The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase denial-of-service (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1983-1997 (18) 1998-2000 (43) 2001 (40) 2002 (57) 2003 (107) 2004 (122) 2005 (184) 2006 (188) 2007 (162) 2008 (169) 2009 (117) 2010 (61) 2011 (61) 2012 (42) 2013 (43) 2014 (53) 2015 (71) 2016 (55) 2017 (61) 2018 (88) 2019 (103) 2020 (129) 2021 (131) 2022 (158) 2023 (140) 2024 (46)
Publication types (Num. hits)
article(977) book(2) data(1) incollection(18) inproceedings(1419) phdthesis(32)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1352 occurrences of 577 keywords

Results
Found 2449 publication records. Showing 2449 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
18Deven Shah, Ashish Mangal, Mayank Agarwal, Mahendra Mehra, Tushar Dave, Dhiren R. Patel Protecting Global SOA from DoS and Other Security Threats. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Global SOA, Handlers, Security, Simulation, Web Services, SOA, DoS, Denial of Service
18Loukas Lazos, Sisi Liu, Marwan Krunz Mitigating control-channel jamming attacks in multi-channel ad hoc networks. Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF ad hoc networks, denial of service, multi channel, jamming, control channel
18Michael T. Goodrich Probabilistic packet marking for large-scale IP traceback. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF associate addresses, checksum cords, denial of service (DDOS), distributed, IP, traceback, probabilistic packet marking
18David M. Nicol Efficient simulation of Internet worms. Search on Bibsonomy ACM Trans. Model. Comput. Simul. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF simulation, modeling, denial-of-service, Worms
18Hitesh Ballani, Paul Francis Mitigating DNS DoS attacks. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF stale cache, denial of service, DNS
18Adetokunbo Makanju, Nur Zincir-Heywood, Evangelos E. Milios Adaptabilty of a GP Based IDS on Wireless Networks. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Wireless Networks, Genetic Programming, Intrusion Detection System, Denial of Service
18Sanjam Garg, Huzur Saran Anti-DDoS Virtualized Operating System. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Performance, Virtualization, Malware, Distributed Denial of Service Attack
18Stylianos Basagiannis, Panagiotis Katsaros, Andrew Pombortsis, Nikolaos Alexiou 0001 A Probabilistic Attacker Model for Quantitative Verification of DoS Security Threats. Search on Bibsonomy COMPSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, model checking, Denial of Service
18Sanjeev Kumar, Einar Petana Mitigation of TCP-SYN Attacks with Microsoft's Windows XP Service Pack2 (SP2) Software. Search on Bibsonomy ICN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Denial of Service (DoS) attacks, TCP SYN attack, Windows XP Service Pack2 operating system, Internet Security
18Vladimir V. Shakhov, Hyunseung Choo Denial of Sleeping: Performance Analysis and Counteracting Strategy. Search on Bibsonomy APCHI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Denial of sleeping, Wireless sensor networks, Denial of Service, Energy consumption
18Zoran Rusinovic, Nikola Bogunovic Self-Protecting Session Initiation Protocol Stack. Search on Bibsonomy KES (1) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Cellular automata, SIP, Denial of Service, Self-protecting
18Håvard D. Johansen, Dag Johansen Resilient Software Mirroring With Untrusted Third Parties. Search on Bibsonomy HotSWUp The full citation details ... 2008 DBLP  DOI  BibTeX  RDF overlay network, intrusion-tolerance, software distribution, denial-of-service attack
18Ivan Martinovic, Frank A. Zdarsky, Matthias Wilhelm 0001, Christian Wegmann, Jens B. Schmitt Wireless client puzzles in IEEE 802.11 networks: security by wireless. Search on Bibsonomy WISEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF denial-of-service (DoS), wireless security, impersonation attacks, client puzzles
18Ramana Rao Kompella, Sumeet Singh, George Varghese On scalable attack detection in the network. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF data structures, denial of service, routers, scanning, streaming algorithms, network attacks, syn flooding
18Sartid Vongpradhip, Wichet Plaimart Survival Architecture for Distributed Intrusion Detection System (dIDS) using Mobile Agent. Search on Bibsonomy NCA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Mobile agent, Network security, Distributed denial-of-service, Security architecture, security engineering, Distributed intrusion detection systems
18Daniel Boteanu, Edouard Reich, José M. Fernandez 0001, John McHugh Implementing and testing dynamic timeout adjustment as a dos counter-measure. Search on Bibsonomy QoP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF degradation of service, denial of service, SYN flood
