The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for DDoS with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2000-2002 (26) 2003 (40) 2004 (58) 2005 (94) 2006 (87) 2007 (92) 2008 (96) 2009 (80) 2010 (63) 2011 (56) 2012 (58) 2013 (69) 2014 (85) 2015 (94) 2016 (120) 2017 (165) 2018 (203) 2019 (210) 2020 (226) 2021 (266) 2022 (291) 2023 (318) 2024 (59)
Publication types (Num. hits)
article(1172) data(9) incollection(16) inproceedings(1636) phdthesis(23)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 538 occurrences of 244 keywords

Results
Found 2856 publication records. Showing 2856 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
27Rongfei Zeng, Chuang Lin 0002, Hongkun Yang, Yuanzhuo Wang, Yang Wang 0018, Peter D. Ungsunan A Novel Cookie-Based DDoS Protection Scheme and its Performance Analysis. Search on Bibsonomy AINA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cookie-based, DDoS attacks, queueing network model
27Shunsuke Oshima, Arata Hirakawa, Takuo Nakashima, Toshinori Sueyoshi DoS/DDoS Detection Scheme Using Statistical Method Based on the Destination Port Number. Search on Bibsonomy IIH-MSP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF DoS/DDos, Detection Scheme, Chi-square Method, Destination Port Number
27Chu-Hsing Lin, Jung-Chun Liu, Hsun-Chi Huang, Tsung-Che Yang Using Adaptive Bandwidth Allocation Approach to Defend DDoS Attacks. Search on Bibsonomy MUE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF bandwidth, network simulator, priority queue, DDoS attack, IP spoofing, DoS attack
27Zhaoyang Qu, Chunfeng Huang A Fractional-Step DDoS Attack Source Traceback Algorithm Based on Autonomous System. Search on Bibsonomy IIH-MSP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF DDoS Attack, IP Traceback, Packet Marking, AS
27Tao Peng 0002, Christopher Leckie, Kotagiri Ramamohanarao Survey of network-based defense mechanisms countering the DoS and DDoS problems. Search on Bibsonomy ACM Comput. Surv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF DNS reflector attack, bandwidth attack, resource management, DoS, DDoS, Botnet, Internet security, IP traceback, IRC, IP spoofing, SYN flood, VoIP security
27Chun-Hsin Wang, Chang-Wu Yu 0001, Chiu-Kuo Liang, Kun-Ming Yu, Wen Ouyang, Ching-Hsien Hsu, Yu-Guang Chen Tracers placement for IP traceback against DDoS attacks. Search on Bibsonomy IWCMC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF IP tracerback, tracers, DDoS
26Sunay Tripathi, Nicolas Droux, Thirumalai Srinivasan, Kais Belgaied, Venu Iyer Crossbow: a vertically integrated QoS stack. Search on Bibsonomy WREN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF crossbow, ddos, QoS, performance, classification, networking, flows
26Yoohee Cho, Koohong Kang, Ikkyun Kim, Kitae Jeong Baseline Traffic Modeling for Anomalous Traffic Detection on Network Transit Points. Search on Bibsonomy APNOMS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Intrusion Detection, DDoS attack, Anomaly
26Xicheng Lu, Gaofeng Lü, Peidong Zhu, Yijiao Chen MASK: An efficient mechanism to extend inter-domain IP spoofing preventions. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF IP spoofing prevention, BGP, DDoS
26Zhenhai Duan, Xin Yuan 0001, Jaideep Chandrashekar Controlling IP Spoofing through Interdomain Packet Filters. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Infrastructure Protection, Routing Protocols, BGP, DDoS, Network-level security and protection, IP Spoofing
26Igor V. Kotenko, Alexander Ulanov Packet Level Simulation of Cooperative Distributed Defense against Internet Attacks. Search on Bibsonomy PDP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Cooperative distributed defence, Simulation, DDoS, Network attacks
26Bo-Chao Cheng, Huan Chen 0002, Guo-Tan Liao A Novel Marking Probability Distribution Using Probability Propagation in Hierarchical WSN. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF DoS/DDoS, WSN, Traceback, PPM, Convergence time
