|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1332 occurrences of 792 keywords
|
|
|
Results
Found 12185 publication records. Showing 10178 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
35 | Zhang Fu, Marina Papatriantafilou, Philippas Tsigas |
Mitigating Distributed Denial of Service Attacks in Multiparty Applications in the Presence of Clock Drifts. |
SRDS |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Gal Badishi, Amir Herzberg, Idit Keidar |
Keeping Denial-of-Service Attackers in the Dark. |
IEEE Trans. Dependable Secur. Comput. |
2007 |
DBLP DOI BibTeX RDF |
Reliability, Protocols, availability and serviceability |
35 | Lari Iso-Anttila, Jorma Ylinen, Pekka Loula |
A Proposal to Improve IKEv2 negotiation. |
SECURWARE |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Gülay Öke, George Loukas, Erol Gelenbe |
Detecting Denial of Service Attacks with Bayesian Classifiers and the Random Neural Network. |
FUZZ-IEEE |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Joseph Chee Ming Teo, Chik How Tan |
Denial-of-service resilience password-based group key agreement for wireless networks. |
Q2SWinet |
2007 |
DBLP DOI BibTeX RDF |
denial-of-service, group key agreement, secure group communication, password-based authentication |
35 | Gal Badishi, Idit Keidar, Amir Sasson |
Exposing and Eliminating Vulnerabilities to Denial of Service Attacks in Secure Gossip-Based Multicast. |
IEEE Trans. Dependable Secur. Comput. |
2006 |
DBLP DOI BibTeX RDF |
reliability, Distributed applications, distributed programming, availability and serviceability |
35 | Hemant Sengar, Haining Wang, Duminda Wijesekera, Sushil Jajodia |
Fast Detection of Denial-of-Service Attacks on IP Telephony. |
IWQoS |
2006 |
DBLP DOI BibTeX RDF |
|
35 | Men Long, Chwan-Hwa John Wu, John Y. Hung |
Denial of service attacks on network-based control systems: impact and mitigation. |
IEEE Trans. Ind. Informatics |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Xiapu Luo, Rocky K. C. Chang, Edmond W. W. Chan |
Performance Analysis of TCP/AQM Under Denial-of-Service Attacks. |
MASCOTS |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Suraiya Khan, Issa Traoré |
A Prevention Model for Algorithmic Complexity Attacks. |
DIMVA |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Aki P. F. Chan, Daniel S. Yeung, Eric C. C. Tsang, Wing W. Y. Ng |
Empirical Study on Fusion Methods Using Ensemble of RBFNN for Network Intrusion Detection. |
ICMLC |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Gal Badishi, Idit Keidar, Amir Sasson |
Exposing and Eliminating Vulnerabilities to Denial of Service Attacks in Secure Gossip-Based Multicast. |
DSN |
2004 |
DBLP DOI BibTeX RDF |
|
35 | Alefiya Hussain, John S. Heidemann, Christos Papadopoulos |
A framework for classifying denial of service attacks. |
SIGCOMM |
2003 |
DBLP DOI BibTeX RDF |
security, measurement, time series analysis, denial of service attacks |
35 | P. Sharma, P. Shah, S. Bhattacharya |
Mirror Hopping Approach for Selective Denial of Service Prevention. |
WORDS |
2003 |
DBLP DOI BibTeX RDF |
Mirror sites, E-Commerce, Information Security, Denial of Service, HTTP |
35 | Angelos D. Keromytis, Vishal Misra, Dan Rubenstein |
SOS: secure overlay services. |
SIGCOMM |
2002 |
DBLP DOI BibTeX RDF |
network security, overlay networks, denial of service attacks |
35 | Paul Beckman, Åsa Forsman |
Kevin Bacon, Degrees-of-Separation, and MIS Research Productivity. |
HICSS |
2002 |
DBLP DOI BibTeX RDF |
research productivity, degrees-of-separation, graph theory |
35 | John Haggerty, Qi Shi 0001, Madjid Merabti |
Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks. |
ACSAC |
2002 |
DBLP DOI BibTeX RDF |
|
35 | Baoqing Ye |
Defeating Denial-of-Service Attacks on the Internet. |
ICICS |
2001 |
DBLP DOI BibTeX RDF |
|
35 | Devendra Naniwadekar |
Implementation of a resource manager for distributed MINIX. |
ACM Conference on Computer Science |
1988 |
DBLP DOI BibTeX RDF |
MINIX |
35 | Koohong Kang |
Anomaly Detection of Hostile Traffic Based on Network Traffic Distributions. |
