The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Traceback with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1982-2001 (19) 2002 (15) 2003 (23) 2004 (29) 2005 (47) 2006 (46) 2007 (23) 2008 (37) 2009 (27) 2010 (21) 2011 (18) 2012 (19) 2013 (20) 2014 (21) 2015 (17) 2016 (21) 2017-2018 (25) 2019-2020 (20) 2021-2022 (17) 2023-2024 (8)
Publication types (Num. hits)
article(153) book(1) incollection(2) inproceedings(317)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 195 occurrences of 85 keywords

Results
Found 473 publication records. Showing 473 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
18Jia-Ning Luo, Ming-Hour Yang Improved Single Packet Traceback Scheme with Bloom Filters. Search on Bibsonomy IoTaaS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
18Mouna Gassara, Imen El Bouabidi, Faouzi Zarai "Private and Secure ICMP Message" Solution for IP Traceback in Wireless Mesh Network. Search on Bibsonomy AICCSA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
18Samant Saurabh, Ashok Singh Sairam Increasing Accuracy and Reliability of IP Traceback for DDoS Attack Using Completion Condition. Search on Bibsonomy Int. J. Netw. Secur. The full citation details ... 2016 DBLP  BibTeX  RDF
18Ping Wang 0007, Hui-Tang Lin, Tzy Shiah Wang An improved ant colony system algorithm for solving the IP traceback problem. Search on Bibsonomy Inf. Sci. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Cheng Lei, Hongqi Zhang, Yi Sun, Xuehui Du, Xudong Jia Multilayer collaborative traceback technique based on net-flow fingerprint. Search on Bibsonomy Int. J. Embed. Syst. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Shui Yu 0001, Wanlei Zhou 0001, Song Guo 0001, Minyi Guo A Feasible IP Traceback Framework through Dynamic Deterministic Packet Marking. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Edans Flavius de Oliveira Sandes, Guillermo Miranda, Xavier Martorell, Eduard Ayguadé, George Teodoro, Alba Cristina Magalhaes Alves de Melo CUDAlign 4.0: Incremental Speculative Traceback for Exact Chromosome-Wide Alignment in GPU Clusters. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Matthias R. Brust, Ankunda R. Kiremire A Concise Network-Centric Survey of IP Traceback Schemes based on Probabilistic Packet Marking. Search on Bibsonomy CoRR The full citation details ... 2016 DBLP  BibTeX  RDF
18Rabia Latif, Haider Abbas, Seemab Latif, Ashraf Masood Distributed Denial of Service Attack Source Detection Using Efficient Traceback Technique (ETT) in Cloud-Assisted Healthcare Environment. Search on Bibsonomy J. Medical Syst. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Anfeng Liu, Xiao Liu 0007, Yuxin Liu 0001 A comprehensive analysis for fair probability marking based traceback approach in WSNs. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Abdulghani Ali Ahmed, Ali Safa Sadiq, Mohamad Fadli Bin Zolkipli Traceback model for identifying sources of distributed attacks in real time. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Monowar H. Bhuyan, D. K. Bhattacharyya, Jugal K. Kalita E-LDAT: a lightweight system for DDoS flooding attack detection and IP traceback using extended entropy metric. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Long Cheng 0005, Dinil Mon Divakaran, Wee-Yong Lim, Vrizlynn L. L. Thing Opportunistic Piggyback Marking for IP Traceback. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Karanpreet Singh, Paramvir Singh, Krishan Kumar 0001 A systematic review of IP traceback schemes for denial of service attacks. Search on Bibsonomy Comput. Secur. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Anfeng Liu, Xiao Liu 0007, Jun Long A Trust-Based Adaptive Probability Marking and Storage Traceback Scheme for WSNs. Search on Bibsonomy Sensors The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Magdy M. Fadel, Ali I. Eldesoky, Amira Y. Haikel, Labib M. Labib A Low-Storage Precise IP Traceback Technique Based on Packet Marking and Logging. Search on Bibsonomy Comput. J. