The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for DoS with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1967-1980 (16) 1981-1986 (17) 1987-1988 (23) 1989-1990 (29) 1991-1992 (23) 1993 (20) 1994 (22) 1995 (15) 1996 (25) 1997 (28) 1998 (34) 1999 (32) 2000 (38) 2001 (61) 2002 (87) 2003 (106) 2004 (191) 2005 (208) 2006 (231) 2007 (271) 2008 (316) 2009 (289) 2010 (270) 2011 (319) 2012 (355) 2013 (353) 2014 (425) 2015 (478) 2016 (443) 2017 (544) 2018 (537) 2019 (755) 2020 (815) 2021 (827) 2022 (883) 2023 (888) 2024 (204)
Publication types (Num. hits)
article(3703) book(17) data(8) incollection(38) inproceedings(5996) phdthesis(382) proceedings(34)
Venues (Conferences, Journals, ...)
CoRR(516) GEOINFO(232) IEEE Access(126) Sensors(119) SBSI(111) IHC(91) Remote. Sens.(76) Revista Brasileira de Informá...(73) SIBGRAPI(67) IGARSS(66) WebMedia(64) Expert Syst. Appl.(59) SBQS(57) SAC(53) SVR(51) IJCNN(50) More (+10 of total 2457)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1332 occurrences of 792 keywords

Results
Found 12185 publication records. Showing 10178 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
35Zhang Fu, Marina Papatriantafilou, Philippas Tsigas Mitigating Distributed Denial of Service Attacks in Multiparty Applications in the Presence of Clock Drifts. Search on Bibsonomy SRDS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
35Gal Badishi, Amir Herzberg, Idit Keidar Keeping Denial-of-Service Attackers in the Dark. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Reliability, Protocols, availability and serviceability
35Lari Iso-Anttila, Jorma Ylinen, Pekka Loula A Proposal to Improve IKEv2 negotiation. Search on Bibsonomy SECURWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
35Gülay Öke, George Loukas, Erol Gelenbe Detecting Denial of Service Attacks with Bayesian Classifiers and the Random Neural Network. Search on Bibsonomy FUZZ-IEEE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
35Joseph Chee Ming Teo, Chik How Tan Denial-of-service resilience password-based group key agreement for wireless networks. Search on Bibsonomy Q2SWinet The full citation details ... 2007 DBLP  DOI  BibTeX  RDF denial-of-service, group key agreement, secure group communication, password-based authentication
35Gal Badishi, Idit Keidar, Amir Sasson Exposing and Eliminating Vulnerabilities to Denial of Service Attacks in Secure Gossip-Based Multicast. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF reliability, Distributed applications, distributed programming, availability and serviceability
35Hemant Sengar, Haining Wang, Duminda Wijesekera, Sushil Jajodia Fast Detection of Denial-of-Service Attacks on IP Telephony. Search on Bibsonomy IWQoS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
35Men Long, Chwan-Hwa John Wu, John Y. Hung Denial of service attacks on network-based control systems: impact and mitigation. Search on Bibsonomy IEEE Trans. Ind. Informatics The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
35Xiapu Luo, Rocky K. C. Chang, Edmond W. W. Chan Performance Analysis of TCP/AQM Under Denial-of-Service Attacks. Search on Bibsonomy MASCOTS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
35Suraiya Khan, Issa Traoré A Prevention Model for Algorithmic Complexity Attacks. Search on Bibsonomy DIMVA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
35Aki P. F. Chan, Daniel S. Yeung, Eric C. C. Tsang, Wing W. Y. Ng Empirical Study on Fusion Methods Using Ensemble of RBFNN for Network Intrusion Detection. Search on Bibsonomy ICMLC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
35Gal Badishi, Idit Keidar, Amir Sasson Exposing and Eliminating Vulnerabilities to Denial of Service Attacks in Secure Gossip-Based Multicast. Search on Bibsonomy DSN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
35Alefiya Hussain, John S. Heidemann, Christos Papadopoulos A framework for classifying denial of service attacks. Search on Bibsonomy SIGCOMM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF security, measurement, time series analysis, denial of service attacks
35P. Sharma, P. Shah, S. Bhattacharya Mirror Hopping Approach for Selective Denial of Service Prevention. Search on Bibsonomy WORDS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Mirror sites, E-Commerce, Information Security, Denial of Service, HTTP
35Angelos D. Keromytis, Vishal Misra, Dan Rubenstein SOS: secure overlay services. Search on Bibsonomy SIGCOMM The full citation details ... 2002 DBLP  DOI  BibTeX  RDF network security, overlay networks, denial of service attacks