26Jun-Sang Park, Myung-Sup Kim Design and Implementation of an SNMP-Based Traffic Flooding Attack Detection System. Search on Bibsonomy APNOMS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Traffic Flooding Attack, DoS/DDoS, Detection Time, Detection System, SNMP, MIB, Detection Algorithm
26Ming-Yang Su, Kai-Chi Chang, Hua-Fu Wei, Chun-Yuen Lin Feature Weighting and Selection for a Real-Time Network Intrusion Detection System Based on GA with KNN. Search on Bibsonomy ISI Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF NIDS (Network Intrusion Detection System), DoS/DDoS Attacks, KNN (k-Nearest Neighbor), Genetic Algorithm, Network Security
26Haining Wang, Cheng Jin, Kang G. Shin Defense against spoofed IP traffic using hop-count filtering. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF host-based, DDoS attacks, IP spoofing, hop-count
26Chee-Wei Tan 0001, Dah-Ming Chiu, John C. S. Lui, David K. Y. Yau A Distributed Throttling Approach for Handling High Bandwidth Aggregates. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF network security, Resource management, DDoS attacks
26Julien Bourgeois, Abdoul Karim Ganame, Igor V. Kotenko, Alexander Ulanov Software Environment for Simulation and Evaluation of a Security Operation Center. Search on Bibsonomy IF&GIS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Security modeling and simulation, intrusion detection, DDoS, infrastructure security
26Vladimir V. Shakhov, Hyunseung Choo On Modeling Counteraction against TCP SYN Flooding. Search on Bibsonomy ICOIN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF TCP SYN flooding, defense mechanism, DDoS attack
26Wei Chen, Dit-Yan Yeung Throttling spoofed SYN flooding traffic at the source. Search on Bibsonomy Telecommun. Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Hash-based detection, CUSUM, Bloom filter, DDoS, IP spoofing, SYN flooding
26Min Cai, Kai Hwang 0001, Yu-Kwong Kwok, Shanshan Song, Yu Chen 0002 Collaborative Internet Worm Containment. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF network security, anomaly detection, distributed hash tables, DHT, overlay networks, distributed denial-of-service, DDoS attacks, Internet worms, signature generation
26Parminder Chhabra, Ajita John, Huzur Saran PISA: Automatic Extraction of Traffic Signatures. Search on Bibsonomy NETWORKING The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Traffic Clusters, Security, Signatures, Worms, DDoS
26Gitae Kim, Tony J. Bogovic, Dana Chee ACtive edge-Tagging (ACT): An Intruder Identification & Isolation Scheme in Active Networks. Search on Bibsonomy ISCC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Intruder Identification & Isolation, Distributed Denial of Service (DDoS) Attacks, Active (or Programmable) Networks, Network Security, Traffic Monitoring
23Amandeep Kaur, C. Rama Krishna, Nilesh Vishwasrao Patil K-DDoS-SDN: A distributed DDoS attacks detection approach for protecting SDN environment. Search on Bibsonomy Concurr. Comput. Pract. Exp. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
23Ziming Zhao 0008, Zhaoxuan Li, Zhihao Zhou, Jiongchi Yu, Zhuoxue Song, Xiaofei Xie, Fan Zhang 0010, Rui Zhang 0016 DDoS family: A novel perspective for massive types of DDoS attacks. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
23Praveen Shukla, C. Rama Krishna, Nilesh Vishwasrao Patil EIoT-DDoS: embedded classification approach for IoT traffic-based DDoS attacks. Search on Bibsonomy Clust. Comput. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
23Noe Marcelo Yungaicela-Naula, César Vargas Rosales, Jesús Arturo Pérez Díaz, Eduardo Jacob, Carlos Martinez-Cagnazzo Physical Assessment of an SDN-Based Security Framework for DDoS Attack Mitigation: Introducing the SDN-SlowRate-DDoS Dataset. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Naziya Aslam, Shashank Srivastava, M. M. Gore ONOS DDoS Defender: A Comparative Analysis of Existing DDoS Attack Datasets using Ensemble Approach. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Hafiz Amaad, Hajrah Mughal Experimenting Ensemble Machine Learning for DDoS Classification: Timely Detection of DDoS Using Large Scale Dataset. Search on Bibsonomy ICACS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Pratheeksha Prathap, Subhasri Duttagupta AI-Enabled Fast Detection of DDoS and Adversary DDoS Attacks in SDN. Search on Bibsonomy ICCCNT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Onur Polat Yazılım tabanlı araçsal ağlara yönelik gerçekleştirilen DDoS saldırılarının derin öğrenme tabanlı gerçek zamanlı tespiti (Deep learning based real-time detection of DDoS attacks on software-defined based vehicular networks) Search on Bibsonomy 2023   RDF