ICOIN |
2007 |
DBLP DOI BibTeX RDF |
Network Traffic Anomaly, Network Traffic Distribution, Entropy, DoS |
35 | Glenn Carl, George Kesidis, Richard R. Brooks, Suresh Rai |
Denial-of-Service Attack-Detection Techniques. |
IEEE Internet Comput. |
2006 |
DBLP DOI BibTeX RDF |
denial-of-service, DoS, flooding attacks |
35 | Fang-Yie Leu, Jia-Chun Lin, Ming-Chang Li, Chao-Tung Yang |
A Performance-Based Grid Intrusion Detection System. |
COMPSAC (1) |
2005 |
DBLP DOI BibTeX RDF |
PGIDS, Grid, DoS, DDoS, SSA, BPNN, SAA |
35 | Claude Castelluccia, Gabriel Montenegro |
Securing Group Management in IPv6 with Cryptographically Generated Addresses. |
ISCC |
2003 |
DBLP DOI BibTeX RDF |
MLD, Proof-of-Membership Problem, Security, Multicast, DoS, Anycast, Group Management, IGMP |
35 | Selmer Moen |
A low-tech introduction to operating systems. |
SIGCSE |
1995 |
DBLP DOI BibTeX RDF |
DOS |
34 | Khaled Salah 0001, Karim Sattar, Zubair A. Baig, Mohammed H. Sqalli, Prasad Calyam |
Resiliency of open-source firewalls against remote discovery of last-matching rules. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
dos attacks, nework security, firewalls |
34 | Mohammad Mahdi Karbasioun, Mehdi Berenjkub, Bahareh Taji |
A Modified Version of IKEv2 for Using in Client-Server Environments. |
CNSR |
2008 |
DBLP DOI BibTeX RDF |
Signature, Client-Server, IKEv2, DoS attack |
34 | Muzammil Khan, Attiq Ahmed, Ahmad Raza Cheema |
Vulnerabilities of UMTS Access Domain Security Architecture. |
SNPD |
2008 |
DBLP DOI BibTeX RDF |
UMTS vulnerabilities, DoS attacks on UMTS, Security, UMTS |
30 | Fang-Yie Leu, Chia-Chi Pai |
Detecting DoS and DDoS Attacks Using Chi-Square. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
30 | Georgios Kambourakis, Constantinos Kolias, Stefanos Gritzalis, Jong Hyuk Park |
Signaling-Oriented DoS Attacks in UMTS Networks. |
ISA |
2009 |
DBLP DOI BibTeX RDF |
Security, Denial of Service, UMTS, Signaling |
30 | Matthias Baumgart 0001, Christian Scheideler, Stefan Schmid 0001 |
A DoS-resilient information system for dynamic data management. |
SPAA |
2009 |
DBLP DOI BibTeX RDF |
replication, peer-to-peer systems, DHTS, denial of service attacks |
30 | Xiaowei Yang 0001, David Wetherall, Thomas E. Anderson |
TVA: a DoS-limiting network architecture. |
IEEE/ACM Trans. Netw. |
2008 |
DBLP DOI BibTeX RDF |
|
30 | Hitesh Ballani, Paul Francis |
Mitigating DNS DoS attacks. |
CCS |
2008 |
DBLP DOI BibTeX RDF |
stale cache, denial of service, DNS |
30 | Ellick Chan, Carl A. Gunter, Sonia Jahid, Evgeni Peryshkin, Daniel Rebolledo |
Using rhythmic nonces for puzzle-based DoS resistance. |
CSAW |
2008 |
DBLP DOI BibTeX RDF |
security |
30 | Christoph Fuchs 0003, Nils Aschenbruck, Felix Leder, Peter Martini |
Detecting VoIP based DoS attacks at the public safety answering point. |
AsiaCCS |
2008 |
DBLP DOI BibTeX RDF |
911, PSAP, emergency calls, intrusion detection, VoIP, denial of service |
30 | Fazirulhisyam Hashim, M. Rubaiyat Kibria, Abbas Jamalipour |
A Detection and Recovery Architecture Against DoS and Worm Attacks in NGMN. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
30 | Xiaojiang Du, Mohsen Guizani, Yang Xiao 0001, Hsiao-Hwa Chen |
Defending DoS Attacks on Broadcast Authentication in Wireless Sensor Networks. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
30 | Wentao Zhao, Jianping Yin, Jun Long |
A Prediction Model of DoS Attack's Distribution Discrete Probability. |
WAIM |
2008 |
DBLP DOI BibTeX RDF |
|
30 | Stylianos Basagiannis, Panagiotis Katsaros, Andrew Pombortsis, Nikolaos Alexiou 0001 |
A Probabilistic Attacker Model for Quantitative Verification of DoS Security Threats. |
COMPSAC |
2008 |
DBLP DOI BibTeX RDF |
security, model checking, Denial of Service |
30 | Jelena Mirkovic, Alefiya Hussain, Brett Wilson, Sonia Fahmy, Wei-Min Yao, Peter L. Reiher, Stephen Schwab, Roshan K. Thomas |
When is service really denied?: a user-centric dos metric. |
SIGMETRICS |
2007 |
DBLP DOI BibTeX RDF |
measurement, metrics, denial of service |
