The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase denial of service (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1983-1997 (18) 1998-2000 (43) 2001 (40) 2002 (54) 2003 (105) 2004 (119) 2005 (183) 2006 (185) 2007 (161) 2008 (168) 2009 (116) 2010 (60) 2011 (58) 2012 (42) 2013 (39) 2014 (52) 2015 (68) 2016 (49) 2017 (60) 2018 (75) 2019 (14)
Publication types (Num. hits)
article(477) book(2) incollection(15) inproceedings(1201) phdthesis(14)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1352 occurrences of 577 keywords

Results
Found 1709 publication records. Showing 1709 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
105Virgil D. Gligor, Matt Blaze, John Ioannidis Denial of Service - Panel Discussion. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
98Douglas Stebila, Berkant Ustaoglu Towards Denial-of-Service-Resilient Key Agreement Protocols. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
88D. W. Gresty, Qi Shi, Madjid Merabti Requirements for a General Framework for Response to Distributed Denial-of-Service. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
84Marcus Tylutki, Karl N. Levitt Mitigating Distributed Denial of Service Attacks Using a Proportional-Integral-Derivative Controller. Search on Bibsonomy RAID The full citation details ... 2003 DBLP  DOI  BibTeX  RDF PID control law, Automated Response, Denial of Service, DoS, Distributed Denial of Service, DDoS, Control Theory, Distributed Attacks
82Philip L. Campbell The Denial-of-Service Dance. Search on Bibsonomy IEEE Security & Privacy The full citation details ... 2005 DBLP  DOI  BibTeX  RDF network denial of service, Trinoo, TFN, Smurf, UDP flood, Land, Targa, denial of service, worms, distributed denial of service, SYN flood, spoofing
76Jelena Mirkovic, Peter L. Reiher, Sonia Fahmy, Roshan K. Thomas, Alefiya Hussain, Stephen Schwab, Calvin Ko Measuring denial Of service. Search on Bibsonomy QoP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF metrics, denial of service
65David Moore 0001, Colleen Shannon, Douglas J. Brown, Geoffrey M. Voelker, Stefan Savage Inferring Internet denial-of-service activity. Search on Bibsonomy ACM Trans. Comput. Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Backscatter, network security, denial-of-service, network measurement
65Wenyuan Xu, Timothy Wood 0001, Wade Trappe, Yanyong Zhang Channel surfing and spatial retreats: defenses against wireless denial of service. Search on Bibsonomy Workshop on Wireless Security The full citation details ... 2004 DBLP  DOI  BibTeX  RDF denial of service, Jamming, CSMA
63Jelena Mirkovic, Alefiya Hussain, Sonia Fahmy, Peter L. Reiher, Roshan K. Thomas Accurately Measuring Denial of Service in Simulation and Testbed Experiments. Search on Bibsonomy IEEE Trans. Dependable Sec. Comput. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
58Nikita Borisov, George Danezis, Prateek Mittal, Parisa Tabriz Denial of service or denial of security? Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2007 DBLP  DOI  BibTeX  RDF reliability, anonymity, denial of service, attacks
57Srinivas Mukkamala, Andrew H. Sung Computational Intelligent Techniques for Detecting Denial of Service Attacks. Search on Bibsonomy IEA/AIE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
57Che-Fn Yu, Virgil D. Gligor A Specification and Verification Method for Preventing Denial of Service. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1990 DBLP  DOI  BibTeX  RDF failure absence, integrity violations, user agreements, simultaneity conditions, denial-of-service prevention, formal specification, concurrent programs, security of data, specification method, verification method
55Yalin Evren Sagduyu, Anthony Ephremides A game-theoretic analysis of denial of service attacks in wireless random access. Search on Bibsonomy Wireless Networks The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Malicious operation, Adaptive update algorithms, Wireless networks, Game theory, Cooperation, Medium access control, Pricing, Competition, Distributed control, Random access, Denial of service attacks
55Timothy X. Brown, Amita Sethi Potential Cognitive Radio Denial-of-Service Vulnerabilities and Protection Countermeasures: a Multi-dimensional Analysis and Assessment. Search on Bibsonomy MONET The full citation details ... 2008 DBLP  DOI  BibTeX  RDF denial of service, cognitive radio, vulnerability, countermeasure
55George S. Oreku, Jianzhong Li, Tamara Pazynyuk An application-driven perspective on wireless devises security: the case of distributed denial-of-service (ddos). Search on Bibsonomy PM2HW2N The full citation details ... 2007 DBLP  DOI  BibTeX  RDF handheld devices, distributed denial of service attacks (DDoS), wireless sensor nodes