23Clément Boin Détection d'attaques DDoS dans le contexte d'un fournisseur cloud de grande envergure. (DDoS attack detection in the context of a large-scale cloud service provider). Search on Bibsonomy 2023   RDF
23Abdenacer Nafir, Smaine Mazouzi, Salim Chikhi A New Information-Based Heuristic for Distributed DDoS Detection and Mitigation: Distributed and Collaborative DDoS Detection. Search on Bibsonomy Int. J. Organ. Collect. Intell. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Nilesh Vishwasrao Patil, C. Rama Krishna, Krishan Kumar 0001 KS-DDoS: Kafka streams-based classification approach for DDoS attacks. Search on Bibsonomy J. Supercomput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23T. Yerriswamy, Murtugudde Gururaj Signature-based Traffic Classification for DDoS Attack Detection and Analysis of Mitigation for DDoS Attacks using Programmable Commodity Switches. Search on Bibsonomy Int. J. Perform. Eng. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Nilesh Vishwasrao Patil, C. Rama Krishna, Krishan Kumar 0001 SSK-DDoS: distributed stream processing framework based classification system for DDoS attacks. Search on Bibsonomy Clust. Comput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Leigang Sun, Jin Zhang HIL-DDoS: A DDoS Attack Simulation System Based on Hardware-In-the-Loop. Search on Bibsonomy AISS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Ramin Mohammadi Quality of service and DDos attacks detection improvement with deep flows discrimination in SDNS (SDN\'de derin akış ayrımcılığı ile hizmet kalitesi ve DDoS saldırılarının tespitinin iyileştirilmesi) Search on Bibsonomy 2022   RDF
23Bhagyashri Tushir, Yogesh Dalal, Behnam Dezfouli, Yuhong Liu A Quantitative Study of DDoS and E-DDoS Attacks on WiFi Smart Home Devices. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
23Snehi Manish, Abhinav Bhandari Vulnerability retrospection of security solutions for software-defined Cyber-Physical System against DDoS and IoT-DDoS attacks. Search on Bibsonomy Comput. Sci. Rev. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
23Daniel Kopp, Christoph Dietzel, Oliver Hohlfeld DDoS Never Dies? An IXP Perspective on DDoS Amplification Attacks. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
23Daniel Kopp, Christoph Dietzel, Oliver Hohlfeld DDoS Never Dies? An IXP Perspective on DDoS Amplification Attacks. Search on Bibsonomy PAM The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
23Nilesh Vishwasrao Patil, C. Rama Krishna, Krishan Kumar 0001 S-DDoS: Apache spark based real-time DDoS detection system. Search on Bibsonomy J. Intell. Fuzzy Syst. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
23Mohamed Haddadi, Rachid Beghdad A Confidence Interval Based Filtering Against DDoS Attack in Cloud Environment: A Confidence Interval Against DDoS Attack in the Cloud. Search on Bibsonomy Int. J. Inf. Secur. Priv. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
23Shi Dong 0001, Mudar Sarem DDoS Attack Detection Method Based on Improved KNN With the Degree of DDoS Attack in Software-Defined Networks. Search on Bibsonomy IEEE Access The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
23Derya Erhan, Emin Anarim Istatistiksel Yöntemler ile DDoS Saldırı Tespiti DDoS Detection Using Statistical Methods. Search on Bibsonomy SIU The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
23Kairo Tavares, Tiago Coelho Ferreto DDoS on Sketch: Spoofed DDoS attack defense with programmable data planes using sketches in SDN. Search on Bibsonomy SBRC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
