![In: Proceedings of the International Conference on Measurements and Modeling of Computer Systems, SIGMETRICS 2005, June 6-10, 2005, Banff, Alberta, Canada, pp. 38-49, 2005, ACM, 1-59593-022-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
file pollution, network-targeted attacks, peer-to-peer, denial of service |
44 | Alefiya Hussain, John S. Heidemann, Christos Papadopoulos |
A framework for classifying denial of service attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 25-29, 2003, Karlsruhe, Germany, pp. 99-110, 2003, ACM, 1-58113-735-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
security, measurement, time series analysis, denial of service attacks |
44 | P. Sharma, P. Shah, S. Bhattacharya |
Mirror Hopping Approach for Selective Denial of Service Prevention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WORDS ![In: 8th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS 2003), 15-17 January 2003, Guadalajara, Mexico, pp. 200-, 2003, IEEE Computer Society, 0-7695-1929-6. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Mirror sites, E-Commerce, Information Security, Denial of Service, HTTP |
44 | Jaeyeon Jung, Balachander Krishnamurthy, Michael Rabinovich |
Flash crowds and denial of service attacks: characterization and implications for CDNs and web sites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the Eleventh International World Wide Web Conference, WWW 2002, May 7-11, 2002, Honolulu, Hawaii, USA, pp. 293-304, 2002, ACM, 1-58113-449-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
content distribution network performance, web workload characterization, World Wide Web (WWW), flash crowd, denial of service attack |
44 | Nathalie Weiler |
Honeypots for Distributed Denial of Service Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2002), 10-12 June 2002, Pittsburgh, PA, USA, pp. 109-114, 2002, IEEE Computer Society, 0-7695-1748-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Security Practices, Honeypot, Distributed Denial of Service Attacks |
44 | Stamatis Karnouskos |
Dealing with Denial-of-Service Attacks in Agent-enabled Active and Programmable Infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: 25th International Computer Software and Applications Conference (COMPSAC 2001), Invigorating Software Development, 8-12 October 2001, Chicago, IL, USA, pp. 445-450, 2001, IEEE Computer Society, 0-7695-1372-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Intrusion Detection Systems, Active Networks, Agent Technology, Distributed Denial of Service Attacks |
44 | E. Strother |
Denial of Service Protection - The Nozzle. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 32-41, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
denial of service protection, nozzle, domain name server, network pumps, untrusted user, trusted traffic, packet placement, protocols, protocol, intrusion detection, computer networks, Web server, firewalls, cost, authorisation, telecommunication security, network resource |
44 | H. R. Nagesh, K. Chandra Sekaran, Adarsh Rao Kordcal |
Proactive model for Mitigating Internet Denial-of-Service Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2-4 April 2007, Las Vegas, Nevada, USA, pp. 96-101, 2007, IEEE Computer Society, 978-0-7695-2776-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Tao Peng 0002, Christopher Leckie, Kotagiri Ramamohanarao |
Proactively Detecting Distributed Denial of Service Attacks Using Source IP Address Monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NETWORKING ![In: NETWORKING 2004, Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication, Third International IFIP-TC6 Networking Conference, Athens, Greece, May 9-14, 2004, Proceedings, pp. 771-782, 2004, Springer, 3-540-21959-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
42 | Seonho Choi |
Denial-of-Service Resistant Multicast Authentication Protocol with Prediction Hashing and One-way Key Chain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISM ![In: Seventh IEEE International Symposium on Multimedia (ISM 2005), 12-14 December 2005, Irvine, CA, USA, pp. 701-706, 2005, IEEE Computer Society, 0-7695-2489-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
41 | Srinivas Padmanabhuni, Vineet Singh, K. M. Senthil Kumar, Abhishek Chatterjee |
Preventing Service Oriented Denial of Service (PreSODoS): A Proposed Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWS ![In: 2006 IEEE International Conference on Web Services (ICWS 2006), 18-22 September 2006, Chicago, Illinois, USA, pp. 577-584, 2006, IEEE Computer Society, 0-7695-2669-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
37 | Chang-Lung Tsai, Allen Y. Chang, Ming-Szu Huang |