35Paul Beckman, Åsa Forsman Kevin Bacon, Degrees-of-Separation, and MIS Research Productivity. Search on Bibsonomy HICSS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF research productivity, degrees-of-separation, graph theory
35John Haggerty, Qi Shi 0001, Madjid Merabti Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
35Baoqing Ye Defeating Denial-of-Service Attacks on the Internet. Search on Bibsonomy ICICS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
35Devendra Naniwadekar Implementation of a resource manager for distributed MINIX. Search on Bibsonomy ACM Conference on Computer Science The full citation details ... 1988 DBLP  DOI  BibTeX  RDF MINIX
35Koohong Kang Anomaly Detection of Hostile Traffic Based on Network Traffic Distributions. Search on Bibsonomy ICOIN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Network Traffic Anomaly, Network Traffic Distribution, Entropy, DoS
35Glenn Carl, George Kesidis, Richard R. Brooks, Suresh Rai Denial-of-Service Attack-Detection Techniques. Search on Bibsonomy IEEE Internet Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF denial-of-service, DoS, flooding attacks
35Fang-Yie Leu, Jia-Chun Lin, Ming-Chang Li, Chao-Tung Yang A Performance-Based Grid Intrusion Detection System. Search on Bibsonomy COMPSAC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF PGIDS, Grid, DoS, DDoS, SSA, BPNN, SAA
35Claude Castelluccia, Gabriel Montenegro Securing Group Management in IPv6 with Cryptographically Generated Addresses. Search on Bibsonomy ISCC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF MLD, Proof-of-Membership Problem, Security, Multicast, DoS, Anycast, Group Management, IGMP
35Selmer Moen A low-tech introduction to operating systems. Search on Bibsonomy SIGCSE The full citation details ... 1995 DBLP  DOI  BibTeX  RDF DOS
34Khaled Salah 0001, Karim Sattar, Zubair A. Baig, Mohammed H. Sqalli, Prasad Calyam Resiliency of open-source firewalls against remote discovery of last-matching rules. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF dos attacks, nework security, firewalls
34Mohammad Mahdi Karbasioun, Mehdi Berenjkub, Bahareh Taji A Modified Version of IKEv2 for Using in Client-Server Environments. Search on Bibsonomy CNSR The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Signature, Client-Server, IKEv2, DoS attack
34Muzammil Khan, Attiq Ahmed, Ahmad Raza Cheema Vulnerabilities of UMTS Access Domain Security Architecture. Search on Bibsonomy SNPD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF UMTS vulnerabilities, DoS attacks on UMTS, Security, UMTS
30Fang-Yie Leu, Chia-Chi Pai Detecting DoS and DDoS Attacks Using Chi-Square. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
30Georgios Kambourakis, Constantinos Kolias, Stefanos Gritzalis, Jong Hyuk Park Signaling-Oriented DoS Attacks in UMTS Networks. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Security, Denial of Service, UMTS, Signaling
30Matthias Baumgart 0001, Christian Scheideler, Stefan Schmid 0001 A DoS-resilient information system for dynamic data management. Search on Bibsonomy SPAA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF replication, peer-to-peer systems, DHTS, denial of service attacks
30Xiaowei Yang 0001, David Wetherall, Thomas E. Anderson TVA: a DoS-limiting network architecture. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
30Hitesh Ballani, Paul Francis Mitigating DNS DoS attacks. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF stale cache, denial of service, DNS
30Ellick Chan, Carl A. Gunter, Sonia Jahid, Evgeni Peryshkin, Daniel Rebolledo Using rhythmic nonces for puzzle-based DoS resistance. Search on Bibsonomy CSAW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security
30Christoph Fuchs 0003, Nils Aschenbruck, Felix Leder, Peter Martini Detecting VoIP based DoS attacks at the public safety answering point. Search on Bibsonomy AsiaCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF 911, PSAP, emergency calls, intrusion detection, VoIP, denial of service
30Fazirulhisyam Hashim, M. Rubaiyat Kibria, Abbas Jamalipour A Detection and Recovery Architecture Against DoS and Worm Attacks in NGMN. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
30Xiaojiang Du, Mohsen Guizani, Yang Xiao 0001, Hsiao-Hwa Chen Defending DoS Attacks on Broadcast Authentication in Wireless Sensor Networks. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
30Wentao Zhao, Jianping Yin, Jun Long A Prediction Model of DoS Attack's Distribution Discrete Probability. Search on Bibsonomy WAIM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