23Franks González-Landero, Iván García-Magariño, Raquel Lacuesta, Jaime Lloret 0001 ABS-DDoS: An Agent-Based Simulator about Strategies of Both DDoS Attacks and Their Defenses, to Achieve Efficient Data Forwarding in Sensor Networks and IoT Devices. Search on Bibsonomy Wirel. Commun. Mob. Comput. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
23Pierre-Edouard Fabre Using network resources to mitigate volumetric DDoS. (Utiliser les ressources réseaux pour atténuer les attaques DDoS volumétriques). Search on Bibsonomy 2018   RDF
23Jhum Swain, Binod Kumar Pattanayak, Bibudhendu Pati A New Approach for DDoS attacks to discriminate the attack level and provide security for DDoS nodes in MANET. Search on Bibsonomy Int. J. Commun. Networks Inf. Secur. The full citation details ... 2017 DBLP  BibTeX  RDF
23Neelam Dayal, Shashank Srivastava Analyzing behavior of DDoS attacks to identify DDoS detection features in SDN. Search on Bibsonomy COMSNETS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
23Opeyemi A. Osanaiye, Kim-Kwang Raymond Choo, Mqhele E. Dlodlo Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework. Search on Bibsonomy J. Netw. Comput. Appl. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
23Yunhe Cui, Lianshan Yan, Saifei Li, Huanlai Xing, Wei Pan, Jian Zhu, Xiaoyang Zheng SD-Anti-DDoS: Fast and efficient DDoS defense in software-defined networks. Search on Bibsonomy J. Netw. Comput. Appl. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
23Jesus David Terrazas Gonzalez, Witold Kinsner Zero-Crossing Analysis of Lévy Walks and a DDoS Dataset for Real-Time Feature Extraction: Composite and Applied Signal Analysis for Strengthening the Internet-of-Things Against DDoS Attacks. Search on Bibsonomy Int. J. Softw. Sci. Comput. Intell. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
23Kubra Kalkan-Cakmakci Filtering based defense mechanisms against ddos attacks for core networks (Çekirdek ağlarda ddos saldırılarına karşı filtreleme tabanlı savunma mekanizmaları) Search on Bibsonomy 2016   RDF
23Gaurav Somani 0001, Abhinav Johri, Mohit Taneja, Utkarsh Pyne, Manoj Singh Gaur, Dheeraj Sanghi DARAC: DDoS Mitigation Using DDoS Aware Resource Allocation in Cloud. Search on Bibsonomy ICISS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
23Anteneh Girma, Moses Garuba, Jiang Li 0009, Chunmei Liu Analysis of DDoS Attacks and an Introduction of a Hybrid Statistical Model to Detect DDoS Attacks on Cloud Computing Environment. Search on Bibsonomy ITNG The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
23Tarun Karnwal, Sivakumar Thandapanii, Gnanasekaran Aghila A Filter Tree Approach to Protect Cloud Computing against XML DDoS and HTTP DDoS Attack. Search on Bibsonomy ISI The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Pierre Borgnat, Patrice Abry, Guillaume Dewaele, Antoine Scherrer, Nicolas Larrieu, Philippe Owezarski, Yann Labit, Laurent Gallon, Julien Aussibal Une caractérisation non gaussienne et à longue mémoire du trafic Internet et de ses anomalies: validation expérimentale et application à la détection d'attaque de DDoS/Non Gaussian Long Memory Model for Internet Traffic: Experimental Validation and Application to DDoS Detection. Search on Bibsonomy Ann. des Télécommunications The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Yoon-Ju Kook, Yong-Ho Kim, Jeom-Goo Kim, Kiu-Nam Kim A detection model based on statistical against DDoS attack. Search on Bibsonomy ICHIT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
22Markus Goldstein, Matthias Reif, Armin Stahl, Thomas M. Breuel High performance traffic shaping for DDoS mitigation. Search on Bibsonomy CoNEXT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Anjali Sardana, Ramesh Chandra Joshi Autonomous dynamic honeypot routing mechanism for mitigating DDoS attacks in DMZ. Search on Bibsonomy ICON The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Ashley Chonka, Soon Keow Chong, Wanlei Zhou 0001, Yang Xiang 0001 Multi-Core Defense System (MSDS) for Protecting Computer Infrastructure against DDoS Attacks. Search on Bibsonomy PDCAT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Vrizlynn L. L. Thing, Morris Sloman, Naranker Dulay Non-intrusive IP traceback for DDoS attacks. Search on Bibsonomy AsiaCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF distributed denial of service attacks, IP traceback