55Aleksandar Kuzmanovic, Edward W. Knightly Low-rate TCP-targeted denial of service attacks and counter strategies. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF TCP, TCP/IP, denial of service, retransmission timeout
55Amit B. Kulkarni, Stephen F. Bush Detecting Distributed Denial-of-Service Attacks Using Kolmogorov Complexity Metrics. Search on Bibsonomy J. Network Syst. Manage. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF complexity probes, entropy, active network, Kolmogorov Complexity, denial-of-service attack
55Jason Smith 0001, Juan Manuel González Nieto, Colin Boyd Modelling denial of service attacks on JFK with Meadows's cost-based framework. Search on Bibsonomy ACSW The full citation details ... 2006 DBLP  BibTeX  RDF security analysis methodologies, cryptographic protocols, denial of service
55Valer Bocan, Vladimir Cretu Mitigating Denial of Service Threats in GSM Networks. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF 2G, security, wireless networks, denial of service, attack, GSM, GPRS
55Sanjeev Kumar Impact of Distributed Denial of Service (DDoS) Attack Due to ARP Storm. Search on Bibsonomy ICN (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF ARP attack, Distributed Denial of Service Attacks, Computer Network Security
55Ashraf Matrawy, Paul C. van Oorschot, Anil Somayaji Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF network denial of service, flash worms, network security, diversity, traffic shaping
55Dimitris Gavrilis, Ioannis G. Tsoulos, Evangelos Dermatas Feature Selection for Robust Detection of Distributed Denial-of-Service Attacks Using Genetic Algorithms. Search on Bibsonomy SETN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Genetic Algorithms, Neural Networks, Denial of Service
55Aleksandar Kuzmanovic, Edward W. Knightly Low-rate TCP-targeted denial of service attacks: the shrew vs. the mice and elephants. Search on Bibsonomy SIGCOMM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF TCP, denial of service, retransmission timeout
55Shouhuai Xu, Ravi S. Sandhu Authenticated multicast immune to denial-of-service attack. Search on Bibsonomy SAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF multicast authentication, denial-of-service
54Guoxing Zhang, Shengming Jiang, Gang Wei, Quansheng Guan A prediction-based detection algorithm against distributed denial-of-service attacks. Search on Bibsonomy IWCMC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF available service rate, prediction-based detection of DDoS and low-rate TCP attacks, distributed DoS (DDoS), denial-of-service attacks (DoS)
53Jelena Mirkovic, Alefiya Hussain, Brett Wilson, Sonia Fahmy, Peter L. Reiher, Roshan K. Thomas, Wei-Min Yao, Stephen Schwab Towards user-centric metrics for denial-of-service measurement. Search on Bibsonomy Experimental Computer Science The full citation details ... 2007 DBLP  DOI  BibTeX  RDF metrics, denial of service
53José Carlos Brustoloni Protecting electronic commerce from distributed denial-of-service attacks. Search on Bibsonomy WWW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF quality of service, electronic commerce, denial of service
51Marek Hejmo, Brian L. Mark, Charikleia Zouridaki, Roshan K. Thomas Denial-of-service resistant quality-of-service signaling for mobile ad hoc networks. Search on Bibsonomy SASN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF qos signaling, security, quality of service, ad hoc networks, denial of service, attacks
51Chu-Hsing Lin, Jung-Chun Liu, Hsun-Chi Huang, Tsung-Che Yang Using Adaptive Bandwidth Allocation Approach to Defend DDoS Attacks. Search on Bibsonomy MUE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF bandwidth, network simulator, priority queue, DDoS attack, IP spoofing, DoS attack
51Tuomas Aura DOS-Resistant Authentication with Client Puzzles (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
48Gaeil An, Joon S. Park Packet Marking Based Cooperative Attack Response Service for Effectively Handling Suspicious Traffic. Search on Bibsonomy Inscrypt The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Attack Response, Quality of Service, Network Security, Packet Marking, Denial of Service Attack
47H. R. Nagesh, K. Chandra Sekaran, Adarsh Rao Kordcal Proactive model for Mitigating Internet Denial-of-Service Attacks. Search on Bibsonomy ITNG The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