30Stylianos Basagiannis, Panagiotis Katsaros, Andrew Pombortsis, Nikolaos Alexiou 0001 A Probabilistic Attacker Model for Quantitative Verification of DoS Security Threats. Search on Bibsonomy COMPSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, model checking, Denial of Service
30Jelena Mirkovic, Alefiya Hussain, Brett Wilson, Sonia Fahmy, Wei-Min Yao, Peter L. Reiher, Stephen Schwab, Roshan K. Thomas When is service really denied?: a user-centric dos metric. Search on Bibsonomy SIGMETRICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF measurement, metrics, denial of service
30Stephen Mark Glass, Vallipuram Muthukkumarasamy A Study of the TKIP Cryptographic DoS Attack. Search on Bibsonomy ICON The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
30Lars Völker, Marcus Schöller Secure TLS: Preventing DoS Attacks with Lower Layer Authentication. Search on Bibsonomy KiVS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
30Toshihiro Tabata, Satoshi Hakomori, Kazutoshi Yokoyama, Hideo Taniguchi Controlling CPU Usage for Processes with Execution Resource for Mitigating CPU DoS Attack. Search on Bibsonomy MUE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
30Elias Athanasopoulos, Kostas G. Anagnostakis, Evangelos P. Markatos Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Hong-bin Yim, Jae-Il Jung IP Traceback Algorithm for DoS/DDoS Attack. Search on Bibsonomy APNOMS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Yan Gao 0003, Zhichun Li, Yan Chen 0004 A DoS Resilient Flow-level Intrusion Detection Approach for High-speed Networks. Search on Bibsonomy ICDCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro Assessment of a Vulnerability in Iterative Servers Enabling Low-Rate DoS Attacks. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Xiaowei Yang 0001, David Wetherall, Thomas E. Anderson A DoS-limiting network architecture. Search on Bibsonomy SIGCOMM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF internet, denial-of-service
30Jing Deng 0002, Richard Han 0001, Shivakant Mishra Defending against path-based DoS attacks in wireless sensor networks. Search on Bibsonomy SASN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, sensor networks, denial of services attacks
30JaeYong Jeong, Yongsu Park, Yookun Cho Efficient DoS Resistant Multicast Authentication Schemes. Search on Bibsonomy ICCSA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF authentication, network security, multicast network
30Zhiguo Wan, Akkihebbal L. Ananda, Robert H. Deng, Feng Bao 0001 Anonymous DoS-Resistant Access Control Protocol Using Passwords for Wireless Networks. Search on Bibsonomy LCN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Wireless Networks, Access Control, Security Protocol
30Angelos Stavrou, John Ioannidis, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein A Pay-per-Use DoS Protection Mechanism for the Web. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
30Ha Yoon Song, Han-gyoo Kim Cooperative Routers against DoS Attacks. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
30Neil Daswani, Hector Garcia-Molina Query-flood DoS attacks in gnutella. Search on Bibsonomy CCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF security, peer-to-peer, denial-of-service
30Kihong Park, Heejo Lee On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets. Search on Bibsonomy SIGCOMM The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
29Tao Peng 0002, Christopher Leckie, Kotagiri Ramamohanarao Survey of network-based defense mechanisms countering the DoS and DDoS problems. Search on Bibsonomy ACM Comput. Surv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF DNS reflector attack, bandwidth attack, resource management, DoS, DDoS, Botnet, Internet security, IP traceback, IRC, IP spoofing, SYN flood, VoIP security
28Tadashi Kiuchi, Yoshiaki Hori, Kouichi Sakurai A Design of History Based Traffic Filtering with Probabilistic Packet Marking against DoS Attacks. Search on Bibsonomy SAINT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF trafic filtering, DoS Attack, probabilistic packet marking
28Shunsuke Oshima, Takuo Nakashima, Toshinori Sueyoshi Early DoS/DDoS Detection Method using Short-term Statistics. Search on Bibsonomy CISIS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF DoS/DDoS attacks, Short-term entropy, A test of significance, IDS, Statistical Method
28Shunsuke Oshima, Arata Hirakawa, Takuo Nakashima, Toshinori Sueyoshi DoS/DDoS Detection Scheme Using Statistical Method Based on the Destination Port Number. Search on Bibsonomy IIH-MSP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF DoS/DDos, Detection Scheme, Chi-square Method, Destination Port Number