22Anjali Sardana, Krishan Kumar 0001, Ramesh Chandra Joshi Detection and Honeypot Based Redirection to Counter DDoS Attacks in ISP Domain. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Fengxiang Zhang, Shunji Abe A Heuristic DDoS Flooding Attack Detection Mechanism Analyses based on the Relationship between Input and Output Traffic Volumes. Search on Bibsonomy ICCCN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Jie Yu 0008, Zhoujun Li 0001, Huowang Chen, Xiaoming Chen A Detection and Offense Mechanism to Defend Against Application Layer DDoS Attacks. Search on Bibsonomy ICNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Michael Walfish, Mythili Vutukuru, Hari Balakrishnan, David R. Karger, Scott Shenker DDoS defense by offense. Search on Bibsonomy SIGCOMM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF bandwidth, DoS attack, currency
22Martín Casado, Pei Cao, Aditya Akella, Niels Provos Flow-Cookies: Using Bandwidth Amplification to Defend Against DDoS Flooding Attacks. Search on Bibsonomy IWQoS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22S. Kumar, R. Valdez, O. Gomez, S. Bose Survivability Evaluation of Wireless Sensor Network under DDoS Attack. Search on Bibsonomy ICN/ICONS/MCL The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Sung Ki Kim, Byoung-Joon Min Inter-domain Security Management to Protect Legitimate User Access from DDoS Attacks. Search on Bibsonomy ICCSA (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Hyung-Woo Lee Lightweight Wireless Intrusion Detection Systems Against DDoS Attack. Search on Bibsonomy ICCSA (5) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Keisuke Ishibashi, Tsuyoshi Toyono, Hirotaka Matsuoka, Katsuyasu Toyama, Masahiro Ishino, Chika Yoshimura, Takehiro Ozaki, Yuichi Sakamoto, Ichiro Mizukoshi Measurement of DNS Traffic Caused by DDoS Attacks. Search on Bibsonomy SAINT Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22Yu-Kwong Kwok, Rohit Tripathi 0002, Yu Chen 0002, Kai Hwang 0001 HAWK: Halting Anomalies with Weighted Choking to Rescue Well-Behaved TCP Sessions from Shrew DDoS Attacks. Search on Bibsonomy ICCNMC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22Wei Ren 0002, Hai Jin 0001, Tenghong Liu Congestion Targeted Reduction of Quality of Service DDoS Attacking and Defense Scheme in Mobile Ad Hoc Networks. Search on Bibsonomy ISM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22Fang-Yie Leu, Wei-Jie Yang Intrusion Detection with CUSUM for TCP-Based DDoS. Search on Bibsonomy EUC Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22Onur Demir, Kanad Ghose Real-Time Protection against DDoS Attacks Using Active Gateways. Search on Bibsonomy ICDCS Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22Song Huang, Ling Zhang 0005, Shouling Dong A Behavior-Based Ingress Rate-Limiting Mechanism Against DoS/DDoS Attacks. Search on Bibsonomy ICICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22Angelos D. Keromytis, Vishal Misra, Dan Rubenstein SOS: an architecture for mitigating DDoS attacks. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
22Christos Siaterlis, Basil S. Maglaris Detecting DDoS attacks with passive measurement based heuristics. Search on Bibsonomy ISCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
22Dong Su Nam, Sangjin Jeong, Woonyon Kim, Sang-Hun Lee, Do-Hoon Lee, Eung Ki Park A Cost-Optimized Detection System Location Scheme for DDoS Attack. Search on Bibsonomy PDCAT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
22Jeenhong Park, Jin-Hwan Choi, Dae-Wha Seo The Packet Marking and the Filtering Protocol to Counter Against the DDoS Attacks. Search on Bibsonomy PDCAT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
22Jaeil Lee, Minsoo Lee, Jabeom Gu, Seoklae Lee, Sehyun Park, JooSeok Song New Adaptive Trust Models against DDoS: Back-Up CA and Mesh PKI. Search on Bibsonomy Human.Society@Internet 2003 The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
