The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for DDoS with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2000-2002 (26) 2003 (40) 2004 (58) 2005 (94) 2006 (87) 2007 (92) 2008 (96) 2009 (80) 2010 (63) 2011 (56) 2012 (58) 2013 (69) 2014 (85) 2015 (94) 2016 (120) 2017 (165) 2018 (203) 2019 (210) 2020 (226) 2021 (266) 2022 (291) 2023 (318) 2024 (59)
Publication types (Num. hits)
article(1172) data(9) incollection(16) inproceedings(1636) phdthesis(23)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 538 occurrences of 244 keywords

Results
Found 2856 publication records. Showing 2856 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
42Peter Djalaliev, Muhammad Jamshed, Nicholas L. Farnan, José Carlos Brustoloni Sentinel: Hardware-Accelerated Mitigation of Bot-Based DDoS Attacks. Search on Bibsonomy ICCCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
42Xi Chen, Gaogang Xie, Jianhua Yang Mitigate DDoS attack using TTL buckets and host threatening index. Search on Bibsonomy LCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
42Anjali Sardana, Ramesh Chandra Joshi Simulation of Dynamic Honeypot Based Redirection to Counter Service Level DDoS Attacks. Search on Bibsonomy ICISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
42Sumit Ganguly, Minos N. Garofalakis, Rajeev Rastogi, Krishan K. Sabnani Streaming Algorithms for Robust, Real-Time Detection of DDoS Attacks. Search on Bibsonomy ICDCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
42Emmanuel Bresson, Aline Gouget, Hervé Sibert The GAIA sensor: an early DDoS detection tool. Search on Bibsonomy SIGMETRICS Perform. Evaluation Rev. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
42Abraham Yaar, Adrian Perrig, Dawn Song StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
42Yi Yuan, Hoong Kee Ng DATCONS: Protecting Web-Based QoS from DDoS Attacks. Search on Bibsonomy NOMS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
42Yinan Jing, Xueping Wang, Xiaochun Xiao, Gendu Zhang A Novel Rate Limit Algorithm Against Meek DDoS Attacks. Search on Bibsonomy ATC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
42Thomas Dübendorfer, Matthias Bossardt, Bernhard Plattner Adaptive Distributed Traffic Control Service for DDoS Attack Mitigation. Search on Bibsonomy IPDPS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
42Qiming Li, Ee-Chien Chang, Mun Choon Chan On the effectiveness of DDoS attacks on statistical filtering. Search on Bibsonomy INFOCOM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
42Jian Kang 0001, Zhe Zhang, Jiu-bin Ju Protect E-Commerce against DDoS Attacks with Improved D-WARD Detection System. Search on Bibsonomy EEE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
42Jung-Taek Seo, Cheolho Lee, Taeshik Shon, Kyuhyung Cho, Jongsub Moon A New DDoS Detection Model Using Multiple SVMs and TRA. Search on Bibsonomy EUC Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
42Chi Hyung In, Choong Seon Hong, Koji Okamura An Enhanced SOS Architecture for DDoS Attack Defense Using Active Network Technology. Search on Bibsonomy AICT/SAPIR/ELETE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
42Manhee Lee, Eun Jung Kim 0001, Cheol Won Lee A Source Identification Scheme against DDoS Attacks in Cluster Interconnects. Search on Bibsonomy ICPP Workshops The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
42Dong Xuan, Sriram Chellappan, Xun Wang, Shengquan Wang Analyzing the Secure Overlay Services Architecture under Intelligent DDoS Attacks. Search on Bibsonomy ICDCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
42Mihui Kim, Hyunjung Na, Kijoon Chae, Hyochan Bang, Jung-Chan Na A Combined Data Mining Approach for DDoS Attack Detection. Search on Bibsonomy ICOIN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
42Yang Xiang 0001, Wanlei Zhou 0001 Protect Grids from DDoS Attacks. Search on Bibsonomy GCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
42Shigang Chen, Randy Chow A New Perspective in Defending against DDoS. Search on Bibsonomy FTDCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
42Igor V. Kotenko, Alexey Alexeev, Evgeny Man'kov Formal Framework for Modeling and Simulation of DDoS Attacks Based on Teamwork of Hackers-Agents. Search on Bibsonomy IAT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
42Laura Feinstein, Dan Schnackenberg, Ravindra Balupari, Darrell Kindred DDoS Tolerant Networks. Search on Bibsonomy DISCEX (2) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
