The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Traceback with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1982-2001 (19) 2002 (15) 2003 (23) 2004 (29) 2005 (47) 2006 (46) 2007 (23) 2008 (37) 2009 (27) 2010 (21) 2011 (18) 2012 (19) 2013 (20) 2014 (21) 2015 (17) 2016 (21) 2017-2018 (25) 2019-2020 (20) 2021-2022 (17) 2023-2024 (8)
Publication types (Num. hits)
article(153) book(1) incollection(2) inproceedings(317)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 195 occurrences of 85 keywords

Results
Found 473 publication records. Showing 473 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
31Hsien-Ming Hsu, Yeali S. Sun, Meng Chang Chen A Collaborative Forensics Framework for VoIP Services in Multi-network Environments. Search on Bibsonomy ISI Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF collaborative forensics, VoIP services, SIP, traceback
31Vaarun Vijairaghavan, Darshak Shah, Pallavi Galgali, Amit Shah, Nikhil Shah, Srinivasan Venkatesh 0002, Lokesh Bhatia Marking Technique to Isolate Boundary Router and Attacker. Search on Bibsonomy Computer The full citation details ... 2007 DBLP  DOI  BibTeX  RDF network security, Internet Protocol traceback, Denial-of-service attacks
31Terence K. T. Law, John C. S. Lui, David K. Y. Yau You Can Run, But You Can't Hide: An Effective Statistical Methodology to Trace Back DDoS Attackers. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF attack traffic filtering, minimum stable time, DDoS attack, traceback
31Qiang Li 0008, Yan Lin, Kun Liu, Jiubin Ju Constructing Correlations in Attack Connection Chains Using Active Perturbation. Search on Bibsonomy AAIM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Connection Chain, Active Delay, Traceback
31Shigeyuki Matsuda, Tatsuya Baba, Akihiro Hayakawa, Taichi Nakamura Design and Implementation of Unauthorized Access Tracing System. Search on Bibsonomy SAINT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF network security, IDS, traceback, unauthorized access, DOS
31Koji Yamazaki, Teruhiko Yamada An approach to diagnose logical faults in partially observable sequential circuits. Search on Bibsonomy Asian Test Symposium The full citation details ... 1997 DBLP  DOI  BibTeX  RDF logical faults, partially observable sequential circuits, internal nets, error sources, error propagation traceback, failing primary outputs, ISCAS'89 benchmark circuits, fault diagnosis, simulation results, probing, diagnostic resolution
31Stephen C. Glinski, David B. Roe Spoken Language Recognition on a DSP Array Processor. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 1994 DBLP  DOI  BibTeX  RDF speechrecognition, spoken language recognition, DSP array processor, real-time large-vocabulary speaker-independent continuous speech recognizers, multiplehigh-performance central processing units, high interprocessor communication bandwidth, feature extractor, mixture probability computer, state probability computer, word probability computer, phrase probability computer, traceback computer, multistage stack decoder, parallel architectures, partitioning, message passing, array processor, array signal processing, linear predictive coding, linear predictive coding
30Curt Schurgers, Anantha P. Chandrakasan Traceback-Based Optimizations for Maximum a Posteriori Decoding Algorithms. Search on Bibsonomy J. Signal Process. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF very-large-scale integration, error correction coding, MAP estimation
30André O. Castelucio, Ronaldo M. Salles, Artur Ziviani An AS-level IP traceback system. Search on Bibsonomy CoNEXT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
30Chun-Hsin Wang, Chang-Wu Yu 0001, Chiu-Kuo Liang, Kun-Ming Yu, Wen Ouyang, Ching-Hsien Hsu, Yu-Guang Chen Tracers placement for IP traceback against DDoS attacks. Search on Bibsonomy IWCMC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF IP tracerback, tracers, DDoS
30Hanping Hu, Yi Wang, Lingfei Wang, Wenxuan Guo, Mingyue Ding Two Novel Packet Marking Schemes for IP Traceback. Search on Bibsonomy ATC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Hong-bin Yim, Jae-Il Jung IP Traceback Algorithm for DoS/DDoS Attack. Search on Bibsonomy APNOMS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Luo Wen, Jianping Wu, Ke Xu 0002 Overlay Logging: An IP Traceback Scheme in MPLS Network. Search on Bibsonomy ICN (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
30Zhiqiang Gao, Nirwan Ansari Directed geographical traceback. Search on Bibsonomy ITRE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