18Vrizlynn L. L. Thing, Morris Sloman, Naranker Dulay Non-intrusive IP traceback for DDoS attacks. Search on Bibsonomy AsiaCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF distributed denial of service attacks, IP traceback
18Pascal Fradet, Stéphane Hong Tuan Ha Aspects of availability. Search on Bibsonomy GPCE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF aspect-oriented programming, resource management, availability, timed automata, denial of service, weaving
18Peter Sandford, David J. Parish, Jonathan M. Sandford Traffic Summary Analysis for Network Abuse Detection in High Date-Rate ISP Networks. Search on Bibsonomy ICN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Core Network Monitoring, Intrusion Detection, Denial of Service
18Ivan Martinovic, Frank A. Zdarsky, Jens B. Schmitt Regional-based authentication against dos attacks in wireless networks. Search on Bibsonomy Q2SWinet The full citation details ... 2007 DBLP  DOI  BibTeX  RDF denial-of-service (DoS) attacks, wireless LAN, impersonation attacks
18Marwan Abi-Antoun, Daniel Wang, Peter Torr Checking threat modeling data flow diagrams for implementation conformance and security. Search on Bibsonomy ASE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF reflexion models, denial of service, security analysis, threat modeling, data flow diagrams, information disclosure, tampering, spoofing
18Leyi Shi, Chunfu Jia, Shuwang Lü, Zhenhua Liu Port and Address Hopping for Active Cyber-Defense. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Port and address hopping, Active cyber-defense, Denial of Service, Eavesdropping
18Enock Chisonge Mofya, J. Cole Smith Exact and heuristic algorithms for solving the generalized minimum filter placement problem. Search on Bibsonomy J. Comb. Optim. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Heuristics, Mixed-integer programming, Facets, Computer network security, Denial of service attacks
18Claude Castelluccia, Einar Mykletun, Gene Tsudik Improving secure server performance by re-balancing SSL/TLS handshakes. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF server-aided RSA, server-aided secure computation, load-balancing, denial-of-service, hardware accelerators, client puzzles
18Ahmad Fadlallah, Ahmed Serhrouchni PSAT: Proactive Signaling Architecture for IP Traceback. Search on Bibsonomy CNSR The full citation details ... 2006 DBLP  DOI  BibTeX  RDF network security, denial of service, IP traceback
18Haizhi Xu, Steve J. Chapin Improving address space randomization with a dynamic offset randomization technique. Search on Bibsonomy SAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF address space randomization, code islands, derandomization attacks, intrusion mitigation, randomization, denial-of-service attacks
18Patrick Traynor, William Enck, Patrick D. McDaniel, Thomas La Porta Mitigating attacks on open functionality in SMS-capable cellular networks. Search on Bibsonomy MobiCom The full citation details ... 2006 DBLP  DOI  BibTeX  RDF open-functionality, denial-of-service, telecommunications, sms
18Kuo Dong, Shoubao Yang, Shaolin Wang Analysis of low-rate TCP DoS attack against FAST TCP. Search on Bibsonomy ISDA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Denial of Service(DoS), RTO, TCP Reno, FAST TCP
18Daniel B. Faria, David R. Cheriton Detecting identity-based attacks in wireless networks using signalprints. Search on Bibsonomy Workshop on Wireless Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF IEEE 802.11., security, wireless LANs, location-based services, denial-of-service attacks
18Micah Adler Trade-offs in probabilistic packet marking for IP traceback. Search on Bibsonomy J. ACM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Denial of Service
18Gregory J. Conti, Mustaque Ahamad A Framework for Countering Denial-of-Information Attacks. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF H.3.3 Information Search and Retrieval, H.3.4 Systems and Software, DOI, security, denial-of-service
18Lan Li, Gyungho Lee DDoS Attack Detection and Wavelets. Search on Bibsonomy Telecommun. Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF energy distribution, distributed denial of service, wavelet analysis, traffic characterization, attack detection
18Zhenkai Liang, R. Sekar 0001 Fast and automated generation of attack signatures: a basis for building self-protecting servers. Search on Bibsonomy CCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF denial-of-service protection, worm defense, buffer overflow, signature generation, memory error
18William Enck, Patrick Traynor, Patrick D. McDaniel, Thomas F. La Porta Exploiting open functionality in SMS-capable cellular networks. Search on Bibsonomy CCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF open-functionality, denial-of-service, telecommunications, sms
18Wenyuan Xu 0001, Wade Trappe, Yanyong Zhang, Timothy Wood 0001 The feasibility of launching and detecting jamming attacks in wireless networks. Search on Bibsonomy MobiHoc The full citation details ... 2005 DBLP  DOI  BibTeX  RDF jammer detection, denial of service, jamming