30 | Stephen Mark Glass, Vallipuram Muthukkumarasamy |
A Study of the TKIP Cryptographic DoS Attack. |
ICON |
2007 |
DBLP DOI BibTeX RDF |
|
30 | Lars Völker, Marcus Schöller |
Secure TLS: Preventing DoS Attacks with Lower Layer Authentication. |
KiVS |
2007 |
DBLP DOI BibTeX RDF |
|
30 | Toshihiro Tabata, Satoshi Hakomori, Kazutoshi Yokoyama, Hideo Taniguchi |
Controlling CPU Usage for Processes with Execution Resource for Mitigating CPU DoS Attack. |
MUE |
2007 |
DBLP DOI BibTeX RDF |
|
30 | Elias Athanasopoulos, Kostas G. Anagnostakis, Evangelos P. Markatos |
Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Hong-bin Yim, Jae-Il Jung |
IP Traceback Algorithm for DoS/DDoS Attack. |
APNOMS |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Yan Gao 0003, Zhichun Li, Yan Chen 0004 |
A DoS Resilient Flow-level Intrusion Detection Approach for High-speed Networks. |
ICDCS |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro |
Assessment of a Vulnerability in Iterative Servers Enabling Low-Rate DoS Attacks. |
ESORICS |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Xiaowei Yang 0001, David Wetherall, Thomas E. Anderson |
A DoS-limiting network architecture. |
SIGCOMM |
2005 |
DBLP DOI BibTeX RDF |
internet, denial-of-service |
30 | Jing Deng 0002, Richard Han 0001, Shivakant Mishra |
Defending against path-based DoS attacks in wireless sensor networks. |
SASN |
2005 |
DBLP DOI BibTeX RDF |
security, sensor networks, denial of services attacks |
30 | JaeYong Jeong, Yongsu Park, Yookun Cho |
Efficient DoS Resistant Multicast Authentication Schemes. |
ICCSA (2) |
2005 |
DBLP DOI BibTeX RDF |
authentication, network security, multicast network |
30 | Zhiguo Wan, Akkihebbal L. Ananda, Robert H. Deng, Feng Bao 0001 |
Anonymous DoS-Resistant Access Control Protocol Using Passwords for Wireless Networks. |
LCN |
2005 |
DBLP DOI BibTeX RDF |
Wireless Networks, Access Control, Security Protocol |
30 | Angelos Stavrou, John Ioannidis, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein |
A Pay-per-Use DoS Protection Mechanism for the Web. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
|
30 | Ha Yoon Song, Han-gyoo Kim |
Cooperative Routers against DoS Attacks. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
|
30 | Neil Daswani, Hector Garcia-Molina |
Query-flood DoS attacks in gnutella. |
CCS |
2002 |
DBLP DOI BibTeX RDF |
security, peer-to-peer, denial-of-service |
30 | Kihong Park, Heejo Lee |
On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets. |
SIGCOMM |
2001 |
DBLP DOI BibTeX RDF |
|
29 | Tao Peng 0002, Christopher Leckie, Kotagiri Ramamohanarao |
Survey of network-based defense mechanisms countering the DoS and DDoS problems. |
ACM Comput. Surv. |
2007 |
DBLP DOI BibTeX RDF |
DNS reflector attack, bandwidth attack, resource management, DoS, DDoS, Botnet, Internet security, IP traceback, IRC, IP spoofing, SYN flood, VoIP security |
28 | Tadashi Kiuchi, Yoshiaki Hori, Kouichi Sakurai |
A Design of History Based Traffic Filtering with Probabilistic Packet Marking against DoS Attacks. |
SAINT |
2010 |
DBLP DOI BibTeX RDF |
trafic filtering, DoS Attack, probabilistic packet marking |
28 | Shunsuke Oshima, Takuo Nakashima, Toshinori Sueyoshi |
Early DoS/DDoS Detection Method using Short-term Statistics. |
CISIS |
2010 |
DBLP DOI BibTeX RDF |
DoS/DDoS attacks, Short-term entropy, A test of significance, IDS, Statistical Method |
28 | Shunsuke Oshima, Arata Hirakawa, Takuo Nakashima, Toshinori Sueyoshi |
DoS/DDoS Detection Scheme Using Statistical Method Based on the Destination Port Number. |
IIH-MSP |
2009 |
DBLP DOI BibTeX RDF |
DoS/DDos, Detection Scheme, Chi-square Method, Destination Port Number |
28 | Fen Liu, Lei Hu |
ROAD: An RFID Offline Authentication, Privacy Preserving Protocol with Dos Resilience. |
NPC Workshops |
2008 |
DBLP DOI BibTeX RDF |
offline authentication, Dos resilience, RFID |
28 | Haifeng Yu |
DoS-resilient secure aggregation queries in sensor networks. |
PODC |
2007 |
DBLP DOI BibTeX RDF |
multihop flooding attacks, secure aggregation queries, sensor networks, DoS attacks |
