|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1332 occurrences of 792 keywords
|
|
|
Results
Found 12185 publication records. Showing 10178 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
18 | Wei Wei, Yabo Dong, Dongming Lu, Guang Jin, Honglan Lao |
A Novel Mechanism to Defend Against Low-Rate Denial-of-Service Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006, Proceedings, pp. 261-271, 2006, Springer, 3-540-34478-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Lubomir Salanci |
Object-Oriented Programming at Upper Secondary School for Advanced Students. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSEP ![In: Informatics Education - The Bridge between Using and Understanding Computers, International Conference in Informatics in Secondary Schools - Evolution and Perspectives, ISSEP 2006, Vilnius, Lithuania, November 7-11, 2006, Proceedings, pp. 179-188, 2006, Springer, 3-540-48218-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
18 | |
Effective Filtering Scheme against RREQ Flooding Attack in Mobile Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDCAT ![In: Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2006), 4-7 December 2006, Taipei, Taiwan, pp. 497-502, 2006, IEEE Computer Society, 0-7695-2736-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Donggang Liu, Peng Ning, Sencun Zhu, Sushil Jajodia |
Practical Broadcast Authentication in Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiQuitous ![In: 2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), 17-21 July 2005, San Diego, CA, USA, pp. 118-132, 2005, IEEE Computer Society, 0-7695-2375-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Basheer Al-Duwairi, G. Manimaran |
Victim-Assisted Mitigation Technique for TCP-Based Reflector DDoS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NETWORKING ![In: NETWORKING 2005: Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems, 4th International IFIP-TC6 Networking Conference, Waterloo, Canada, May 2-6, 2005, Proceedings, pp. 191-204, 2005, Springer, 3-540-25809-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Jeonil Kang, DaeHun Nyang |
RFID Authentication Protocol with Strong Resistance Against Traceability and Denial of Service Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESAS ![In: Security and Privacy in Ad-hoc and Sensor Networks, Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005, Revised Selected Papers, pp. 164-175, 2005, Springer, 3-540-30912-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Dan Dumitriu, Edward W. Knightly, Aleksandar Kuzmanovic, Ion Stoica, Willy Zwaenepoel |
Denial-of-service resilience in peer-to-peer file sharing systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMETRICS ![In: Proceedings of the International Conference on Measurements and Modeling of Computer Systems, SIGMETRICS 2005, June 6-10, 2005, Banff, Alberta, Canada, pp. 38-49, 2005, ACM, 1-59593-022-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
file pollution, network-targeted attacks, peer-to-peer, denial of service |
18 | RongJie Gu, Puliu Yan, Tao Zou, Chengcheng Guo |
An Automatic and Generic Early-Bird System for Internet Backbone Based on Traffic Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICN (1) ![In: Networking - ICN 2005, 4th International Conference on Networking, ReunionIsland, France, April 17-21, 2005, Proceedings, Part I, pp. 740-748, 2005, Springer, 3-540-25339-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Hidetoshi Ueno, Hideharu Suzuki, Norihiro Ishikawa |
A Group Management Protocol for Mobile Multicast. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICN (2) ![In: Networking - ICN 2005, 4th International Conference on Networking, ReunionIsland, France, April 17-21, 2005, Proceedings, Part II, pp. 892-903, 2005, Springer, 3-540-25338-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Iosif-Viorel Onut, Bin Zhu, Ali A. Ghorbani 0001 |
SVision: A Network Host-Centered Anomaly Visualization Technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings, pp. 16-28, 2005, Springer, 3-540-29001-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Abraham Yaar, Adrian Perrig, Dawn Xiaodong Song |
FIT: fast Internet traceback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 13-17 March 2005, Miami, FL, USA, pp. 1395-1406, 2005, IEEE, 0-7803-8968-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Aki P. F. Chan, Wing W. Y. Ng, Daniel S. Yeung, Eric C. C. Tsang |
Multiple Classifier System with Feature Grouping for Intrusion Detection: Mutual Information Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (3) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part III, pp. 141-148, 2005, Springer, 3-540-28896-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Seonho Choi |