18Patrick LaRoche, Nur Zincir-Heywood 802.11 network intrusion detection using genetic programming. Search on Bibsonomy GECCO Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF genetic programming, intrusion detection, denial of service, 802.11, WiFi
18Jiejun Kong, Zhengrong Ji, Weichao Wang, Mario Gerla, Rajive L. Bagrodia, Bharat K. Bhargava Low-cost attacks against packet delivery, localization and time synchronization services in under-water sensor networks. Search on Bibsonomy Workshop on Wireless Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF wormhole length, mobility, underwater sensor network, denial-of-service attack
18Yee Wei Law, Lodewijk van Hoesel, Jeroen Doumen, Pieter H. Hartel, Paul J. M. Havinga Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols. Search on Bibsonomy SASN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, clustering, MAC protocols, jamming, denial-of-service attacks
18Micah Adler, Jeff Edmonds, Jirí Matousek 0001 Towards asymptotic optimality in probabilistic packet marking. Search on Bibsonomy STOC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF denial of service
18Ming-Wei Wu, Yennun Huang, Shyue-Kung Lu, Ing-Yi Chen, Sy-Yen Kuo A Multi-Faceted Approach towards Spam-Resistible Mail. Search on Bibsonomy PRDC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF anti-spam, unsolicited bulk e-mail (UBE), e-mail dependability, Spam, denial of service attacks
18Neil Daswani, Hector Garcia-Molina Pong-cache poisoning in GUESS. Search on Bibsonomy CCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF security, peer-to-peer, denial-of-service
18John Zachary, John C. McEachen, Daniel W. Ettlich Conversation Exchange Dynamics for Real-Time Network Monitoring and Anomaly Detection. Search on Bibsonomy IWIA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Network assurance, real-time network monitoring, visualization, denial of service, network anomaly detection
18Christos Siaterlis, Basil S. Maglaris Towards multisensor data fusion for DoS detection. Search on Bibsonomy SAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF anomaly detection, data fusion, Denial of Service
18Anat Bremler-Barr, Hanoch Levy Brief announcement: spoofing prevention method. Search on Bibsonomy PODC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF source IP spoofing, distributed denial of service
18Ramana Rao Kompella, Sumeet Singh, George Varghese On scalable attack detection in the network. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF security, scalability, denial of service
18Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon RSA Speedup with Chinese Remainder Theorem Immune against Hardware Fault Cryptanalysis. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2003 DBLP  DOI  BibTeX  RDF fault infective CRT, fault tolerance, cryptography, fault detection, side channel attack, factorization, Chinese Remainder Theorem (CRT), residue number system, physical cryptanalysis, hardware fault cryptanalysis, denial of service attack
18Abiola Abimbola, Qi Shi 0001, Madjid Merabti NetHost-Sensor: A Novel Concept in Intrusion Detection Systems. Search on Bibsonomy ISCC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Host-Based, Network-Based, Denial-of-Service and NetHost-Sensor, Intrusion Detection
18Lidong Zhou, Fred B. Schneider, Robbert van Renesse COCA: A secure distributed online certification authority. Search on Bibsonomy ACM Trans. Comput. Syst. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Byzantine quorum systems, proactive secret-sharing, denial of service, public key infrastructure, threshold cryptography, Certification authority
18Alex C. Snoeren, Craig Partridge, Luis A. Sanchez, Christine E. Jones, Fabrice Tchakountio, Beverly Schwartz, Stephen T. Kent, W. Timothy Strayer Single-packet IP traceback. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF network fault diagnosis, IP, denial of service (DoS), wide-area networks (WANs), computer network management, IP traceback, computer network security
18Michael T. Goodrich Efficient packet marking for large-scale IP traceback. Search on Bibsonomy CCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF denial-of-service, traceback, packet marking
18James Cannady Applying CMAC-Based On-Line Learning to Intrusion Detection. Search on Bibsonomy IJCNN (5) The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Intrusion detection, CMAC, denial of service attacks
18Chu-Hsing Lin, Jung-Chun Liu, Ching-Ru Chen Access Log Generator for Analyzing Malicious Website Browsing Behaviors. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18Erdal Cayirci Deployed sensor networks and their security challenges in practice. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF sensor, actuator, secure routing