28 | Thomas L. Adams, Richard E. Zimmerman |
An Analysis of 8086 Instruction Set Usage in MS DOS Programs. |
ASPLOS |
1989 |
DBLP DOI BibTeX RDF |
Intel 8086, MS-DOS |
28 | Hal Berghel, Richard Rankin, Sanjiv K. Bhatia |
MS-DOS Prolog implementations revisited. |
ACM SIGPLAN Notices |
1988 |
DBLP DOI BibTeX RDF |
Prolog, MS-DOS |
26 | Jelena Mirkovic, Alefiya Hussain, Sonia Fahmy, Peter L. Reiher, Roshan K. Thomas |
Accurately Measuring Denial of Service in Simulation and Testbed Experiments. |
IEEE Trans. Dependable Secur. Comput. |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Adnan Nadeem, Michael P. Howarth |
Adaptive intrusion detection & prevention of denial of service attacks in MANETs. |
IWCMC |
2009 |
DBLP DOI BibTeX RDF |
intrusion detection & prevention, ad-hoc network security |
26 | Martin Eian |
Fragility of the Robust Security Network: 802.11 Denial of Service. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
802.11w, Security, Wireless, Denial of Service, 802.11, 802.11i |
26 | Liqun Chen 0002, Paul Morrissey, Nigel P. Smart, Bogdan Warinschi |
Security Notions and Generic Constructions for Client Puzzles. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Dong Zheng 0004, Man-On Pun, Weiyan Ge, Junshan Zhang, H. Vincent Poor |
Distributed opportunistic scheduling for ad hoc communications with imperfect channel information. |
IEEE Trans. Wirel. Commun. |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Roman Chertov, Sonia Fahmy, Ness B. Shroff |
Fidelity of network simulation and emulation: A case study of TCP-targeted denial of service attacks. |
ACM Trans. Model. Comput. Simul. |
2008 |
DBLP DOI BibTeX RDF |
low-rate TCP-targeted attacks, Simulation, congestion control, TCP, emulation, testbeds, denial of service attacks |
26 | Gal Badishi, Idit Keidar |
Improving denial of service resistance using dynamic local adaptations. |
SAC |
2008 |
DBLP DOI BibTeX RDF |
adaptive denial-of-service resistance, adaptive gossip-based protocols, application-level multicast |
26 | Dong Zheng 0004, Man-On Pun, Weiyan Ge, Junshan Zhang, H. Vincent Poor |
Distributed Opportunistic Scheduling For Ad-Hoc Communications under Noisy Channel Estimation. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
26 | David A. Bryan, Bruce Lowekamp, Marcia Zangrilli |
The design of a versatile, secure P2PSIP communications architecture for the public internet. |
IPDPS |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Aliya Awais, Muddassar Farooq, Muhammad Younus Javed |
Attack analysis & bio-inspired security framework for IPMultimedia subsystem. |
GECCO (Companion) |
2008 |
DBLP DOI BibTeX RDF |
network security, artificial immune systems, ip multimedia subsystem |
26 | Aliya Awais, Muddassar Farooq, Muhammad Younus Javed |
Attack analysis & bio-inspired security framework for IP multimedia subsystem. |
GECCO |
2008 |
DBLP DOI BibTeX RDF |
network, artificial immune systems, IP multimedia subsystem |
26 | Thuc D. Nguyen, Duc H. M. Nguyen, Bao N. Tran, Hai Trong Vu, Neeraj Mittal |
A Lightweight Solution for Defending Against Deauthentication/Disassociation Attacks on 802.11 Networks. |
ICCCN |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Ronghua Wang, Wenliang Du, Peng Ning |
Containing denial-of-service attacks in broadcast authentication in sensor networks. |
MobiHoc |
2007 |
DBLP DOI BibTeX RDF |
broadcast delay, security, wireless sensor networks, energy saving, denial of service attack |
26 | Dong Zheng 0004, Weiyan Ge, Junshan Zhang |
Distributed opportunistic scheduling for ad-hoc communications: an optimal stopping approach. |
MobiHoc |
2007 |
DBLP DOI BibTeX RDF |
distributed opportunistic scheduling, ad-hoc networks, game theory, optimal stopping |
26 | Ortal Arazi, Hairong Qi 0001, Derek Rose |
A Public Key Cryptographic Method for Denial of Service Mitigation in Wireless Sensor Networks. |
SECON |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Guang Jin, Jiangang Yang, Wei Wei, Yabo Dong |
Mitigating Denial of Capability with An Notification Mechanism. |