Denial-of-Service Resistant Multicast Authentication Protocol with Prediction Hashing and One-way Key Chain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISM ![In: Seventh IEEE International Symposium on Multimedia (ISM 2005), 12-14 December 2005, Irvine, CA, USA, pp. 701-706, 2005, IEEE Computer Society, 0-7695-2489-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Erol Gelenbe |
Users and Services in Intelligent Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINTEC ![In: Technologies for Advanced Heterogeneous Networks, First Asian Internet Engineering Conference, AINTEC 2005, Bangkok, Thailand, December 13-15, 2005, Proceedings, pp. 30-45, 2005, Springer, 3-540-30884-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Se-Yul Lee, Yong-Soo Kim, Bong-Hwan Lee, Sukhoon Kang, Chan-Hyun Youn |
A Probe Detection Model Using the Analysis of the Fuzzy Cognitive Maps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part I, pp. 320-328, 2005, Springer, 3-540-25860-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
18 | B. Saillet, Jean-Michel Portal, Didier Née |
Flash Memory Cell: Parametric Test Data Reconstruction for Process Monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DFT ![In: 20th IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT 2005), 3-5 October 2005, Monterey, CA, USA, pp. 131-139, 2005, IEEE Computer Society, 0-7695-2464-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Salil S. Kanhere, Anjum Naveed |
A Novel Tuneable Low-Intensity Adversarial Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 15-17 November 2005, Sydney, Australia, Proceedings, pp. 794-801, 2005, IEEE Computer Society, 0-7695-2421-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Silvia Farraposo, Philippe Owezarski, Edmundo Monteiro |
On the Use of Traffic Monitoring and Measurements for Improving Networking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AICT/SAPIR/ELETE ![In: Telecommunications 2005: Advanced Industrial Conference on Telecommunications / Service Assurance with Partial and Intermittent Resources Conference / E-Learning on Telecommunications Workshop (AICT / SAPIR / ELETE 2005), 17-22 July 2005, Lisbon, Portugal, pp. 416-421, 2005, IEEE Computer Society, 0-7695-2388-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Angelos D. Keromytis, Vishal Misra, Dan Rubenstein |
SOS: an architecture for mitigating DDoS attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE J. Sel. Areas Commun. ![In: IEEE J. Sel. Areas Commun. 22(1), pp. 176-188, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
18 | Basheer Al-Duwairi, Anirban Chakrabarti, Govindarasu Manimaran |
An Efficient Probabilistic Packet Marking Scheme for IP Traceback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NETWORKING ![In: NETWORKING 2004, Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication, Third International IFIP-TC6 Networking Conference, Athens, Greece, May 9-14, 2004, Proceedings, pp. 1263-1269, 2004, Springer, 3-540-21959-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
18 | Guang Yang 0001, Mario Gerla, M. Y. Sanadidi |
Defense against low-rate TCP-targeted denial-of-service attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28 - July 1, 2004, Alexandria, Egypt, pp. 345-350, 2004, IEEE Computer Society, 0-7803-8623-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
18 | Bao-Tung Wang, Henning Schulzrinne |
A denial-of-service-resistant IP traceback approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28 - July 1, 2004, Alexandria, Egypt, pp. 351-356, 2004, IEEE Computer Society, 0-7803-8623-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
18 | Wenyuan Xu 0001, Timothy Wood 0001, Wade Trappe, Yanyong Zhang |
Channel surfing and spatial retreats: defenses against wireless denial of service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Workshop on Wireless Security ![In: Proceedings of the 2004 ACM Workshop on Wireless Security, Philadelphia, PA, USA, October 1, 2004, pp. 80-89, 2004, ACM, 1-58113-925-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
denial of service, Jamming, CSMA |
18 | Marek Hejmo, Brian L. Mark, Charikleia Zouridaki, Roshan K. Thomas |
Denial-of-service resistant quality-of-service signaling for mobile ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SASN ![In: Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2004, Washington, DC, USA, October 25, 2004, pp. 23-28, 2004, ACM, 1-58113-972-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
qos signaling, security, quality of service, ad hoc networks, denial of service, attacks |
18 | Il-Ahn Cheong, Yongmin Kim 0005, Minsoo Kim 0002, BongNam Noh |
The Causality Analysis of Protocol Measures for Detection of Attacks Based on Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICOIN ![In: Information Networking, Networking Technologies for Broadband and Mobile Networks, International Conference ICOIN 2004, Busan, Korea, February 18-20, 2004, Revised Selected Papers, pp. 962-972, 2004, Springer, 3-540-23034-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