28Fen Liu, Lei Hu ROAD: An RFID Offline Authentication, Privacy Preserving Protocol with Dos Resilience. Search on Bibsonomy NPC Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF offline authentication, Dos resilience, RFID
28Haifeng Yu DoS-resilient secure aggregation queries in sensor networks. Search on Bibsonomy PODC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF multihop flooding attacks, secure aggregation queries, sensor networks, DoS attacks
28Thomas L. Adams, Richard E. Zimmerman An Analysis of 8086 Instruction Set Usage in MS DOS Programs. Search on Bibsonomy ASPLOS The full citation details ... 1989 DBLP  DOI  BibTeX  RDF Intel 8086, MS-DOS
28Hal Berghel, Richard Rankin, Sanjiv K. Bhatia MS-DOS Prolog implementations revisited. Search on Bibsonomy ACM SIGPLAN Notices The full citation details ... 1988 DBLP  DOI  BibTeX  RDF Prolog, MS-DOS
26Jelena Mirkovic, Alefiya Hussain, Sonia Fahmy, Peter L. Reiher, Roshan K. Thomas Accurately Measuring Denial of Service in Simulation and Testbed Experiments. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Adnan Nadeem, Michael P. Howarth Adaptive intrusion detection & prevention of denial of service attacks in MANETs. Search on Bibsonomy IWCMC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF intrusion detection & prevention, ad-hoc network security
26Martin Eian Fragility of the Robust Security Network: 802.11 Denial of Service. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF 802.11w, Security, Wireless, Denial of Service, 802.11, 802.11i
26Liqun Chen 0002, Paul Morrissey, Nigel P. Smart, Bogdan Warinschi Security Notions and Generic Constructions for Client Puzzles. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Dong Zheng 0004, Man-On Pun, Weiyan Ge, Junshan Zhang, H. Vincent Poor Distributed opportunistic scheduling for ad hoc communications with imperfect channel information. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Roman Chertov, Sonia Fahmy, Ness B. Shroff Fidelity of network simulation and emulation: A case study of TCP-targeted denial of service attacks. Search on Bibsonomy ACM Trans. Model. Comput. Simul. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF low-rate TCP-targeted attacks, Simulation, congestion control, TCP, emulation, testbeds, denial of service attacks
26Gal Badishi, Idit Keidar Improving denial of service resistance using dynamic local adaptations. Search on Bibsonomy SAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF adaptive denial-of-service resistance, adaptive gossip-based protocols, application-level multicast
26Dong Zheng 0004, Man-On Pun, Weiyan Ge, Junshan Zhang, H. Vincent Poor Distributed Opportunistic Scheduling For Ad-Hoc Communications under Noisy Channel Estimation. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26David A. Bryan, Bruce Lowekamp, Marcia Zangrilli The design of a versatile, secure P2PSIP communications architecture for the public internet. Search on Bibsonomy IPDPS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Aliya Awais, Muddassar Farooq, Muhammad Younus Javed Attack analysis & bio-inspired security framework for IPMultimedia subsystem. Search on Bibsonomy GECCO (Companion) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF network security, artificial immune systems, ip multimedia subsystem
26Aliya Awais, Muddassar Farooq, Muhammad Younus Javed Attack analysis & bio-inspired security framework for IP multimedia subsystem. Search on Bibsonomy GECCO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF network, artificial immune systems, IP multimedia subsystem
26Thuc D. Nguyen, Duc H. M. Nguyen, Bao N. Tran, Hai Trong Vu, Neeraj Mittal A Lightweight Solution for Defending Against Deauthentication/Disassociation Attacks on 802.11 Networks. Search on Bibsonomy ICCCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Ronghua Wang, Wenliang Du, Peng Ning Containing denial-of-service attacks in broadcast authentication in sensor networks. Search on Bibsonomy MobiHoc The full citation details ... 2007 DBLP  DOI  BibTeX  RDF broadcast delay, security, wireless sensor networks, energy saving, denial of service attack
26Dong Zheng 0004, Weiyan Ge, Junshan Zhang Distributed opportunistic scheduling for ad-hoc communications: an optimal stopping approach. Search on Bibsonomy MobiHoc The full citation details ... 2007 DBLP  DOI  BibTeX  RDF distributed opportunistic scheduling, ad-hoc networks, game theory, optimal stopping