Early Warning System for DDoS Attacking Based on Multilayer Deployment of Time Delay Neural Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), Darmstadt, Germany, 15-17 October, 2010, Proceedings, pp. 704-707, 2010, IEEE Computer Society, 978-1-4244-8378-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Internet hacking, Information security, Denial of service, Distributed denial of service, Time-delay neural network |
36 | Haining Wang, Kang G. Shin |
Transport-Aware IP Routers: A Built-In Protection Mechanism to Counter DDoS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 14(9), pp. 873-884, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Distributed Denial of Service (DDoS) attacks, layer-4 differentiation, resource isolation, packet classification |
36 | Zhang Fu, Marina Papatriantafilou, Philippas Tsigas, Wei Wei 0013 |
Mitigating denial of capability attacks using sink tree based quota allocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), Sierre, Switzerland, March 22-26, 2010, pp. 713-718, 2010, ACM, 978-1-60558-639-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
denial-of-capability, sink tree, denial-of-service |
36 | Iftikhar Ahmad 0002, Azween B. Abdullah, Abdullah Sharaf Alghamdi |
Application of artificial neural network in detection of DOS attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 229-234, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
internet control message protocol, multiple layered perceptron, resilient backpropagation, neural network, artificial neural network, false positive, dataset, false negative, detection rate, denial of service attack |
36 | Steven Cheung, Bruno Dutertre, Ulf Lindqvist |
Detecting Disruptive Routers in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ADHOC-NOW ![In: Ad-Hoc, Mobile, and Wireless Networks, 5th International Conference, ADHOC-NOW 2006, Ottawa, Canada, August 17-19, 2006, Proceedings, pp. 19-31, 2006, Springer, 3-540-37246-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
sensor networks, intrusion detection, Denial of service, routing security |
36 | Eun-Jun Yoon, Kee-Young Yoo |
One-Time Password Authentication Scheme Using Smart Cards Providing User Anonymity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (5) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part V, pp. 303-311, 2006, Springer, 3-540-34079-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Security, Cryptography, Smart card, User authentication, One-time password, Denial-of-Service attacks |
36 | Seonho Choi, Yanggon Kim |
Resource Requirement Analysis for a Predictive-Hashing Based Multicast Authentication Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC Workshops ![In: Emerging Directions in Embedded and Ubiquitous Computing, EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1-4, 2006, Proceedings, pp. 302-311, 2006, Springer, 3-540-36850-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
cryptographic hashing, authentication, protocol, multicast, denial-of-service, resource requirement |
36 | Bernardo Alarcos, María Calderón, Marifeli Sedano, Juan R. Velasco |
DoS Protection for a Pragmatic Multiservice Network Based on Programmable Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Autonomic Networking ![In: Autonomic Networking, First International IFIP TC6 Conference, AN 2006, Paris, France, September 27-29, 2006, Proceedings, pp. 76-85, 2006, Springer, 3-540-45891-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Security, Denial of Service, Active Networks |
36 | Ya-Fen Chang, Chin-Chen Chang 0001 |
A secure and efficient strong-password authentication protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 38(3), pp. 79-90, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
strong password, smart card, password authentication, mutual authentication, denial-of-service attack, stolen-verifier attack |
36 | Mike Just, Evangelos Kranakis, Tao Wan 0004 |
Resisting Malicious Packet Dropping in Wireless Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ADHOC-NOW ![In: Ad-Hoc, Mobile, and Wireless Networks, Second International Conference, ADHOC-NOW 2003 Montreal, Canada, October 8-10, 2003, Proceedings, pp. 151-163, 2003, Springer, 3-540-20260-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Distributed Probing, Security, Wireless Ad Hoc Networks, Denial of Service (DoS), Secure Routing Protocols |
36 | Fan Min 0001, Jun-yan Zhang, Guo-wie Yang |
An IP Traceback Scheme Integrating DPM and PPM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings, pp. 76-85, 2003, Springer, 3-540-20208-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Deterministic Packet Marking, Denial of Service, IP traceback, IP spoofing, Probabilistic Packet Marking |
36 | Christopher D. Gill |