18 | Ajmal S. Mian, Ashraf Masood |
Arcanum : A Secure and Efficient Key Exchange Protocol for the Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (1) ![In: International Conference on Information Technology: Coding and Computing (ITCC'04), Volume 1, April 5-7, 2004, Las Vegas, Nevada, USA, pp. 17-21, 2004, IEEE Computer Society, 0-7695-2108-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
18 | Ramana Rao Kompella, Sumeet Singh, George Varghese |
On scalable attack detection in the network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Measurement Conference ![In: Proceedings of the 4th ACM SIGCOMM Internet Measurement Conference, IMC 2004, Taormina, Sicily, Italy, October 25-27, 2004, pp. 187-200, 2004, ACM, 1-58113-821-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
security, scalability, denial of service |
18 | Daigo Tomioka, Shin-ya Nishizaki, Ritsuya Ikeda |
A Cost Estimation Calculus for Analyzing the Resistance to Denial-of-Service Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSS ![In: Software Security - Theories and Systems, Second Mext-NSF-JSPS International Symposium, ISSS 2003, Tokyo, Japan, November 4-6, 2003, Revised Papers, pp. 25-44, 2003, Springer, 3-540-23635-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
18 | Chatree Sangpachatanaruk, Sherif M. Khattab, Taieb Znati, Rami G. Melhem, Daniel Mossé |
A Simulation Study of the Proactive Server Roaming for Mitigating Denial of Service Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Annual Simulation Symposium ![In: Proceedings 36th Annual Simulation Symposium (ANSS-36 2003), Orlando, Florida, USA, March 30 - April 2, 2003, pp. 7-14, 2003, IEEE Computer Society, 0-7695-1911-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
18 | Henry C. J. Lee, Miao Ma, Vrizlynn L. L. Thing, Yi Xu |
On the Issues of IP Traceback for IPv6 and Mobile IPv6. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June - 3 July 2003, Kiris-Kemer, Turkey, pp. 582-587, 2003, IEEE Computer Society, 0-7695-1961-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
18 | Zhaole Chen, Moon-Chuen Lee |
An IP Traceback Technique against Denial-of-Service Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 19th Annual Computer Security Applications Conference (ACSAC 2003), 8-12 December 2003, Las Vegas, NV, USA, pp. 96-104, 2003, IEEE Computer Society, 0-7695-2041-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
18 | Cristian Estan, George Varghese, Mike Fisk |
Counting the number of active flows on a high speed link. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Commun. Rev. ![In: Comput. Commun. Rev. 32(3), pp. 10, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
18 | Hechmi Khlifi, Jocelyn Desbiens, Mohamed Cheriet |
Building Groupwares over Duplicated Object Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRIWG ![In: Groupware: Design, Implementation and Use, 8th International Workshop, CRIWG 2002, La Serena, Chile, 1.-4. September 2002, Proceedings, pp. 245-254, 2002, Springer, 3-540-44112-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
18 | Jean-Michel Portal, L. Forli, Hassen Aziza, Didier Née |
An Automated Design Methodology for EEPROM Cell (ADE). ![Search on Bibsonomy](Pics/bibsonomy.png) |
MTDT ![In: 10th IEEE International Workshop on Memory Technology, Design, and Testing (MTDT 2002), 10-12 July 2002, Isle of Bendor, France, pp. 137-142, 2002, IEEE Computer Society, 0-7695-1617-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
18 | Jean-Michel Portal, L. Forli, Hassen Aziza, Didier Née |
An Automated Methodology to Diagnose Geometric Defect in the EEPROM Cell. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITC ![In: Proceedings IEEE International Test Conference 2002, Baltimore, MD, USA, October 7-10, 2002, pp. 31-36, 2002, IEEE Computer Society, 0-7803-7543-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
18 | Kenjiro Cho, Ryo Kaizaki, Akira Kato |
Aguri: An Aggregation-Based Traffic Profiler. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QofIS ![In: Quality of Future Internet Services, Second COST 263 International Workshop, Qofis 2001, Coimbra, Portugal, September 24-26, 2001, Proceedings, pp. 222-242, 2001, Springer, 3-540-42602-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
18 | Akihiko Miyoshi, Ragunathan Rajkumar |
Protecting Resources with Resource Control Lists. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Real Time Technology and Applications Symposium ![In: Proceedings of the 7th IEEE Real-Time Technology and Applications Symposium (RTAS 2001), 30 May - 1 June 2001, Taipei, Taiwan, pp. 85-94, 2001, IEEE Computer Society, 0-7695-1134-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
18 | Martin Barghoorn |