IEEE NAS |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Baruch Awerbuch, Christian Scheideler |
A Denial-of-Service Resistant DHT. |
DISC |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Baruch Awerbuch, Christian Scheideler |
A denial-of-service resistant DHT. |
PODC |
2007 |
DBLP DOI BibTeX RDF |
distributed information systems, denial-of-service attacks |
26 | Hongli Luo, Mei-Ling Shyu |
Defense against Bandwidth Attacks with Traffic Resource Management. |
IRI |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Aleksandar Kuzmanovic, Edward W. Knightly |
Low-rate TCP-targeted denial of service attacks and counter strategies. |
IEEE/ACM Trans. Netw. |
2006 |
DBLP DOI BibTeX RDF |
TCP, TCP/IP, denial of service, retransmission timeout |
26 | Leonardo Bidese de Pinho, Claudio Luis de Amorim |
Impact of the clients' position on performance of VoD systems based on collocated APs. |
WebMedia |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang |
Vanguard: A New Detection Scheme for a Class of TCP-targeted Denial-of-Service Attacks. |
NOMS |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Byung Ryong Kim, Ki-Chang Kim |
A Proposal of Extension of FMS-Based Mechanism to Find Attack Paths. |
ICCSA (3) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Tomohiro Nakagawa, Motoharu Miyake, Yu Inamura, Hiroshi Inamura |
Service Discovery with Denial-of-Service Attack Resistance using Risk Evaluation. |
AINA (1) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | John Haggerty, Qi Shi 0001, Madjid Merabti |
Early detection and prevention of denial-of-service attacks: a novel mechanism with propagated traced-back attack blocking. |
IEEE J. Sel. Areas Commun. |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Yongjin Kim, Ahmed Helmy |
SWAT: Small World-based Attacker Traceback in Ad-hoc Networks. |
MobiQuitous |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Jahangir Hasan, Ankit Jalote, T. N. Vijaykumar, Carla E. Brodley |
Heat Stroke: Power-Density-Based Denial of Service in SMT. |
HPCA |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Ajay Mahimkar, Vitaly Shmatikov |
Game-Based Analysis of Denial-of-Service Prevention Protocols. |
CSFW |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Gal Badishi, Amir Herzberg, Idit Keidar |
Keeping Denial-of-Service Attackers in the Dark. |
DISC |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Pars Mutaf, Claude Castelluccia |
Compact neighbor discovery: a bandwidth defense through bandwidth optimization. |
INFOCOM |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Marek Hejmo, Brian L. Mark, Charikleia Zouridaki, Roshan K. Thomas |
A Denial-of-Service Resistant Quality-of-Service Signaling Protocol for Mobile Ad Hoc Networks. |
QSHINE |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Hongli Luo, Mei-Ling Shyu |
The Protection of QoS for Multimedia Transmission against Denial of Service Attacks. |
ISM |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Ping Yi, Zhoulin Dai, YiPing Zhong, Shiyong Zhang |
Resisting Flooding Attacks in Ad Hoc Networks. |
ITCC (2) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Felix C. Freiling, Thorsten Holz, Georg Wicherski |
Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks. |
ESORICS |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Thomas E. Anderson, Timothy Roscoe, David Wetherall |
Preventing Internet denial-of-service with capabilities. |
Comput. Commun. Rev. |
2004 |
DBLP DOI BibTeX RDF |
|
26 | V. Anil Kumar, Dorgham Sisalem |
TCP Based Denial-of-Service Attacks to Edge Network: Analysis and Detection. |
CIT |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Lau Nga Sin, Moon-Chuen Lee |
An Efficient Domain Based Marking Scheme for IP Traceback. |
HSNMC |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Shigang Chen, Randy Chow |
A New Perspective in Defending against DDoS. |
FTDCS |
2004 |
DBLP DOI BibTeX RDF |
|
Displaying result #101 - #200 of 10178 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ >>] |
|