42Laura Feinstein, Dan Schnackenberg, Ravindra Balupari, Darrell Kindred Statistical Approaches to DDoS Attack Detection and Response. Search on Bibsonomy DISCEX (1) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
42Jelena Mirkovic, Gregory Prier, Peter L. Reiher Attacking DDoS at the Source. Search on Bibsonomy ICNP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
42Eric Y. Chen AEGIS: An Active-Network-Powered Defense Mechanism against DDoS Attacks. Search on Bibsonomy IWAN The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
40José M. Garrido Understanding distributed denial of service with object oriented simulation. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2009 DBLP  DOI  BibTeX  RDF network security, discrete event simulation, denial of service, protection
40Wei Wei, Yabo Dong, Dongming Lu, Guang Jin Combining Cross-Correlation and Fuzzy Classification to Detect Distributed Denial-of-Service Attacks. Search on Bibsonomy International Conference on Computational Science (4) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
40Zili Shao, Qingfeng Zhuge, Chun Xue, Edwin Hsing-Mean Sha Efficient Assignment and Scheduling for Heterogeneous DSP Systems. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Network-level security and protection
40Gaeil Ahn, Kiyoung Kim, Jongsoo Jang MF (Minority First) Scheme for defeating Distributed Denial of Service Attacks. Search on Bibsonomy ISCC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
40W. J. Blackert, Donna M. Gregg, A. K. Castner, E. M. Kyle, R. L. Hom, R. M. Jokerst Analyzing Interaction Between Distributed Denial of Service Attacks And Mitigation Technologies. Search on Bibsonomy DISCEX (1) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
38Anjali Sardana, Ramesh Chandra Joshi Honeypot Based Routing to Mitigate DDoS Attacks on Servers at ISP Level. Search on Bibsonomy ISIP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Routing, DDoS, Honeypot
38Djakhongir Siradjev, Qiao Ke, JeongKi Park, Young-Tak Kim Highspeed and Flexible Source-End DDoS Protection System Using IXP2400 Network Processor. Search on Bibsonomy IPOM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF flow monitoring, classification, network security, network processors, DDoS
38Terence K. T. Law, John C. S. Lui, David K. Y. Yau You Can Run, But You Can't Hide: An Effective Statistical Methodology to Trace Back DDoS Attackers. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF attack traffic filtering, minimum stable time, DDoS attack, traceback
38Yu Chen 0002, Yu-Kwong Kwok, Kai Hwang 0001 MAFIC: Adaptive Packet Dropping for Cutting Malicious Flows to Push Back DDoS Attacks. Search on Bibsonomy ICDCS Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF packet dropping policy, DDoS defense, malicious flows, duplicated ACKs, probing
38Cheng Jin, Haining Wang, Kang G. Shin Hop-count filtering: an effective defense against spoofed DDoS traffic. Search on Bibsonomy CCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF DDoS defense, host-based, security, networking, TTL
36Yi Xie 0002, Shun-Zheng Yu A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF M-algorithm, hidden semi-Markov model, anomaly detection, DDoS, browsing behaviors
36Udaya Kiran Tupakula, Vijay Varadharajan, Srini Rao Pandalaneni DoSTRACK: a system for defending against DoS attacks. Search on Bibsonomy SAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Smurf, TCP SYN flood, DoS, DDoS, reflection attacks
36Yongjin Kim ATTENTION: ATTackEr Traceback Using MAC Layer AbNormality DetecTION. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF DoS, DDoS, Traceback
36Syed Obaid Amin, Muhammad Shoaib Siddiqui, Choong Seon Hong A novel IPv6 traceback architecture using COPS protocol. Search on Bibsonomy Ann. des Télécommunications The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Network security, Network management, IPv6, DDoS, Traceback
36Vasileios Pappas, Daniel Massey, Lixia Zhang 0001 Enhancing DNS Resilience against Denial of Service Attacks. Search on Bibsonomy DSN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF caching, resilience, DDoS, DNS
36Jaydip Sen, Piyali Roy Chowdhury, Indranil Sengupta 0001 A Mechanism for Detection and Prevention of Distributed Denial of Service Attacks. Search on Bibsonomy ICDCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Traffic level measurement, Security, DDoS, Buffer overflow