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Xiaoqiang Xu, Jing Zhang 0015, Qianmu Li Equalized Interval Centroid Based Watermarking Scheme for Stepping Stone Traceback. Search on Bibsonomy DSC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Vahid Aghaei Foroushani, Nur Zincir-Heywood Autonomous system based flow marking scheme for IP-Traceback. Search on Bibsonomy NOMS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Ikbel Daly, Faouzi Zarai, Mohammad S. Obaidat, Kuei-Fang Hsiao, Lotfi Kamoun HITH: Hybrid IP Traceback for Heterogeneous Wireless Networks. Search on Bibsonomy WINSYS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Mouna Gassara, Faouzi Zarai Secret Zeckendorf number solution for IP traceback in Wireless Mesh Networks. Search on Bibsonomy ATSIP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Reijo M. Savola, Pekka Savolainen, Jarno Salonen Towards security metrics-supported IP traceback. Search on Bibsonomy ECSA Workshops The full citation details ... 2016 DBLP  BibTeX  RDF
18Brian Cusack, Zhuang Tian, Ar Kar Kyaw Identifying DOS and DDOS Attack Origin: IP Traceback Methods Comparison and Evaluation for IoT. Search on Bibsonomy InterIoT/SaSeIoT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Zhiming Zhang, Ping Li, Xiaoyong Xiong, Changgen Jiang Non-repeatedly marking traceback model for wireless sensor networks. Search on Bibsonomy IET Wirel. Sens. Syst. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Majeed Alajeely, Robin Doss, Asma'a Ahmad, Vicky H. Mak-Hau Catabolism attack and Anabolism defense: A novel attack and traceback mechanism in Opportunistic Networks. Search on Bibsonomy Comput. Commun. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Ying Liu 0024, Gang Ren 0003, Jianping Wu, Shenglin Zhang, Lin He 0004, Yihao Jia Building an IPv6 address generation and traceback system with NIDTGA in Address Driven Network. Search on Bibsonomy Sci. China Inf. Sci. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Zhiming Zhang, Ping Li, Fuying Wu, Jiangang Deng Double edge-based traceback for wireless sensor networks. Search on Bibsonomy Int. J. Commun. Networks Distributed Syst. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Zhen Ling, Junzhou Luo, Kui Wu 0001, Wei Yu 0002, Xinwen Fu TorWard: Discovery, Blocking, and Traceback of Malicious Traffic Over Tor. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Guang Yao, Jun Bi, Athanasios V. Vasilakos Passive IP Traceback: Disclosing the Locations of IP Spoofers From Path Backscatter. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Xinyuan Wang 0005, Douglas S. Reeves Traceback and Anonymity Search on Bibsonomy 2015   DOI  RDF
18Mouna Gassara, Faouzi Zarai, Ikbel Daly, Mohammad S. Obaidat, Kuei-Fang Hsiao A new scheme for proactive out of band signaling solution for IP traceback in Wireless Mesh Network. Search on Bibsonomy CITS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Marion Vasseur, Xiuzhen Chen, Rida Khatoun, Ahmed Serhrouchni Survey on packet marking fields and information for IP traceback. Search on Bibsonomy SSIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Mouna Gassara, Imen El Bouabidi, Faouzi Zarai, Mohammad S. Obaidat All-in-one binary word solution for IP traceback in Wireless Mesh Network. Search on Bibsonomy ICC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Vahid Aghaei Foroushani, Nur Zincir-Heywood Probabilistic flow marking for IP traceback (PFM). Search on Bibsonomy RNDM@WMNC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Marion Vasseur, Rida Khatoun, Ahmed Serhrouchni Survey on packet marking fields and information for IP traceback. Search on Bibsonomy CFIP/NOTERE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Anfeng Liu, Xiao Liu 0007, Jun Long Adaptive probability marking traceback scheme to enhance security in wireless sensor networks. Search on Bibsonomy ICICS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Majeed Alajeely, Asma'a Ahmad, Robin Doss Malicious Node Traceback in Opportunistic Networks Using Merkle Trees. Search on Bibsonomy DSDIS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Vahid Aghaei Foroushani, Nur Zincir-Heywood Deterministic flow marking for IPv6 traceback (DFM6). Search on Bibsonomy CNSM The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Anatolii Balyk, Uliana Iatsykovska, Mikolaj P. Karpinski, Yuliia Khokhlachova, Aigul Shaikhanova, Lesia Korkishko A survey of modern IP traceback methodologies. Search on Bibsonomy IDAACS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Peter Hillmann, Frank Tietze, Gabi Dreo Rodosek Tracemax: A novel single packet IP traceback strategy for data-flow analysis. Search on Bibsonomy LCN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Vijayalakshmi Murugesan, S. Mercy Shalinie Single Packet ICMP Traceback Technique using Router Interface. Search on Bibsonomy J. Inf. Sci. Eng. The full citation details ... 2014 DBLP  BibTeX  RDF