High performance computing through parallel processing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APL ![In: Proceedings of the APL-Berlin-2000 Conference: Think Arrays in a Great City, APL 2000, Berlin, Germany, July 24-27, 2000, pp. 32-34, 2000, ACM, 1-58113-182-8. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
APL |
18 | Jeffrey Horton, Jennifer Seberry |
Companion Viruses and the Macintosh: Threats and Countermeasures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings, pp. 202-212, 1999, Springer, 3-540-65756-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
18 | Friedrich Summann |
Das Internet-basierte Bibliotheksinformationssystem in der Bibliothek der Universität Bielefeld. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inform. Forsch. Entwickl. ![In: Inform. Forsch. Entwickl. 13(3), pp. 139-146, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Informationsnetz, bibliographische Datenbanken, Dokumentlieferung, digitale Bibliothek |
18 | James Thatcher |
Screen reader/2: access to OS/2 and the graphical user interface. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASSETS ![In: Proceedings of the First Annual ACM Conference on Assistive Technologies, ASSETS 1994, Marina Del Rey, California, USA, October 31 - November 3, 1994, pp. 39-46, 1994, ACM, 0-89791-649-2. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
OS/2 |
18 | Randy F. Pausch, Matthew Conway, Robert DeLine |
Lessons Learned from SUIT, the Simple User Interface Toolkit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. ![In: ACM Trans. Inf. Syst. 10(4), pp. 320-344, 1992. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
SUIT, GUI, graphical user interface, software tools, pedagogy, rapid prototyping, portability, UIMS, learnability, user interface toolkit, export |
18 | James G. Wheeler |
Design and Implementation of the Interface to Compiled Languages in APL*PLUS II. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APL ![In: Conference Proceedings on APL 90: For the Future, APL 1990, Copenhagen, Denmark, August 13-17, 1990., pp. 412-417, 1990, ACM, 0-89791-371-X. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
APL |
18 | A. H. Jarvis, D. Pratt, Keith E. Gatling |
The effect of unstaffing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 17th Annual ACM SIGUCCS Conference on User Services, Bethesda, Maryland, USA, 1989, pp. 139-142, 1989, ACM, 0-89791-330-2. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
17 | Diomidis Spinellis |
Trace: A Tool for Logging Operating System Call Transactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 28(4), pp. 56-63, 1994. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
MS-DOS |
17 | M. Stella Atkins, Louis J. Hafer, Patrick Leung |
Robots in the laboratory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCSE ![In: Proceedings of the 19th SIGCSE Technical Symposium on Computer Science Education, SIGCSE 1988, Atlanta, Georgia, USA, February 25-26, 1988, pp. 36-40, 1988, ACM, 978-0-89791-256-3. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP DOI BibTeX RDF |
IBM PC, MS-DOS |
16 | Shunsuke Oshima, Takuo Nakashima, Toshinori Sueyoshi |
Comparison of Properties between Entropy and Chi-Square Based Anomaly Detection Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NBiS ![In: The 14th International Conference on Network-Based Information Systems, NBiS 2011, Tirana, Albania, September 7-9, 2011, pp. 221-228, 2011, IEEE Computer Society, 978-1-4577-0789-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
DoS/DDoS detection, chi-square value, Entropy, anomaly detection, statistical approach |
16 | Bae-Ling Chen, Wen-Chung Kuo, Lih-Chyau Wuu |
Security on the Design of RFID Access Control Protocol Using the Strategy of Indefinite-Index and Challenge-Response. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICGEC ![In: Fifth International Conference on Genetic and Evolutionary Computing, ICGEC 2011, Kinmen, Taiwan / Xiamen, China, August 29 - September 1, 2011, pp. 9-12, 2011, IEEE Computer Society, 978-1-4577-0817-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
denial-of-service (DoS) attack, spoofed reader attack, authentication, access control, RFID security |
16 | Ying Xuan, Incheol Shin, My T. Thai, Taieb Znati |
Detecting Application Denial-of-Service Attacks: A Group-Testing-Based Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 21(8), pp. 1203-1216, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Application DoS, network security, group testing |
16 | Mehran S. Fallah |
A Puzzle-Based Defense Strategy Against Flooding Attacks Using Game Theory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 7(1), pp. 5-19, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Client-puzzle approach, flooding DoS attack, reliability, game theory, availability and serviceability |
16 | Raja Sekhar Reddy Gade, Hari Krishna Vellalacheruvu, Sanjeev Kumar |