36Syed Obaid Amin, Choong Seon Hong, Ki Young Kim Tracing the True Source of an IPv6 Datagram Using Policy Based Management System. Search on Bibsonomy APNOMS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Network Security, IPv6, DDoS, Traceback
36Thomas Gamer, Marcus Schöller, Roland Bless An Extensible and Flexible System for Network Anomaly Detection. Search on Bibsonomy Autonomic Networking The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Anomaly Detection, DDoS Attacks, Programmable Networks
36Fang-Yie Leu, Jia-Chun Lin, Ming-Chang Li, Chao-Tung Yang A Performance-Based Grid Intrusion Detection System. Search on Bibsonomy COMPSAC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF PGIDS, Grid, DoS, DDoS, SSA, BPNN, SAA
32Fang-Yie Leu, Chia-Chi Pai Detecting DoS and DDoS Attacks Using Chi-Square. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
32Yang Li 0002, Tianbo Lu, Li Guo 0001, Zhihong Tian, Qin-Wu Nie Towards lightweight and efficient DDOS attacks detection for web server. Search on Bibsonomy WWW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF E-FCM algorithm, TCM-KNN algorithm, web server anomaly detection, instance selection
32Seung Yeob Nam, Taijin Lee Memory-Efficient IP Filtering for Countering DDoS Attacks. Search on Bibsonomy APNOMS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
32Vrizlynn L. L. Thing, Morris Sloman, Naranker Dulay Network domain entrypoint/path determination for DDoS attacks. Search on Bibsonomy NOMS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
32Rui Guo, Guiran Chang, Yuhai Qin, Baojing Sun, Yifu Feng, Dan Peng Research on Active Defense Strategy of Counter DDoS Attacks Based on Differential Games Model. Search on Bibsonomy WKDD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
32Udi Ben-Porat, Anat Bremler-Barr, Hanoch Levy Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks. Search on Bibsonomy INFOCOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
32Muthusrinivasan Muthuprasanna, Govindarasu Manimaran Distributed Divide-and-Conquer Techniques for Effective DDoS Attack Defenses. Search on Bibsonomy ICDCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
32Dan Peng, Guiran Chang, Rui Guo, Yuhai Qin DG-Based DDoS Detection Using Hybrid Strategy. Search on Bibsonomy FSKD (5) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
32Xinfeng Ye Countering DDoS and XDoS Attacks against Web Services. Search on Bibsonomy EUC (1) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
32Radwane Saad, Farid Naït-Abdesselam, Ahmed Serhrouchni A collaborative peer-to-peer architecture to defend against DDoS attacks. Search on Bibsonomy LCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
32Muthusrinivasan Muthuprasanna, G. Manimaran, Zhengdao Wang Unified Defense Against DDoS Attacks. Search on Bibsonomy Networking The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
32Xinfeng Ye, Santokh Singh A SOA Approach to Counter DDoS Attacks. Search on Bibsonomy ICWS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
32Anderson Fernandes P. Santos, Renato Simões Silva Detecting Bandwidth DDoS Attack with Control Charts. Search on Bibsonomy ICON The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
32Tong Liu, Chwan-Hwa John Wu Intrusion-resilient, DDoS-resistant and agent-assisted network security system. Search on Bibsonomy BROADNETS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
32Zubair A. Baig, Mohamed Baqer, Asad I. Khan A Pattern Recognition Scheme for Distributed Denial of Service (DDoS) Attacks in Wireless Sensor Networks. Search on Bibsonomy ICPR (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32Yinan Jing, Zheng Xiao, Xueping Wang, Gendu Zhang O2-DN: An Overlay-based Distributed Rate Limit Framework to Defeat DDoS Attacks. Search on Bibsonomy ICN/ICONS/MCL The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32Hong-bin Yim, Jae-Il Jung IP Traceback Algorithm for DoS/DDoS Attack. Search on Bibsonomy APNOMS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32Roger Karrer EC: an edge-based architecture against DDoS attacks and malware spread. Search on Bibsonomy AINA (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32Jian Kang 0001, Yuan Zhang, Jiu-bin Ju Detecting DDoS Attacks Based on Multi-stream Fused HMM in Source-End Network. Search on Bibsonomy CANS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32Yang Xiang 0001, Wanlei Zhou 0001 A Defense System against DDoS Attacks by Large-Scale IP Traceback. Search on Bibsonomy ICITA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