18Ankunda R. Kiremire, Matthias R. Brust, Vir V. Phoha Using network motifs to investigate the influence of network topology on PPM-based IP traceback schemes. Search on Bibsonomy Comput. Networks The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Samant Saurabh, Ashok Singh Sairam ICMP based IP traceback with negligible overhead for highly distributed reflector attack using bloom filters. Search on Bibsonomy Comput. Commun. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Yulong Wang, Rui Sun An IP-Traceback-based Packet Filtering Scheme for Eliminating DDoS Attacks. Search on Bibsonomy J. Networks The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Ho-Seok Kang, Tran Tin, Sung-Ryul Kim Design and experiments of new IP traceback method based on offline analysis. Search on Bibsonomy Comput. Syst. Sci. Eng. The full citation details ... 2014 DBLP  BibTeX  RDF
18Eun-Hee Jeong, Byung kwan Lee An IP Traceback Protocol using a Compressed Hash Table, a Sinkhole Router and Data Mining based on Network Forensics against Network Attacks. Search on Bibsonomy Future Gener. Comput. Syst. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Mehran S. Fallah, Nafiseh Kahani TDPF: a traceback-based distributed packet filter to mitigate spoofed DDoS attacks. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Ning Lu, Yulong Wang, Sen Su, Fangchun Yang A novel path-based approach for single-packet IP traceback. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Mohammed N. Alenezi, Martin J. Reed Uniform DoS traceback. Search on Bibsonomy Comput. Secur. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Shui Yu 0001, Keshav Sood, Yong Xiang 0001 An Effective and Feasible Traceback Scheme in Mobile Internet Environment. Search on Bibsonomy IEEE Commun. Lett. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Ming-Hour Yang, Ming-Chien Yang, Jia-Ning Luo, Wei-Chun Hsu High accuracy and low storage hybrid IP traceback. Search on Bibsonomy CITS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Jérôme François, Olivier Festor Anomaly traceback using software defined networking. Search on Bibsonomy WIFS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Hui Li, Haiyong Luo, Fang Zhao 0003, Xinrong Li TACO: A Traceback Algorithm Based on Ant Colony Optimization for Geomagnetic Positioning. Search on Bibsonomy CWSN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Gaurav D. Barokar, V. S. Mahalle Identification of the Real Source of DDOS Attack by FDPM in IP Traceback System. Search on Bibsonomy EMS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Kayoko Iwamoto, Masakazu Soshi, Takashi Satoh An Efficient and Adaptive IP Traceback Scheme. Search on Bibsonomy SOCA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Ankunda R. Kiremire, Matthias R. Brust, Vir V. Phoha Topology-dependent performance of attack graph reconstruction in PPM-based IP traceback. Search on Bibsonomy CCNC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Andreas Papalambrou, Kyriakos Stefanidis, John V. Gialelis, Dimitrios N. Serpanos Detection, traceback and filtering of denial of service attacks in networked embedded systems. Search on Bibsonomy WESS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18M. Hamedi-Hamzehkolaie, Reza Sanei, Chi Chen 0001, Xue Tian, Masoud Khalil Nezhad Bee-based IP traceback. Search on Bibsonomy FSKD The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Vahid Aghaei Foroushani, Nur Zincir-Heywood TDFA: Traceback-Based Defense against DDoS Flooding Attacks. Search on Bibsonomy AINA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Qiao Yan, Nan Lu, Tu-Wen Ning, Xi-Yan Yao, Bao-Guang Li IP Traceback Algorithm Based on Deterministic Linear Network Coding. Search on Bibsonomy CIS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Xiaolei Wang 0003, Jie He 0002, Yuexiang Yang A Collaborative Traceback against P2P Botnet Using Information Sharing and Correlation Analysis. Search on Bibsonomy CyberC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Alex Doyal, Justin Zhan Triple DoS: DDoS defence and traceback. Search on Bibsonomy Int. J. Inf. Priv. Secur. Integr. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18S. Periyasamy, K. Duraiswamy A proficient Traceback Approach using Provincial Locality Aspects to Eliminate Denial of Service Attacks. Search on Bibsonomy J. Comput. Sci. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Yulong Wang, Ji Ren WHIT: A More Efficient Hybrid Method for Single-Packet IP Traceback Using Walsh Matrix and Router Degree Distribution. Search on Bibsonomy IEICE Trans. Commun. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Ho-Seok Kang, Sung-Ryul Kim A New Logging-based IP Traceback Approach using Data Mining Techniques. Search on Bibsonomy J. Internet Serv. Inf. Secur. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Vahid Aghaei Foroushani, Nur Zincir-Heywood IP traceback through (authenticated) deterministic flow marking: an empirical evaluation. Search on Bibsonomy EURASIP J. Inf. Secur. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Young Hwan Lim, Dong Hwi Lee, Won Hyung Park, Kwang Ho Kook Detection and Traceback of Illegal Users based on Anonymous Network in BitTorrent Environment. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Xiaogang Wang, Ming Yang 0001, Junzhou Luo A novel sequential watermark detection model for efficient traceback of secret network attack flows. Search on Bibsonomy J. Netw. Comput. Appl. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Guangwu Hu, Ke Xu 0002, Jianping Wu, Yong Cui 0001, Fan Shi A general framework of source address validation and traceback for IPv4/IPv6 transition scenarios. Search on Bibsonomy IEEE Netw. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Wei Yu 0002, Xinwen Fu, Erik Blasch, Khanh D. Pham, Dan Shen, Genshe Chen, Chao Lu 0002 On Effectiveness of Hopping-Based Spread Spectrum Techniques for Network Forensic Traceback. Search on Bibsonomy Int. J. Networked Distributed Comput. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Kichang Kim, Jeankyung Kim, Jinsoo Hwang IP traceback with sparsely-tagged fragment marking scheme under massively multiple attack paths. Search on Bibsonomy Clust. Comput. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Mohammed Alenezi, Martin J. Reed Selective record route DoS traceback. Search on Bibsonomy CRiSIS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Björn Stelte ISP traceback - Attack path detection. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Sangita Roy, Anurag Singh 0001, Ashok Singh Sairam IP traceback in star colored networks. Search on Bibsonomy COMSNETS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Guanyu Tian, Zhenhai Duan, Todd Baumeister, Yingfei Dong Thwarting traceback attack on Freenet. Search on Bibsonomy GLOBECOM The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Shui Yu 0001, Wanlei Zhou 0001, Song Guo 0001, Minyi Guo A dynamical Deterministic Packet Marking scheme for DDoS traceback. Search on Bibsonomy GLOBECOM The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Guanyu Tian, Zhenhai Duan, Todd Baumeister, Yingfei Dong A traceback attack on Freenet. Search on Bibsonomy INFOCOM The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Wei Yu 0002, Xinwen Fu, Erik Blasch, Khanh D. Pham, Dan Shen, Genshe Chen, Chao Lu 0002 On Effectiveness of Hopping-Based Spread Spectrum Techniques for Network Forensic Traceback. Search on Bibsonomy SNPD The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Dung Tien Ngo, Choong Seon Hong Fast Overlapping Algebraic Traceback. Search on Bibsonomy APNOMS The full citation details ... 2013 DBLP  BibTeX  RDF