30Xueqin Yang, Changxing Pei, Changhua Zhu, Yan Li AMS Based Reconstruction Algorithm with Two-dimensional Threshold for IP Traceback. Search on Bibsonomy PDCAT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
30Lau Nga Sin, Moon-Chuen Lee An Efficient Domain Based Marking Scheme for IP Traceback. Search on Bibsonomy HSNMC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
30Hassan Aljifri IP Traceback: A New Denial-of-Service Deterrent? Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
30Zhaole Chen, Moon-Chuen Lee An IP Traceback Technique against Denial-of-Service Attacks. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
30Tao Peng 0002, Christopher Leckie, Kotagiri Ramamohanarao Adjusted Probabilistic Packet Marking for IP Traceback. Search on Bibsonomy NETWORKING The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
30Alex C. Snoeren Hash-based IP traceback. Search on Bibsonomy SIGCOMM The full citation details ... 2001 DBLP  DOI  BibTeX  RDF IP
25Omer Demir, Bilal Khan 0002, Ala I. Al-Fuqaha Reconstruction of malicious internet flows. Search on Bibsonomy IWCMC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF flow reconstruction, distributed denial of service
25Vrizlynn L. L. Thing, Morris Sloman, Naranker Dulay Network domain entrypoint/path determination for DDoS attacks. Search on Bibsonomy NOMS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25Muthusrinivasan Muthuprasanna, Govindarasu Manimaran Distributed Divide-and-Conquer Techniques for Effective DDoS Attack Defenses. Search on Bibsonomy ICDCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25Fan Ye 0003, Hao Yang 0004, Zhen Liu 0001 Catching "Moles" in Sensor Networks. Search on Bibsonomy ICDCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
25Chia-Mei Chen, Bingchiang Jeng, Chia Ru Yang, Gu Hsin Lai Tracing Denial of Service Origin: Ant Colony Approach. Search on Bibsonomy EvoWorkshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25Thomas Dübendorfer, Matthias Bossardt, Bernhard Plattner Adaptive Distributed Traffic Control Service for DDoS Attack Mitigation. Search on Bibsonomy IPDPS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
25Qunfeng Dong, Suman Banerjee 0001, Micah Adler, Kazu Hirata Efficient Probabilistic Packet Marking. Search on Bibsonomy ICNP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
25Qiang Li 0008, Hongzi Zhu, Meng Zhang, Jiubin Ju Simulating and Improving Probabilistic Packet Marking Schemes Using Ns2. Search on Bibsonomy PDCAT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
25Shravan K. Rayanchu, Gautam Barua Tracing Attackers with Deterministic Edge Router Marking (DERM). Search on Bibsonomy ICDCIT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
19Jonghyun Kim, Jungchan Na An Efficient Algorithm for Intrusion Source Identification. Search on Bibsonomy NCM (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Centroid tree, Intrusion, Traceback
19Tao Peng 0002, Christopher Leckie, Kotagiri Ramamohanarao Survey of network-based defense mechanisms countering the DoS and DDoS problems. Search on Bibsonomy ACM Comput. Surv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF DNS reflector attack, bandwidth attack, resource management, DoS, DDoS, Botnet, Internet security, IP traceback, IRC, IP spoofing, SYN flood, VoIP security
19Han-Ching Wu, Shou-Hsuan Stephen Huang Detecting Stepping-Stone with Chaff Perturbations. Search on Bibsonomy AINA Workshops (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Stepping-stone Detection, Chaff Perturbation, Intrusion Detection, Random Walk, Traceback
18Shuchang Ye, Mingyuan Meng, Mingjian Li, Dagan Feng 0001, Jinman Kim Dual-modal Dynamic Traceback Learning for Medical Report Generation. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Sumit Walia, Cheng Ye, Arkid Bera, Dhruvi Lodhavia, Yatish Turakhia TALCO: Tiling Genome Sequence Alignment Using Convergence of Traceback Pointers. Search on Bibsonomy HPCA The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Wenshuo Peng, Kaipeng Zhang, Yue Yang, Hao Zhang, Yu Qiao Data Adaptive Traceback for Vision-Language Foundation Models in Image Classification. Search on Bibsonomy AAAI The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Sherif F. Emara, Sayed Abdelhady, M. Zaki A novel traceback model for DDoS attacks using modified Floyd-Warshall algorithm. Search on Bibsonomy Int. J. Inf. Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Harshit Gupta, Pratyush Pareek, Anirudh Arora, Muskan Deep Kaur Maini, Ramesh Kumar Bhukya, O. P. Vyas 0001, Antonio Puliafito Fed-Trace: An Efficient Model to Traceback Data Poisoning Attacks in Federated Learning. Search on Bibsonomy ICCST The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Heng He, Sen Yang, Xiaohu Zhou, Jia Wang SMWT: A Universal and Lightweight SDN-Based Meter Table Watermarking Traceback Scheme. Search on Bibsonomy APNOMS The full citation details ... 2023 DBLP  BibTeX  RDF