26Ortal Arazi, Hairong Qi 0001, Derek Rose A Public Key Cryptographic Method for Denial of Service Mitigation in Wireless Sensor Networks. Search on Bibsonomy SECON The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Guang Jin, Jiangang Yang, Wei Wei, Yabo Dong Mitigating Denial of Capability with An Notification Mechanism. Search on Bibsonomy IEEE NAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Baruch Awerbuch, Christian Scheideler A Denial-of-Service Resistant DHT. Search on Bibsonomy DISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Baruch Awerbuch, Christian Scheideler A denial-of-service resistant DHT. Search on Bibsonomy PODC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF distributed information systems, denial-of-service attacks
26Hongli Luo, Mei-Ling Shyu Defense against Bandwidth Attacks with Traffic Resource Management. Search on Bibsonomy IRI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Aleksandar Kuzmanovic, Edward W. Knightly Low-rate TCP-targeted denial of service attacks and counter strategies. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF TCP, TCP/IP, denial of service, retransmission timeout
26Leonardo Bidese de Pinho, Claudio Luis de Amorim Impact of the clients' position on performance of VoD systems based on collocated APs. Search on Bibsonomy WebMedia The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang Vanguard: A New Detection Scheme for a Class of TCP-targeted Denial-of-Service Attacks. Search on Bibsonomy NOMS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Byung Ryong Kim, Ki-Chang Kim A Proposal of Extension of FMS-Based Mechanism to Find Attack Paths. Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Tomohiro Nakagawa, Motoharu Miyake, Yu Inamura, Hiroshi Inamura Service Discovery with Denial-of-Service Attack Resistance using Risk Evaluation. Search on Bibsonomy AINA (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26John Haggerty, Qi Shi 0001, Madjid Merabti Early detection and prevention of denial-of-service attacks: a novel mechanism with propagated traced-back attack blocking. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Yongjin Kim, Ahmed Helmy SWAT: Small World-based Attacker Traceback in Ad-hoc Networks. Search on Bibsonomy MobiQuitous The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Jahangir Hasan, Ankit Jalote, T. N. Vijaykumar, Carla E. Brodley Heat Stroke: Power-Density-Based Denial of Service in SMT. Search on Bibsonomy HPCA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Ajay Mahimkar, Vitaly Shmatikov Game-Based Analysis of Denial-of-Service Prevention Protocols. Search on Bibsonomy CSFW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Gal Badishi, Amir Herzberg, Idit Keidar Keeping Denial-of-Service Attackers in the Dark. Search on Bibsonomy DISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Pars Mutaf, Claude Castelluccia Compact neighbor discovery: a bandwidth defense through bandwidth optimization. Search on Bibsonomy INFOCOM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Marek Hejmo, Brian L. Mark, Charikleia Zouridaki, Roshan K. Thomas A Denial-of-Service Resistant Quality-of-Service Signaling Protocol for Mobile Ad Hoc Networks. Search on Bibsonomy QSHINE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Hongli Luo, Mei-Ling Shyu The Protection of QoS for Multimedia Transmission against Denial of Service Attacks. Search on Bibsonomy ISM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Ping Yi, Zhoulin Dai, YiPing Zhong, Shiyong Zhang Resisting Flooding Attacks in Ad Hoc Networks. Search on Bibsonomy ITCC (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Felix C. Freiling, Thorsten Holz, Georg Wicherski Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks. Search on Bibsonomy ESORICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Thomas E. Anderson, Timothy Roscoe, David Wetherall Preventing Internet denial-of-service with capabilities. Search on Bibsonomy Comput. Commun. Rev. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26V. Anil Kumar, Dorgham Sisalem TCP Based Denial-of-Service Attacks to Edge Network: Analysis and Detection. Search on Bibsonomy CIT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Lau Nga Sin, Moon-Chuen Lee An Efficient Domain Based Marking Scheme for IP Traceback. Search on Bibsonomy HSNMC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Shigang Chen, Randy Chow A New Perspective in Defending against DDoS. Search on Bibsonomy FTDCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 10178 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license