32Yuji Soejima, Eric Y. Chen, Hitoshi Fuji Detecting DDoS Attacks by Analyzing Client Response Patterns. Search on Bibsonomy SAINT Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
32Sanjeev Kumar Impact of Distributed Denial of Service (DDoS) Attack Due to ARP Storm. Search on Bibsonomy ICN (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF ARP attack, Distributed Denial of Service Attacks, Computer Network Security
32Stephen T. Chou, Angelos Stavrou, John Ioannidis, Angelos D. Keromytis gore: Routing-Assisted Defense Against DDoS Attacks. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
32Yanxiang He, Wei Chen 0006, Wenling Peng, Bin Xiao 0001 An Efficient and Practical Defense Method Against DDoS Attack at the Source-End. Search on Bibsonomy ICPADS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
32Kai Hwang 0001, Yu-Kwong Kwok, Shanshan Song, Min Cai, Yu Chen 0002, Ying Chen, Runfang Zhou, Xiaosong Lou GridSec: Trusted Grid Computing with Security Binding and Self-defense Against Network Worms and DDoS Attacks. Search on Bibsonomy International Conference on Computational Science (3) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
32Sung Ki Kim, Byoung-Joon Min, Jin Chul Jung, Seung Hwan Yoo Cooperative Security Management Enhancing Survivability Against DDoS Attacks. Search on Bibsonomy ICCSA (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
32GangShin Lee, Heeran Lim, Manpyo Hong, Dong Hoon Lee 0001 A Dynamic Path Identification Mechanism to Defend Against DDoS Attacks. Search on Bibsonomy ICOIN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
32Hyung-Woo Lee, Min-goo Kang, Chang-Won Choi PTrace: Pushback/SVM Based ICMP Traceback Mechanism against DDoS Attack. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
32Heeran Lim, Manpyo Hong Effective Packet Marking Approach to Defend against DDoS Attack. Search on Bibsonomy ICCSA (4) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
32Jelena Mirkovic, Gregory Prier, Peter L. Reiher Source-End DDoS Defense. Search on Bibsonomy NCA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
32Kihong Park Scalable DDoS Protection Using Route-Based Filtering. Search on Bibsonomy DISCEX (2) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
30Markus Goldstein, Matthias Reif, Armin Stahl, Thomas M. Breuel Server-Side Prediction of Source IP Addresses Using Density Estimation. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
30Anna T. Lawniczak, Hao Wu 0002, Bruno N. Di Stefano Detection of anomalous packet traffic via entropy. Search on Bibsonomy CCECE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
30Supranamaya Ranjan, Edward W. Knightly High performance distributed Denial-of-Service resilient web cluster architecture. Search on Bibsonomy NOMS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
30Vrizlynn L. L. Thing, Morris Sloman, Naranker Dulay A Survey of Bots Used for Distributed Denial of Service Attacks. Search on Bibsonomy SEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
30Beatrice Cynthia Dhinakaran, Cheol-Joo Chae, Jae-Kwang Lee An Empirical Study of Spam and Spam Vulnerable email Accounts. Search on Bibsonomy FGCN (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
30Jungtaek Seo An Attack Classification Mechanism Based on Multiple Support Vector Machines. Search on Bibsonomy ICCSA (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF attack classification, intrusion detection, Internet security
30Qingtao Wu, Haichao Zhang, Jiexin Pu Mitigating distributed denial-of-service attacks using network connection control charts. Search on Bibsonomy Infoscale The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Shewhart's control charts, automated response model, network security, distributed denial-of-service
30Eric Y. K. Chan, H. W. Chan, K. M. Chan, Vivien P. S. Chan, Samuel T. Chanson, Matthew M. H. Cheung, C. F. Chong, Kam-Pui Chow, Albert K. T. Hui, Lucas Chi Kwong Hui, S. K. Ip, Luke C. K. Lam, W. C. Lau, Kevin K. H. Pun, Anthony Y. F. Tsang, Wai Wan Tsang, Sam C. W. Tso, Dit-Yan Yeung, Siu-Ming Yiu, Kwun Yin Yu, W. Ju Intrusion Detection Routers: Design, Implementation and Evaluation Using an Experimental Testbed. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Amit B. Kulkarni, Stephen F. Bush Detecting Distributed Denial-of-Service Attacks Using Kolmogorov Complexity Metrics. Search on Bibsonomy J. Netw. Syst. Manag. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF complexity probes, entropy, active network, Kolmogorov Complexity, denial-of-service attack