18Chaoqiang Yang, Liancheng Zhang, Lanxin Cheng, Yi Guo, Wenwen Du ATTRM6: A Distributed IPv6 Address Traceback and Threatener Restriction Mechanism Based on Smart Contract. Search on Bibsonomy ICCMS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18LeAnn Lindsey, Muhammad Haseeb, Hari Sundar, Muaaz Gul Awan TANGO: A GPU optimized traceback approach for sequence alignment algorithms. Search on Bibsonomy SC Workshops The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Lihua Yang, Zhipeng Tan, Fang Wang 0001, Dan Feng 0001, Hongwei Qin, Shiyun Tu, Jiaxing Qian, Yuting Zhao Improving F2FS Performance in Mobile Devices With Adaptive Reserved Space Based on Traceback. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Shawn Shan, Arjun Nitin Bhagoji, Haitao Zheng 0001, Ben Y. Zhao Poison Forensics: Traceback of Data Poisoning Attacks in Neural Networks. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2022 DBLP  BibTeX  RDF
18Chuan-Yu Chen, Shih-Hao Huang, Yi-Chang Lu A Hardware Accelerator for Long Sequence Alignment with the Bit-Vector Scoring Scheme and Divide-and-Conquer Traceback. Search on Bibsonomy BioCAS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Erin Kenney, Qiang Tang 0005, Chase Wu Anonymous Traceback for End-to-End Encryption. Search on Bibsonomy ESORICS (2) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Shiying Yao, Jian Zeng, Shuangxing Wang, Xiaolong Yang, Jingtang Luo, Ziqi Wang A Secure Data Aggregation Scheme Enabling Abnormal Smart Meters Traceback for Smart Grid. Search on Bibsonomy EITCE The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Pynbianglut Hadem, Dilip Kumar Saikia, Soumen Moulik An SDN-based Intrusion Detection System using SVM with Selective Logging for IP Traceback. Search on Bibsonomy Comput. Networks The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
18Guangfeng Guo, Junxing Zhang, Zhanfei Ma Intrusion prevention with attack traceback and software-defined control plane for campus networks. Search on Bibsonomy Comput. Sci. Inf. Syst. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
18Sudhakar Balraj, Kavisankar Leelasankar, Ayyasamy Ayyanar, Yesudhas Harold Robinson, Raghvendra Kumar 0001, Hoang Viet Long, Le Hoang Son An Effective Traceback Network Attack Procedure for Source Address Verification. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
18Shawn Shan, Arjun Nitin Bhagoji, Haitao Zheng 0001, Ben Y. Zhao Traceback of Data Poisoning Attacks in Neural Networks. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
18Johannes Krupp, Christian Rossow BGPeek-a-Boo: Active BGP-based Traceback for Amplification DDoS Attacks. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
18Pynbianglut Hadem, Dilip Kumar Saikia, Soumen Moulik I-SMITE: an IP traceback mechanism for inter-AS SDN networks using BGP. Search on Bibsonomy Int. J. Secur. Networks The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
18Feng Xiao, Enhong Chen, Qiang Xu, Xianguo Zhang ICSTrace: A Malicious IP Traceback Model for Attacking Data of the Industrial Control System. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
18Sharmin Aktar, Abdullah Yasin Nur Hash Based AS Traceback against DoS Attack. Search on Bibsonomy CommNet The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
18Abdullah Yasin Nur, Mehmet Engin Tozal Single Packet AS Traceback against DoS Attacks. Search on Bibsonomy SysCon The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
18Woo Young Park, Sang Hyun Kim, Duy-Son Vu, Chang Han Song, Hee Soo Jung, Hyeon Jo A Novel Traceback Technology for E-mail Sender Verification : Type of submission: Regular Research Paper / Most relevant symposium: CSCI-ISCW. Search on Bibsonomy CSCI The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
18Johannes Krupp, Christian Rossow BGPeek-a-Boo: Active BGP-based Traceback for Amplification DDoS Attacks. Search on Bibsonomy EuroS&P The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
18Abdullah Yasin Nur Efficient Probabilistic Packet Marking for AS Traceback. Search on Bibsonomy ISNCC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