Performance of Windows XP, Windows Vista and Apple's Leopard Computers under a Denial of Service Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDS ![In: The Fourth International Conference on Digital Society, ICDS 2010, 10.16 February 2010, St. Maarten, Netherlands Antilles, pp. 188-191, 2010, IEEE Computer Society, 978-0-7695-3953-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Denial of Service (DoS) Attack, Internet Control Message Protocol (ICMP), Land Attack, Ping utility |
16 | Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger, Nidhal Selmane |
Fault Injection Resilience. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FDTC ![In: 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2010, Santa Barbara, California, USA, 21 August 2010, pp. 51-65, 2010, IEEE Computer Society, 978-0-7695-4169-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Fault Injection Attack (FIA), symmetric block encryption, Fault Injection Resilience (FIR), Differential Fault Analysis (DFA), Dual-rail with Precharge Logic (DPL), Side-Channel Attack (SCA), Denial of Service (DoS) |
16 | Rakesh Shrestha, Kyong-Heon Han, Dong-You Choi, Seung Jo Han |
A Novel Cross Layer Intrusion Detection System in MANET. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 24th IEEE International Conference on Advanced Information Networking and Applications, AINA 2010, Perth, Australia, 20-13 April 2010, pp. 647-654, 2010, IEEE Computer Society, 978-0-7695-4018-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
MANET, IDS, DoS, Cross layer, AODV |
16 | Hakem Beitollahi, Geert Deconinck |
Empirical Study of Tolerating Denial-of-Service Attacks with the Fosel Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NCA ![In: Proceedings of The Eighth IEEE International Symposium on Networking Computing and Applications, NCA 2009, July 9-11, 2009, Cambridge, Massachusetts, USA, pp. 258-261, 2009, IEEE Computer Society, 978-0-7695-3698-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Empirical study, overlay networks, DoS attacks |
16 | Jayashree Padmanabhan, K. S. Easwarakumar, Gokul B., Harishankar S. |
Trust based traffic monitoring approach for preventing denial of service attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 200-206, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
clustering, networks, trust, denial of service, centroid, dos |
16 | Jayashree Padmanabhan, K. S. Easwarakumar |
Traffic Engineering Based Attack Detection in Active Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCN ![In: Distributed Computing and Networking, 10th International Conference, ICDCN 2009, Hyderabad, India, January 3-6, 2009. Proceedings, pp. 181-186, 2009, Springer, 978-3-540-92294-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Denial of Service (DoS), active network, traffic characteristics, leaky buckets |
16 | Sushil Kumar Jain, Kumkum Garg |
A Hybrid Model of Defense Techniques against Base Station Jamming Attack in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICSyN ![In: First International Conference on Computational Intelligence, Communication Systems and Networks, CICSYN 2009, Indore, India, 23-25 July, 2009, pp. 102-107, 2009, IEEE Computer Society, 978-0-7695-3743-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Jamming Attack, Denial of Service (DoS), Multipath Routing |
16 | Siqin Zhao, Kang Chen, Weimin Zheng |
Defend Against Denial of Service Attack with VMM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC ![In: Eighth International Conference on Grid and Cooperative Computing, GCC 2009, Lanzhou, Gansu, China, August 27-29, 2009, pp. 91-96, 2009, IEEE Computer Society, 978-0-7695-3766-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Isolated Environment, Selective Duplication, Threshold, Virtual Machine Monitor, DoS Attack |
16 | Man Ho Au, Willy Susilo, Yi Mu 0001 |
Is the Notion of Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line Signatures? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security, Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings, pp. 129-139, 2009, Springer, 978-3-642-04641-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
on-line/off-line signatures, divisible on-line/off-line signatures, OS-EU-CMA, DOS-EU-CMA |
16 | Eun-Jun Yoon, Kee-Young Yoo |
Two Security Problems of RFID Security Method with Ownership Transfer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NPC Workshops ![In: IFIP International Conference on Network and Parallel Computing, NPC 2008, Shanghai, China, October 18-21, 2008, Workshop Proceedings, pp. 68-73, 2008, IEEE Computer Society, 978-0-7695-3354-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Authentication, RFID, Cryptanalysis, Forward secrecy, DoS attack |
16 | Meiko Jensen, Nils Gruschka, Norbert Luttenberger |
The Impact of Flooding Attacks on Network-based Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 509-513, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Web Services, availability, DoS, attacks, flooding |
16 | Danny Wong |