RT-POD: A Framework for Real-Time Systems Participation in Own Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WORDS Fall ![In: 9th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS Fall 2003), 1-3 October 2003, Anacapri (Capri Island), Italy, pp. 270-, 2003, IEEE Computer Society, 0-7695-2054-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
real-time security, temporal signatures, denial of service, middleware frameworks |
36 | Xianglin Deng, Malcolm Shore |
Advanced Flooding Attack on a SIP Server. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Forth International Conference on Availability, Reliability and Security, ARES 2009, March 16-19, 2009, Fukuoka, Japan, pp. 647-651, 2009, IEEE Computer Society, 978-1-4244-3572-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
36 | Tao Peng 0002, Christopher Leckie, Kotagiri Ramamohanarao |
Survey of network-based defense mechanisms countering the DoS and DDoS problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Comput. Surv. ![In: ACM Comput. Surv. 39(1), pp. 3, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
DNS reflector attack, bandwidth attack, resource management, DoS, DDoS, Botnet, Internet security, IP traceback, IRC, IP spoofing, SYN flood, VoIP security |
36 | Yuh-Min Tseng |
Efficient authenticated key agreement protocols resistant to a denial-of-service attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Netw. Manag. ![In: Int. J. Netw. Manag. 15(3), pp. 193-202, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Roger M. Needham |
Denial of Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS '93, Proceedings of the 1st ACM Conference on Computer and Communications Security, Fairfax, Virginia, USA, November 3-5, 1993., pp. 151-153, 1993, ACM, 0-89791-629-8. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
35 | Suriadi Suriadi, Douglas Stebila, Andrew J. Clark, Hua Liu |
Defending Web Services against Denial of Service Attacks Using Client Puzzles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWS ![In: IEEE International Conference on Web Services, ICWS 2011, Washington, DC, USA, July 4-9, 2011, pp. 25-32, 2011, IEEE Computer Society, 978-1-4577-0842-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
web services, client puzzles, denial of service attacks |
35 | Mohammed A. Alhabeeb, Phu Dung Le, Bala Srinivasan 0002 |
Preventing Denial of Service Attacks in Government E-Services Using a New Efficient Packet Filtering Technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPA ![In: IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2011, Busan, Korea, 26-28 May, 2011, pp. 262-269, 2011, IEEE Computer Society, 978-1-4577-0391-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
Token Filtering Technique, Denial of Service, flooding attack |
35 | Mohammed A. Alhabeeb, Phu Dung Le, Bala Srinivasan 0002 |
Evaluating the Functionality of the Token Filtering Technique in Filtering Denial of Service Packets Using a New Formal Evaluation Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPA ![In: IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2011, Busan, Korea, 26-28 May, 2011, pp. 318-323, 2011, IEEE Computer Society, 978-1-4577-0391-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
Token Filtering Technique, Denial of Service, packet filtering, flooding attack |
35 | Raja Sekhar Reddy Gade, Hari Krishna Vellalacheruvu, Sanjeev Kumar |
Performance of Windows XP, Windows Vista and Apple's Leopard Computers under a Denial of Service Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDS ![In: The Fourth International Conference on Digital Society, ICDS 2010, 10.16 February 2010, St. Maarten, Netherlands Antilles, pp. 188-191, 2010, IEEE Computer Society, 978-0-7695-3953-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Denial of Service (DoS) Attack, Internet Control Message Protocol (ICMP), Land Attack, Ping utility |
35 | Richard M. Chang, Guofei Jiang, Franjo Ivancic, Sriram Sankaranarayanan 0001, Vitaly Shmatikov |
Inputs of Coma: Static Detection of Denial-of-Service Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: Proceedings of the 22nd IEEE Computer Security Foundations Symposium, CSF 2009, Port Jefferson, New York, USA, July 8-10, 2009, pp. 186-199, 2009, IEEE Computer Society, 978-0-7695-3712-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
network security, static analysis, Denial-of-service |
35 | R. Gunasekaran, V. Rhymend Uthariaraj |
Prevention of Denial of Service Attacks and Performance Enhancement in Mobile Ad hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Sixth International Conference on Information Technology: New Generations, ITNG 2009, Las Vegas, Nevada, USA, 27-29 April 2009, pp. 640-645, 2009, IEEE Computer Society, 978-0-7695-3596-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
DoSP-MAC, Quick Exchange, MANET, Denial of Service, AODV |