18Morteza Arjmandpanah-Kalat, Dariush Abbasinezhad-Mood, Hamid Reza Mahrooghi, Sobhan Aliabadi Design and performance analysis of an efficient single flow IP traceback technique in the AS level. Search on Bibsonomy Int. J. Commun. Syst. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
18Peppino Fazio, Mauro Tropea, Miroslav Voznák, Floriano De Rango On packet marking and Markov modeling for IP Traceback: A deep probabilistic and stochastic analysis. Search on Bibsonomy Comput. Networks The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
18Ming-Hour Yang, Jia-Ning Luo, Vijayalakshmi Murugesan, S. Mercy Shalinie Hybrid Multilayer Network Traceback to the Real Sources of Attack Devices. Search on Bibsonomy IEEE Access The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
18S. Suresh, N. Sankar Ram Feasible DDoS attack source traceback scheme by deterministic multiple packet marking mechanism. Search on Bibsonomy J. Supercomput. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
18Yuxin Liu 0001, Tian Wang 0001, Shaobo Zhang 0001, Xuxun Liu 0001, Xiao Liu 0007 Artificial intelligence aware and security-enhanced traceback technique in mobile edge computing. Search on Bibsonomy Comput. Commun. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
18Wen Chen 0017, Suchao Xiao, Leijie Liu, Xueqin Jiang 0001, Zhangbin Tang A DDoS attacks traceback scheme for SDN-based smart city. Search on Bibsonomy Comput. Electr. Eng. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
18V. Praveena, S. Karthik, Gwanggil Jeon Hybrid Approach for IP Traceback Analysis in Wireless Networks. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
18V. Praveena, S. Karthik, Gwanggil Jeon Correction to: Hybrid Approach for IP Traceback Analysis in Wireless Networks. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
18K. Ganesh Kumar, Sudhakar Sengan Improved Network Traffic by Attacking Denial of Service to Protect Resource Using Z-Test Based 4-Tier Geomark Traceback (Z4TGT). Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
18Peter Hillmann, Frank Tietze, Gabi Dreo Rodosek Tracemax: A Novel Single Packet IP Traceback Strategy for Data-Flow Analysis. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
18Xiaoou Zhang, Zhao Li, Yujia Zhu, Qingyun Liu, Chao Zheng Traceback: Learning to Identify Website's Landing URLs via Noisy Web Traces Passively. Search on Bibsonomy ICT The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
18Noriaki Yoshiura, Hayata Yano IP Traceback method by OpenFlow. Search on Bibsonomy ICSIM The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
18Shanshan Ren, Nauman Ahmed, Koen Bertels, Zaid Al-Ars GPU accelerated sequence alignment with traceback for GATK HaplotypeCaller. Search on Bibsonomy BMC Genom. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
18Feng Xiao, Qiang Xu ICSTrace: A Malicious IP Traceback Model for Attacking Data of Industrial Control System. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
18Nirvan Tyagi, Ian Miers, Thomas Ristenpart Traceback for End-to-End Encrypted Messaging. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2019 DBLP  BibTeX  RDF
18Tim Schlaich, Hanno Friedrich, Abigail Horn A Gravity-Based Approach to Connect Food Retailers with Consumers for Traceback Models of Food-Borne Diseases. Search on Bibsonomy COMPLEX NETWORKS (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
18Nirvan Tyagi, Ian Miers, Thomas Ristenpart Traceback for End-to-End Encrypted Messaging. Search on Bibsonomy CCS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
18Chunlei Li, Qian Wu, Hewu Li, Jiang Zhou SDN-Ti: A General Solution Based on SDN to Attacker Traceback and Identification in IPv6 Networks. Search on Bibsonomy ICC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
18Konstantina Koliogeorgi, Nils Voss, Sotiria Fytraki, Sotirios Xydis, Georgi Gaydadjiev, Dimitrios Soudris Dataflow Acceleration of Smith-Waterman with Traceback for High Throughput Next Generation Sequencing. Search on Bibsonomy FPL The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
18Zhen Ling, Junzhou Luo, Danni Xu, Ming Yang 0001, Xinwen Fu Novel and Practical SDN-based Traceback Technique for Malicious Traffic over Anonymous Networks. Search on Bibsonomy INFOCOM The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
18Mouna Gassara, Imen Elbouabidi, Faouzi Zarai, Mohammad S. Obaidat, Kuei-Fang Hsiao Deployment and validation of out of band IP traceback approach (OBTA) in wireless mesh network. Search on Bibsonomy Int. J. Commun. Syst. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