18Vahid Aghaei Foroushani, Nur Zincir-Heywood On Evaluating IP Traceback Schemes: A Practical Perspective. Search on Bibsonomy IEEE Symposium on Security and Privacy Workshops The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Vahid Aghaei Foroushani, Nur Zincir-Heywood Deterministic and Authenticated Flow Marking for IP Traceback. Search on Bibsonomy AINA The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Dong Yan, Yulong Wang, Sen Su, Fangchun Yang A Precise and Practical IP Traceback Technique Based on Packet Marking and Logging. Search on Bibsonomy J. Inf. Sci. Eng. The full citation details ... 2012 DBLP  BibTeX  RDF
18André O. Castelucio, Antônio Tadeu A. Gomes, Artur Ziviani, Ronaldo M. Salles Intra-domain IP traceback using OSPF. Search on Bibsonomy Comput. Commun. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Nuno Sebastião, Nuno Roma, Paulo F. Flores Hardware accelerator architecture for simultaneous short-read DNA sequences alignment with enhanced traceback phase. Search on Bibsonomy Microprocess. Microsystems The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18K. Munivara Prasad, A. Rama Mohan Reddy, V. Jyothsna IP Traceback for Flooding attacks on Internet Threat Monitors (ITM) Using Honeypots Search on Bibsonomy CoRR The full citation details ... 2012 DBLP  BibTeX  RDF
18Junzhou Luo, Xiaogang Wang, Ming Yang 0001 An interval centroid based spread spectrum watermarking scheme for multi-flow traceback. Search on Bibsonomy J. Netw. Comput. Appl. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Ming-Hour Yang, Ming-Chien Yang RIHT: A Novel Hybrid IP Traceback Scheme. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Muhammad Shoaib Siddiqui, Syed Obaid Amin, Choong Seon Hong Hop-by-Hop Traceback in Wireless Sensor Networks. Search on Bibsonomy IEEE Commun. Lett. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Hongcheng Tian, Jun Bi An Incrementally Deployable Flow-Based Scheme for IP Traceback. Search on Bibsonomy IEEE Commun. Lett. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Animesh Tripathy, Jayanti Dansana, Debi Prasad Mishra A secure packet marking scheme for IP traceback in IPv6. Search on Bibsonomy ICACCI The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Bo-Chao Cheng, Guo-Tan Liao, Ching-Kai Lin, Shih-Chun Hsu, Ping-Hai Hsu, Jong Hyuk Park MIB-ITrace-CP: An Improvement of ICMP-Based Traceback Efficiency in Network Forensic Analysis. Search on Bibsonomy NPC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Ning Lu, Yulong Wang, Fangchun Yang, Maotong Xu A Novel Approach for Single-Packet IP Traceback Based on Routing Path. Search on Bibsonomy PDP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Yulong Wang, Sen Su, Yi Yang, Ji Ren A More Efficient Hybrid Approach for Single-Packet IP Traceback. Search on Bibsonomy PDP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Samant Saurabh, Ashok Singh Sairam Linear and Remainder Packet Marking for fast IP traceback. Search on Bibsonomy COMSNETS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Geon Il Heo, Nam Hun Kim, Ah Ra Jo, Sae In Choi, Won Hyung Park A Study on Traceback of Illegal Users Using Anonymity Technology in BitTorrent. Search on Bibsonomy ICITCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Tomoyuki Karasawa, Masakazu Soshi, Atsuko Miyaji A Novel Hybrid IP Traceback Scheme with Packet Counters. Search on Bibsonomy IDCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18M. Hamedi-Hamzehkolaie, M. J. Shamani, M. B. Ghaznavi-Ghoushchi Low rate DOS traceback based on sum of flows. Search on Bibsonomy IST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Hongcheng Tian, Jun Bi, Peiyao Xiao A Flow-Based Traceback Scheme on an AS-Level Overlay Network. Search on Bibsonomy ICDCS Workshops The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Wenjie Lin, David Lee Traceback Attacks in Cloud - Pebbletrace Botnet. Search on Bibsonomy ICDCS Workshops The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Ankunda R. Kiremire, Matthias R. Brust, Vir V. Phoha A prediction based approach to IP traceback. Search on Bibsonomy LCN Workshops The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Steven M. Bellovin IP Traceback. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 473 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license