Kickin' it old school!: dealing with legacy applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 36th Annual ACM SIGUCCS Conference on User Services 2008, Portland, OR, USA, October 19-22, 2008, pp. 55-58, 2008, ACM, 978-1-60558-074-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Virtualization, Linux, DOS, VMware, cross-platform, Legacy |
16 | Ana Emília de Melo Queiroz, Maurício Motta Braga, Alex Sandro Gomes |
Design de ajudas inteligentes em interfaces educativas. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IHC ![In: VIII Simpósio Brasileiro de Fatores Humanos em Sistemas Computacionais (IHC 2008), De 21 a 24 de Outubro 2008, Porto Alegre, ANAIS (Proceedings of the VIII Brazilian Symposium on Human Factors in Computing Systems 2008, Porto Alegre, RS, Brazil, October 21-24, 2008), pp. 252-255, 2008, ACM, 978-85-7669-203-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
análise instrumental da aprendizagem, interfaces educativas, teoria dos campos conceituais, scaffolding |
16 | Sanjeev Kumar, Einar Petana |
Mitigation of TCP-SYN Attacks with Microsoft's Windows XP Service Pack2 (SP2) Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICN ![In: Seventh International Conference on Networking (ICN 2008), 13-18 April 2008, Cancun, Mexico, pp. 238-242, 2008, IEEE Computer Society, 978-0-7695-3106-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Denial of Service (DoS) attacks, TCP SYN attack, Windows XP Service Pack2 operating system, Internet Security |
16 | Chu-Hsing Lin, Jung-Chun Liu, Hsun-Chi Huang, Tsung-Che Yang |
Using Adaptive Bandwidth Allocation Approach to Defend DDoS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MUE ![In: 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 24-26 April 2008, Busan, Korea, pp. 176-181, 2008, IEEE Computer Society, 978-0-7695-3134-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
bandwidth, network simulator, priority queue, DDoS attack, IP spoofing, DoS attack |
16 | Ivan Martinovic, Frank A. Zdarsky, Matthias Wilhelm 0001, Christian Wegmann, Jens B. Schmitt |
Wireless client puzzles in IEEE 802.11 networks: security by wireless. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the First ACM Conference on Wireless Network Security, WISEC 2008, Alexandria, VA, USA, March 31 - April 02, 2008, pp. 36-45, 2008, ACM, 978-1-59593-814-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
denial-of-service (DoS), wireless security, impersonation attacks, client puzzles |
16 | Antoine Scherrer, Nicolas Larrieu, Philippe Owezarski, Pierre Borgnat, Patrice Abry |
Non-Gaussian and Long Memory Statistical Characterizations for Internet Traffic with Anomalies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 4(1), pp. 56-70, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Traffic statistical modeling, non-Gaussian long-range dependent process, flash crowd, DoS attack |
16 | Virginia N. L. Franqueira, Raul H. C. Lopes |
Vulnerability Assessment by Learning Attack Specifications in Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Third International Symposium on Information Assurance and Security, IAS 2007, August 29-31, 2007, Manchester, United Kingdom, pp. 161-164, 2007, IEEE Computer Society, 978-0-7695-2876-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Network Security, DoS, Intrusion Prevention |
16 | Hung-Yu Chien, Chen-Wei Huang |
A Lightweight RFID Protocol Using Substring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC ![In: Embedded and Ubiquitous Computing, International Conference, EUC 2007, Taipei, Taiwan, December 17-20, 2007, Proceedings, pp. 422-431, 2007, Springer, 978-3-540-77091-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
low-cost cryptography, DOS attack, authentication, RFID, tracing, reader |
16 | Dmitrij Lagutin, Hannu H. Kari |
Controlling Incoming Connections Using Certificates and Distributed Hash Tables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NEW2AN ![In: Next Generation Teletraffic and Wired/Wireless Advanced Networking, 7th International Conference, NEW2AN 2007, St. Petersburg, Russia, September 10-14, 2007, Proceedings, pp. 455-467, 2007, Springer, 978-3-540-74832-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
rights delegation, DoS countermeasures, certificates, Session management, rights management |
16 | Mikhael Felker |
Internet War Games: Power of the Masses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 4(2), pp. 7, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
defense methods, distributed DoS attacks, denial-of-service attacks |
16 | Michael Walfish, Mythili Vutukuru, Hari Balakrishnan, David R. Karger, Scott Shenker |
DDoS defense by offense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Pisa, Italy, September 11-15, 2006, pp. 303-314, 2006, ACM, 1-59593-308-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
bandwidth, DoS attack, currency |