18Kamaldeep, Manisha Malik, Maitreyee Dutta Implementation of single-packet hybrid IP traceback for IPv4 and IPv6 networks. Search on Bibsonomy IET Inf. Secur. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
18Sangita Roy, Ashok Singh Sairam Distributed star coloring of network for IP traceback. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
18Hasmukh Patel, Devesh C. Jinwala LPM: A lightweight authenticated packet marking approach for IP traceback. Search on Bibsonomy Comput. Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
18Vijayalakshmi Murugesan, Mercy Shalinie Selvaraj, Ming-Hour Yang HPSIPT: A high-precision single-packet IP traceback scheme. Search on Bibsonomy Comput. Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
18Zihan Wang, Chaoge Liu, Jing Qiu 0002, Zhihong Tian, Xiang Cui, Shen Su Automatically Traceback RDP-Based Targeted Ransomware Attacks. Search on Bibsonomy Wirel. Commun. Mob. Comput. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
18Vijayalakshmi Murugesan, Mercy Shalinie, Ming-Hour Yang Design and analysis of hybrid single packet IP traceback scheme. Search on Bibsonomy IET Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
18Vijayalakshmi Murugesan, Mercy Shalinie Selvaraj UDP based IP traceback for flooding DDoS attack. Search on Bibsonomy Int. Arab J. Inf. Technol. The full citation details ... 2018 DBLP  BibTeX  RDF
18Hasmukh Patel, Devesh Jinwala STF-DM: a sparsely tagged fragmentation with dynamic marking an IP traceback approach. Search on Bibsonomy Int. Arab J. Inf. Technol. The full citation details ... 2018 DBLP  BibTeX  RDF
18Alfonso Iacovazzi, Sanat Sarda, Daniel Frassinelli, Yuval Elovici DropWat: An Invisible Network Flow Watermark for Data Exfiltration Traceback. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
18Abdullah Yasin Nur, Mehmet Engin Tozal Record route IP traceback: Combating DoS attacks and the variants. Search on Bibsonomy Comput. Secur. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
18Jiawei Tang, Anfeng Liu, Jian Zhang 0026, Neal N. Xiong, Zhiwen Zeng, Tian Wang 0001 A Trust-Based Secure Routing Scheme Using the Traceback Approach for Energy-Harvesting Wireless Sensor Networks. Search on Bibsonomy Sensors The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
18Xiaohui Yang, Yue Yu DDoS Attacks Detection and Traceback Method Based on Flow Entropy Algorithm and MPLS Principle. Search on Bibsonomy ICCCS (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
18Sangita Roy, Hardik Chawla, Ashok Singh Sairam IP Traceback in Dynamic Networks. Search on Bibsonomy ISEA-ISAP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
18Hongcheng Tian, Jun Bi The Systematic Survey for IP Traceback Methods. Search on Bibsonomy ICUFN The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
18Le Su, Dinil Mon Divakaran, Vrizlynn L. L. Thing Privacy preserving IP traceback. Search on Bibsonomy ISBA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
18Danni Ren, Wenti Jiang, Huakang Li, Guozi Sun An OpenvSwitch Extension for SDN Traceback. Search on Bibsonomy NSS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
18Xiaoliang Wang 0002, Jianming Jiang, Liang Bai, Baowei Wang SWATS: A Lightweight VANET Anonymous Traceback System Based on Random Superposition Watermarking. Search on Bibsonomy SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
18Alfonso Iacovazzi, Sanat Sarda, Daniel Frassinelli, Yuval Elovici DROPWAT: an Invisible Network Flow Watermark for Data Exfiltration Traceback. Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
18Long Cheng 0005, Dinil Mon Divakaran, Aloysius Wooi Kiak Ang, Wee-Yong Lim, Vrizlynn L. L. Thing FACT: A Framework for Authentication in Cloud-Based IP Traceback. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
18Changqin Huang, Ming Ma, Xiao Liu 0007, Anfeng Liu, Zhengbang Zuo Unequal Probability Marking Approach to Enhance Security of Traceback Scheme in Tree-Based WSNs. Search on Bibsonomy Sensors The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
18Guanyu Tian, Zhenhai Duan, Todd Baumeister, Yingfei Dong A Traceback Attack on Freenet. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
18Pynbianglut Hadem, Dilip Kumar Saikia SMITE: an SDN and MPLS integrated traceback mechanism. Search on Bibsonomy SIN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 473 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license