18Udaya Kiran Tupakula, Vijay Varadharajan, Srini Rao Pandalaneni DoSTRACK: a system for defending against DoS attacks. Search on Bibsonomy SAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Smurf, TCP SYN flood, DoS, DDoS, reflection attacks
18Saar Drimer, Markus G. Kuhn A Protocol for Secure Remote Updates of FPGA Configurations. Search on Bibsonomy ARC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18Alan Shieh, Andrew C. Myers, Emin Gün Sirer A stateless approach to connection-oriented protocols. Search on Bibsonomy ACM Trans. Comput. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Stateless interfaces, stateless protocols
18Asier Martínez, Urko Zurutuza, Roberto Uribeetxeberria, Miguel Fernández, Jesus Lizarraga, Ainhoa Serna, Iñaki Vélez Beacon Frame Spoofing Attack Detection in IEEE 802.11 Networks. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF 802.11 MAC address spoofing, false positive
18Angelos Stavrou, Michael E. Locasto, Angelos D. Keromytis Pushback for Overlay Networks: Protecting Against Malicious Insiders. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Kai Bu, Zhixin Sun A Method Based on AMHI for DDoS Attacks Detection and Defense. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Li Zhu, Huaibei Zhou Two Types of Attacks against Cognitive Radio Network MAC Protocols. Search on Bibsonomy CSSE (4) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Maw-Jinn Tsaur, Wei-Chi Ku, Hao-Rung Chung An Improved Password-Based Authenticated Key Agreement Scheme for Pervasive Applications. Search on Bibsonomy EUC (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Yongyuth Permpoontanalarp, Jatupoom Kanokkanjanapong Dynamic Undeniable Fair Certified Email with DDoS Protection. Search on Bibsonomy AINA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Cryptographic Protocols, Fair Exchange Protocol, Certified Email
18Marinho P. Barcellos, Daniel Bauermann, Henrique Sant'anna, Matheus B. Lehmann, Rodrigo B. Mansilha Protecting BitTorrent: Design and Evaluation of Effective Countermeasures against DoS Attacks. Search on Bibsonomy SRDS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Sushil Jajodia, Ting Yu 0001 Basic Security Concepts. Search on Bibsonomy Secure Data Management in Decentralized Systems The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Bryan Parno, Dan Wendlandt, Elaine Shi, Adrian Perrig, Bruce M. Maggs, Yih-Chun Hu Portcullis: protecting connection setup from denial-of-capability attacks. Search on Bibsonomy SIGCOMM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF network capability, per-computation fairness
18Zhen Cao, Zhi Guan, Zhong Chen 0001, Jian-bin Hu, Liyong Tang An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols. Search on Bibsonomy ISPEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Jong-Phil Yang, Kouichi Sakurai, Kyung Hyune Rhee Distributing Security-Mediated PKI Revisited. Search on Bibsonomy EuroPKI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Certificate Status Information, Fault-tolerance, Reliability
18Dave Singelée, Bart Preneel Improved Pairing Protocol for Bluetooth. Search on Bibsonomy ADHOC-NOW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, Bluetooth, pairing
18Elias Athanasopoulos, Kostas G. Anagnostakis, Evangelos P. Markatos Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Hong-bin Yim, Jae-Il Jung IP Traceback Algorithm for DoS/DDoS Attack. Search on Bibsonomy APNOMS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18 Effective Filtering Scheme against RREQ Flooding Attack in Mobile Ad Hoc Networks. Search on Bibsonomy PDCAT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Yinan Jing, Peng Tu, Xueping Wang, Gendu Zhang Distributed-Log-based Scheme for IP Traceback. Search on Bibsonomy CIT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Ramy Bebawy, Hesham Sabry, Sherif El-Kassas, Youssef Hanna, Youssef Youssef Nedgty: Web Services Firewall. Search on Bibsonomy ICWS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Fang-Yie Leu, Jia-Chun Lin, Ming-Chang Li, Chao-Tung Yang A Performance-Based Grid Intrusion Detection System. Search on Bibsonomy COMPSAC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF PGIDS, Grid, DoS, DDoS, SSA, BPNN, SAA
18Yinan Jing, Jingtao Li, Gendu Zhang An Adaptive Edge Marking Based Hierarchical IP Traceback System. Search on Bibsonomy ICCNMC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18C. K. Wong, Agnes Chan Immediate Data Authentication for Multicast in Resource Constrained Network. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Jing Deng 0002, Richard Han 0001, Shivakant Mishra Defending against path-based DoS attacks in wireless sensor networks. Search on Bibsonomy SASN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, sensor networks, denial of services attacks