16 | Udaya Kiran Tupakula, Vijay Varadharajan |
Analysis of traceback techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSW ![In: The proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), Hobart, Tasmania, Australia, January 2006, pp. 115-124, 2006, Australian Computer Society, 1-920-68236-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
DoS, denial of service, DDoS, traceback |
16 | Alex C. Snoeren, Craig Partridge, Luis A. Sanchez, Christine E. Jones, Fabrice Tchakountio, Beverly Schwartz, Stephen T. Kent, W. Timothy Strayer |
Single-packet IP traceback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE/ACM Trans. Netw. ![In: IEEE/ACM Trans. Netw. 10(6), pp. 721-734, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
network fault diagnosis, IP, denial of service (DoS), wide-area networks (WANs), computer network management, IP traceback, computer network security |
16 | Tieyan Li, Wai-Meng Chew, Kwok-Yan Lam |
Defending against Distributed Denial of Service Attacks Using Resistant Mobile Agent Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 16th International Parallel and Distributed Processing Symposium (IPDPS 2002), 15-19 April 2002, Fort Lauderdale, FL, USA, CD-ROM/Abstracts Proceedings, 2002, IEEE Computer Society, 0-7695-1573-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
attack resistant, mobile agents, intrusion detection systems, DoS attacks |
16 | Shigeyuki Matsuda, Tatsuya Baba, Akihiro Hayakawa, Taichi Nakamura |
Design and Implementation of Unauthorized Access Tracing System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT ![In: 2002 Symposium on Applications and the Internet (SAINT 2002), 28 January - 1 February 2002, Nara City, Japan, Proceedings, pp. 74-81, 2002, IEEE Computer Society, 0-7695-1447-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
network security, IDS, traceback, unauthorized access, DOS |
16 | Cristina Cifuentes |
An Environment for the Reverse Engineering of Executable Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSEC ![In: 2nd Asia-Pacific Software Engineering Conference (APSEC '95), December 6-9, 1995, Brisbane, Queensland, Australia, pp. 410-419, 1995, IEEE Computer Society, 0-8186-7171-8. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
reverse compiler, i80286, reverse engineering, signatures, C language, disassembler, dos |
16 | Catherine C. Bareiss |
An introductory course on the use of operating systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCSE ![In: Proceedings of the 23rd SIGCSE Technical Symposium on Computer Science Education, SIGCSE 1992, Kansas City, Missouri, USA, March 5-6, 1992, pp. 173-175, 1992, ACM, 0-89791-468-6. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
UNIX, DOS |
16 | Allison J. Mull, P. Tobin Maginnis |
Evolutionary Steps Toward a Distributed Operating System: Theory and Implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 25(4), pp. 4-13, 1991. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
MINIX, DOS |
16 | Paul Reince |
Hard disk management standards in a networked environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 18th Annual ACM SIGUCCS Conference on User Services, Cincinnati, Ohio, USA, September 30 - October 03, 1990, pp. 325-330, 1990, ACM, 0-89791-406-6. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
DOS |
12 | Merly Thomas, B. B. Meshram |
DoS attack detection using Aquila deer hunting optimization enabled deep belief network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Web Inf. Syst. ![In: Int. J. Web Inf. Syst. 20(1), pp. 66-87, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Yong Ma 0002, Xin Qi, Zhixiong Li, Songlin Hu, Miguel Ángel Sotelo |
Resilient Control for Networked Unmanned Surface Vehicles With Dynamic Event-Triggered Mechanism Under Aperiodic DoS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Veh. Technol. ![In: IEEE Trans. Veh. Technol. 73(4), pp. 5824-5833, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Sifan Li, Yue Cao 0002, Shuohan Liu, Yuping Lai, Yongdong Zhu, Naveed Ahmad 0003 |
HDA-IDS: A Hybrid DoS Attacks Intrusion Detection System for IoT by using semi-supervised CL-GAN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Expert Syst. Appl. ![In: Expert Syst. Appl. 238(Part F), pp. 122198, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Mohamed Riadh Kadri, Abdelkrim Abdelli, Jalel Ben-Othman, Lynda Mokdad |
Survey and classification of Dos and DDos attack detection and validation approaches for IoT environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Things ![In: Internet Things 25, pp. 101021, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Yuan-Yuan Li, Yuan-Xin Li 0001 |
Security-based distributed fuzzy funnel cooperative control for uncertain nonlinear multi-agent systems against DoS attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Sci. ![In: Inf. Sci. 661, pp. 120189, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Ling Chen, Guanqi Wang, Feng Li 0009 |