30Alexander A. Moldovyan, Nick A. Moldovyan, Nicolas Sklavos 0001 Controlled elements for designing ciphers suitable to efficient VLSI implementation. Search on Bibsonomy Telecommun. Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Security, Block ciphers, Hardware implementation, Data-dependent operations
30Vicky Laurens, Abdulmotaleb El-Saddik, Pulak Dhar, Vineet Srivastava 0002 Detecting Distributed Denial of Service Attack Traffic at the Agent Machines. Search on Bibsonomy CCECE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Yongjin Kim, Ahmed Helmy SWAT: Small World-based Attacker Traceback in Ad-hoc Networks. Search on Bibsonomy MobiQuitous The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
30Guang Xiang, Xiaomei Dong, Ge Yu 0001 Correlating Alerts with a Data Mining Based Approach. Search on Bibsonomy EEE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
30Mihui Kim, Kijoon Chae A Fast Defense Mechanism Against IP Spoofing Traffic in a NEMO Environment. Search on Bibsonomy ICOIN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
30Yinghong Fan, Hossam S. Hassanein, Patrick Martin 0001 Proactive control of distributed denial of service attacks with source router preferential dropping. Search on Bibsonomy AICCSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
30Soon-Dong Kim, Man-Pyo Hong, Dong-Kyoo Kim A Study on Marking Bit Size for Path Identification Method: Deploying the Pi Filter at the End Host. Search on Bibsonomy ICCSA (4) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
30Hyung-Woo Lee, Sung-Hyun Yun, Taekyoung Kwon 0002, Jae-Sung Kim, Hee-Un Park, Nam-Ho Oh Reflector Attack Traceback System with Pushback Based iTrace Mechanism. Search on Bibsonomy ICICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Reflector Attack, iTrace, Authenticated Packet Marking
30Dimitris Gavrilis, Ioannis G. Tsoulos, Evangelos Dermatas Feature Selection for Robust Detection of Distributed Denial-of-Service Attacks Using Genetic Algorithms. Search on Bibsonomy SETN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Genetic Algorithms, Neural Networks, Denial of Service
30José Carlos Brustoloni Protecting electronic commerce from distributed denial-of-service attacks. Search on Bibsonomy WWW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF quality of service, electronic commerce, denial of service
30Haining Wang, Kang G. Shin Layer-4 Service Differentiation and Resource Isolation. Search on Bibsonomy IEEE Real Time Technology and Applications Symposium The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
27Shui Yu 0001, Wanlei Zhou 0001, Robin Doss, Weijia Jia 0001 Traceback of DDoS Attacks Using Entropy Variations. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF entropy variation, DDoS, flow, IP traceback
27Lei Hou, Hai-Xin Duan, Jianping Wu Distinguishing the Master to Defend DDoS Attack in Peer-to-Peer Networks. Search on Bibsonomy CIT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Select, Update, DDoS, Peer, Credit
27Mohamad Samir A. Eid, Hitoshi Aida Securely Hiding the Real Servers from DDoS Floods. Search on Bibsonomy SAINT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF DDoS protection, privacy, access control, e-commerce, internet security
27Shunsuke Oshima, Takuo Nakashima, Toshinori Sueyoshi Early DoS/DDoS Detection Method using Short-term Statistics. Search on Bibsonomy CISIS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF DoS/DDoS attacks, Short-term entropy, A test of significance, IDS, Statistical Method
27Chung-Hsin Liu, Chun-Lin Lo The Simulation for the SIP DDoS Attack. Search on Bibsonomy NCM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Security, SIP, VoIP, Queue, DDoS, NS2
27Ke Li, Wanlei Zhou 0001, Ping Li 0019, Jing Hai, Jianwen Liu Distinguishing DDoS Attacks from Flash Crowds Using Probability Metrics. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Probability metrics, DDoS, Flash crowd
27Shui Yu 0001, Theerasak Thapngam, Jianwen Liu, Su Wei, Wanlei Zhou 0001 Discriminating DDoS Flows from Flash Crowds Using Information Distance. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Measurement, Distance, DDoS Attack
Displaying result #101 - #200 of 2856 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license