22K. T. Law, John C. S. Lui, David K. Y. Yau You Can Run, But You Can't Hide: An Effective Methodology to Traceback DDoS Attackers. Search on Bibsonomy MASCOTS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
22Daniel F. Sterne, Kelly Djahandari, Ravindra Balupari, William La Cholter, Bill Babson, Brett Wilson, Priya Narasimhan, Andrew Purtell Active Network Based DDoS Defense. Search on Bibsonomy DANCE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
20Dmitry G. Korzun, Andrei V. Gurtov A local equilibrium model for P2P resource ranking. Search on Bibsonomy SIGMETRICS Perform. Evaluation Rev. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Bill Lin 0001, Jun (Jim) Xu, Nan Hua, Hao Wang 0006, Haiquan (Chuck) Zhao A randomized interleaved DRAM architecture for the maintenance of exact statistics counters. Search on Bibsonomy SIGMETRICS Perform. Evaluation Rev. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Sipat Triukose, Zhihua Wen, Michael Rabinovich Content delivery networks: how big is big enough? Search on Bibsonomy SIGMETRICS Perform. Evaluation Rev. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Alma Riska, Erik Riedel Evaluation of disk-level workloads at different time scales. Search on Bibsonomy SIGMETRICS Perform. Evaluation Rev. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20David Brumley, Cody Hartwig, Zhenkai Liang, James Newsome, Dawn Xiaodong Song, Heng Yin 0001 Automatically Identifying Trigger-based Behavior in Malware. Search on Bibsonomy Botnet Detection The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Mahboobeh Soleimani, Ali A. Ghorbani 0001 Critical Episode Mining in Intrusion Detection Alerts. Search on Bibsonomy CNSR The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Episode mining, Critical episode, Alert mining, Multistage attack, Attack scenario
20Aliya Awais, Muddassar Farooq, Muhammad Younus Javed Attack analysis & bio-inspired security framework for IPMultimedia subsystem. Search on Bibsonomy GECCO (Companion) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF network security, artificial immune systems, ip multimedia subsystem
20Aliya Awais, Muddassar Farooq, Muhammad Younus Javed Attack analysis & bio-inspired security framework for IP multimedia subsystem. Search on Bibsonomy GECCO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF network, artificial immune systems, IP multimedia subsystem
20Hongli Luo, Mei-Ling Shyu Provision of Quality of Service with Router Support. Search on Bibsonomy ISM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Ming-Hour Yang, Chien-Si Chiu, Shiuhpyng Shieh Tracing Mobile Attackers in Wireless Ad-Hoc Network. Search on Bibsonomy ICIW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Ruiliang Chen, Jung-Min Park 0001, Randolph Marchany A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Network-level security and protection
20Antoine Scherrer, Nicolas Larrieu, Philippe Owezarski, Pierre Borgnat, Patrice Abry Non-Gaussian and Long Memory Statistical Characterizations for Internet Traffic with Anomalies. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Traffic statistical modeling, non-Gaussian long-range dependent process, flash crowd, DoS attack
20Fan Zhao, V. Rao Vemuri, Shyhtsun Felix Wu, Fei Xue, S. J. Ben Yoo Interactive Informatics on Internet Infrastructure. Search on Bibsonomy Integrated Network Management The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Kai Hwang 0001 Recent Advances in Trusted Grids and Peer-to-Peer Computing Systems. Search on Bibsonomy IPDPS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Dan Peng, Zhicai Shi, Longming Tao, Wu Ma Enhanced and Authenticated Deterministic Packet Marking for IP Traceback. Search on Bibsonomy APPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Fareed Zaffar, Gershon Kedem A Service Architecture for Countering Distributed Denial of Service Attacks. Search on Bibsonomy AINA Workshops (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 2856 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license