H∞ Filtering for Discrete-Time Singular Markov Jump Systems Under DoS Attacks and Its Application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 12, pp. 48388-48393, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Xiaohua Zhang, Huaxiang Han |
Event-Triggered Finite-Time Filtering for Nonlinear Networked System With Quantization and DOS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 12, pp. 1308-1320, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Liyuan Yin, Lezhong Xu, Fusheng Hou, Hongming Zhu, Houhua Jing, Xingjian Sun, Chengwei Wu |
Security Analysis and Control Under Periodic DoS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 11(5), pp. 8473-8484, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Palanisamy Selvaraj, Oh-Min Kwon 0001, Seung-Hoon Lee, R. Sakthivel 0001, S. M. Lee |
Event-triggered control design with varying gains for polynomial fuzzy systems against DoS attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Math. Comput. Simul. ![In: Math. Comput. Simul. 218, pp. 1-14, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Yifan Zhong, Yuan Yuan 0006, Huanhuan Yuan |
Nash Equilibrium Seeking for Multi-Agent Systems Under DoS Attacks and Disturbances. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Ind. Informatics ![In: IEEE Trans. Ind. Informatics 20(4), pp. 5395-5405, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Tohid Behdadnia, Klaas Thoelen, Fairouz Zobiri, Geert Deconinck |
Leveraging Deep Learning to Increase the Success Rate of DoS Attacks in PMU-Based Automatic Generation Control Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Ind. Informatics ![In: IEEE Trans. Ind. Informatics 20(4), pp. 6075-6088, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Da-Wei Zhang, Guo-Ping Liu 0003 |
Secure Predictive Control for Networked High-Order Fully Actuated Systems Under Random DoS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Ind. Informatics ![In: IEEE Trans. Ind. Informatics 20(4), pp. 6935-6945, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Lusong Ding, Weiwei Sun 0004 |
Neuroadaptive prescribed-time secure control for nonlinear interconnected NCSs via multiple triggering against DoS attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Math. Comput. ![In: Appl. Math. Comput. 470, pp. 128562, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Shenshen Li, Haibo Du, Weile Chen, Wenwu Zhu 0004 |
Design of non-smooth consensus protocol for multi-agent systems under DoS attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Math. Comput. ![In: Appl. Math. Comput. 463, pp. 128360, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Ming-Juan Guo, Yuan-Xin Li 0001 |
Estimator-based adaptive prescribed performance cooperative bipartite containment control of nonlinear multiagent system against DoS attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Math. Comput. ![In: Appl. Math. Comput. 470, pp. 128585, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Xinyu Guan, Yanyan Hu, Kaixiang Peng |
Finite-time switching-like sliding mode fault-tolerant control for discrete-time cyber-physical systems under DoS attacks and intermittent faults. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Math. Comput. ![In: Appl. Math. Comput. 469, pp. 128530, May 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Chenhang Yan, Liping Yan, Yuezu Lv, Yuanqing Xia |
Adaptive Event-Triggered Resilient Control of Heterogeneous Multiagent Under DoS Attacks and Link Faults on Directed Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Netw. Sci. Eng. ![In: IEEE Trans. Netw. Sci. Eng. 11(1), pp. 834-847, January - February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Lili Li, Di Rong, Jun Fu 0001, Qingjun Guo |
Multi-Level Event-Triggered Scheme of Output Regulation Under Long-Duration DoS Attacks in Switched Systems With Dissipativity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Netw. Sci. Eng. ![In: IEEE Trans. Netw. Sci. Eng. 11(2), pp. 1631-1641, March - April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Jinliang Liu, Yanhui Dong, Zhou Gu, Xiangpeng Xie, Engang Tian |
Security consensus control for multi-agent systems under DoS attacks via reinforcement learning method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Frankl. Inst. ![In: J. Frankl. Inst. 361(1), pp. 164-176, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Chenrui Zhang, Yiming Jiang 0014, Shuang Shen, Rediet Tesfaye Zeru, Yuanqing Xia, Senchun Chai |
Inherent attack tolerance properties of model predictive control under DoS attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Frankl. Inst. ![In: J. Frankl. Inst. 361(3), pp. 1371-1385, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
Displaying result #601 - #700 of 10178 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ 16][ >>] |
|