18Ping Yi, Zhoulin Dai, YiPing Zhong, Shiyong Zhang Resisting Flooding Attacks in Ad Hoc Networks. Search on Bibsonomy ITCC (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Fang-Yie Leu, Jia-Chun Lin, Ming-Chang Li, Chao-Tung Yang, Po-Chi Shih Integrating Grid with Intrusion Detection. Search on Bibsonomy AINA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Yu-Sung Wu, Saurabh Bagchi, Sachin Garg, Navjot Singh 0001, Timothy K. Tsai SCIDIVE: A Stateful and Cross Protocol Intrusion Detection Architecture for Voice-over-IP Environments. Search on Bibsonomy DSN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Voice over IP system, Cross-protocol detection, Stateful detection, Intrusion detection, SIP, RTP
18Bruno Crispo, Bogdan C. Popescu, Andrew S. Tanenbaum Symmetric Key Authentication Services Revisited. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Jeenhong Park, Jin-Hwan Choi, Dae-Wha Seo The Packet Marking and the Filtering Protocol to Counter Against the DDoS Attacks. Search on Bibsonomy PDCAT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Wu-chang Feng The case for TCP/IP puzzles. Search on Bibsonomy Comput. Commun. Rev. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
18Anu Bhargava, Michael D. Zoltowski Sensors and Wireless Communication for Medical Care. Search on Bibsonomy DEXA Workshops The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
18Kihun Chong, Ha Yoon Song, Sam H. Noh Traffic Characterization of the Web Server Attacks of Worm Viruses. Search on Bibsonomy International Conference on Computational Science The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
18R. Sekar 0001, Ajay Gupta 0002, J. Frullo, T. Shanbhag, A. Tiwari, H. Yang, S. Zhou Specification-based anomaly detection: a new approach for detecting network intrusions. Search on Bibsonomy CCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF intrusion detection, anomaly detection, network monitoring
18Mohamed G. Gouda, Chin-Tser Huang, Anish Arora On the Security and Vulnerability of PING. Search on Bibsonomy WSS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
18João B. D. Cabrera, B. Ravichandran, Raman K. Mehra Statistical Traffic Modeling for Network Intrusion Detection. Search on Bibsonomy MASCOTS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
18Tuomas Aura, Matt Bishop, Dean Sniegowski Analyzing Single-Server Network Inhibition. Search on Bibsonomy CSFW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
18Myong H. Kang, Ira S. Moskowitz, Daniel C. Lee 0001 A Network Pump. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF security, information theory, flow control, router, Covert channel, gateway
17Haining Wang, Kang G. Shin Layer-4 Service Differentiation and Resource Isolation. Search on Bibsonomy IEEE Real Time Technology and Applications Symposium The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
17Guang Jin, Jiangang Yang, Wei Wei, Yabo Dong Mitigating Denial of Capability with An Notification Mechanism. Search on Bibsonomy IEEE NAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Junzuo Lai, Weidong Kou Self-Generated-Certificate Public Key Encryption Without Pairing. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Self-Generated-Certificate Public Key Cryptography, Self-Certified-Key, Certificateless Public Key Cryptography
17Adam Back, Ulf Möller, Anton Stiglic Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems. Search on Bibsonomy Information Hiding The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
16Di Dong, Ruimei Zhang, Yunjia Cheng, Lei Zhang, Xiangpeng Xie, Jianying Xiao Secure defense control for memristive recurrent neural networks under denial-of-service attacks with quantized sampled-data signals. Search on Bibsonomy Neural Comput. Appl. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Peng Cheng 0010, Shuping He, Weidong Zhang 0004 A Genetic Algorithm-Assisted Fault Detection Observer for Networked Systems Under Denial-of-Service Attacks. Search on Bibsonomy IEEE Trans. Reliab. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Kaiyue Dong, Guang-Hong Yang, Huimin Wang Estimator-based event-triggered output synchronization for heterogeneous multi-agent systems under denial-of-service attacks and actuator faults. Search on Bibsonomy Inf. Sci. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Yonggui Liu, Ziyuan Li, Qinxue Li, Xuhuan Xie Secure Consensus Control for Connected Vehicle Systems With Resilient Predictors Against Denial-of-Service Attacks. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Liang Ming, Yu-Beng Leau, Ying Xie Distributed Denial of Service Attack in HTTP/2: Review on Security Issues and Future Challenges. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Amandeep Verma, Rahul Saha, Gulshan Kumar, Mauro Conti, Tai-Hoon Kim PREVIR: Fortifying Vehicular Networks Against Denial of Service Attacks. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
Displaying result #301 - #400 of 2449 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license