35 | Thomas Dreibholz, Erwin P. Rathgeb, Xing Zhou |
On Robustness and Countermeasures of Reliable Server Pooling Systems Against Denial of Service Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Networking ![In: NETWORKING 2008, Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet , 7th International IFIP-TC6 Networking Conference, Singapore, May 5-9, 2008, Proceedings, pp. 586-598, 2008, Springer, 978-3-540-79548-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Robustness, Denial of Service, Attacks, Countermeasures, Reliable Server Pooling |
35 | Qingtao Wu, Haichao Zhang, Jiexin Pu |
Mitigating distributed denial-of-service attacks using network connection control charts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Infoscale ![In: Proceedings of the 2nf International Conference on Scalable Information Systems, Infoscale 2007, Suzhou, China, June 6-8, 2007, pp. 65, 2007, ACM, 978-1-59593-757-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Shewhart's control charts, automated response model, network security, distributed denial-of-service |
35 | Frank Kargl, Jörn Maier, Michael Weber 0001 |
Protecting web servers from distributed denial of service attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the Tenth International World Wide Web Conference, WWW 10, Hong Kong, China, May 1-5, 2001, pp. 514-524, 2001, ACM, 1-58113-348-0. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
class based routing, web server security, Linux, UNIX, DDoS, distributed denial of service attacks |
35 | Alberto López Toledo, Xiaodong Wang 0001 |
Robust Detection of MAC Layer Denial-of-Service Attacks in CSMA/CA Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 3(3), pp. 347-358, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
35 | William Conner, Klara Nahrstedt |
Protecting SIP Proxy Servers from Ringing-Based Denial-of-Service Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISM ![In: Tenth IEEE International Symposium on Multimedia (ISM2008), December 15-17, 2008, Berkeley, California, USA, pp. 340-347, 2008, IEEE Computer Society, 978-0-7695-3454-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Erol Gelenbe, Michael Gellman, George Loukas |
An Autonomic Approach to Denial of Service Defence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOWMOM ![In: 2005 International Conference on a World of Wireless, Mobile and Multimedia Networks (WOWMOM 2005), 13-16 June 2005, Taormina, Italy, Proceedings, pp. 537-541, 2005, IEEE Computer Society, 0-7695-2342-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Bao-Tung Wang, Henning Schulzrinne |
A denial-of-service-resistant IP traceback approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28 - July 1, 2004, Alexandria, Egypt, pp. 351-356, 2004, IEEE Computer Society, 0-7803-8623-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
35 | Clayton Bolz, Gordon W. Romney, Brandon L. Rogers |
Safely train security engineers regarding the dangers presented by denial of service attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGITE Conference ![In: Proceedings of the 5th Conference on Information Technology Education, SIGITE 2004, 2004, Salt Lake City, UT, USA, October 28-30, 2004, pp. 66-72, 2004, ACM, 1-58113-936-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
DoS lab, isolated lab, network security, information technology, DDoS |
35 | Tao Peng 0002, Christopher Leckie, Kotagiri Ramamohanarao |
Detecting Distributed Denial of Service Attacks by Sharing Distributed Beliefs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings, pp. 214-225, 2003, Springer, 3-540-40515-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
35 | W. J. Blackert, Donna M. Gregg, A. K. Castner, E. M. Kyle, R. L. Hom, R. M. Jokerst |
Analyzing Interaction Between Distributed Denial of Service Attacks And Mitigation Technologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DISCEX (1) ![In: 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 22-24 April 2003, Washington, DC, USA, pp. 26-, 2003, IEEE Computer Society, 0-7695-1897-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
35 | Anthony D. Wood, John A. Stankovic |
Denial of Service in Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 35(10), pp. 54-62, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
35 | Biljana Cubaleska, Markus Schneider 0002 |
A Method for Protecting Mobile Agents against Denial of Service Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIA ![In: Cooperative Information Agents VI, 6th International Workshop, CIA 2002, Madrid, Spain, September 18-20, 2002, Proceedings, pp. 297-311, 2002, Springer, 3-540-44173-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 2449 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|