47Tao Peng 0002, Christopher Leckie, Kotagiri Ramamohanarao Proactively Detecting Distributed Denial of Service Attacks Using Source IP Address Monitoring. Search on Bibsonomy NETWORKING The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
47Jun (Jim) Xu, Wooyong Lee Sustaining Availability of Web Services under Distributed Denial of Service Attacks. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2003 DBLP  DOI  BibTeX  RDF World-Wide Web, game theory, Availability, survivability, Distributed Denial of Service (DDoS)
47Sazia Parvin, Shohrab Ali, Song Han, Tharam S. Dillon Security against DOS attack in mobile IP communication. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF care-of-address (coa), correspondent node (cn), denial-of-service (dos), distributed denial-of-service (ddos), foreign agent (fa), home agent (ha), mobile host (mh), mobile node (mn)
45Seonho Choi Denial-of-Service Resistant Multicast Authentication Protocol with Prediction Hashing and One-way Key Chain. Search on Bibsonomy ISM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
45Xin Liu, Xiaowei Yang, Yong Xia NetFence: preventing internet denial of service from inside out. Search on Bibsonomy SIGCOMM The full citation details ... 2010 DBLP  DOI  BibTeX  RDF congestion policing, internet, denial-of-service, capability
45Jiangtao Li 0001, Ninghui Li, XiaoFeng Wang 0001, Ting Yu Denial of service attacks and defenses in decentralized trust management. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Access control, Game theory, Denial of service, Trust management, Trust negotiation
45José M. Garrido Understanding distributed denial of service with object oriented simulation. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2009 DBLP  DOI  BibTeX  RDF network security, discrete event simulation, denial of service, protection
45Norman Danner, Danny Krizanc, Marc Liberatore Detecting Denial of Service Attacks in Tor. Search on Bibsonomy Financial Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF reliability, Anonymity, denial of service, detection, attack
45Martin Eian Fragility of the Robust Security Network: 802.11 Denial of Service. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF 802.11w, Security, Wireless, Denial of Service, 802.11, 802.11i
45Jayashree Padmanabhan, K. S. Easwarakumar, Gokul B., Harishankar S. Trust based traffic monitoring approach for preventing denial of service attacks. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF clustering, networks, trust, denial of service, centroid, dos
45David R. Raymond, Scott F. Midkiff Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses. Search on Bibsonomy IEEE Pervasive Computing The full citation details ... 2008 DBLP  DOI  BibTeX  RDF denial-of-sleep attacks, security, wireless sensor networks, Denial-of-service attacks
45Roman Chertov, Sonia Fahmy, Ness B. Shroff Fidelity of network simulation and emulation: A case study of TCP-targeted denial of service attacks. Search on Bibsonomy ACM Trans. Model. Comput. Simul. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF low-rate TCP-targeted attacks, Simulation, congestion control, TCP, emulation, testbeds, denial of service attacks
45XiaoFeng Wang 0001, Michael K. Reiter A multi-layer framework for puzzle-based denial-of-service defense. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Denial of service, Network protocols, Client puzzles
45Siddharth Maru, Timothy X. Brown Denial of service vulnerabilities in the 802.16 protocol. Search on Bibsonomy WICON The full citation details ... 2008 DBLP  DOI  BibTeX  RDF encryption, denial of service, traffic analysis, IEEE 802.16, sensing, jamming, broadband wireless access
45Gal Badishi, Idit Keidar Improving denial of service resistance using dynamic local adaptations. Search on Bibsonomy SAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF adaptive denial-of-service resistance, adaptive gossip-based protocols, application-level multicast
45Rajani Muraleedharan, Lisa Ann Osadciw Secure Health Monitoring Network against Denial-Of-Service Attacks Using Cognitive Intelligence. Search on Bibsonomy CNSR The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Cognitive Intelligence, Sensor Network, Ant Colony Optimization, Denial-of-Service
45Marek Ostaszewski, Pascal Bouvry, Franciszek Seredynski Denial of service detection and analysis using idiotypic networks paradigm. Search on Bibsonomy GECCO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF idiotypic networks, denial of service
45Baruch Awerbuch, Christian Scheideler A denial-of-service resistant DHT. Search on Bibsonomy PODC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF distributed information systems, denial-of-service attacks
45Alex Wun, Alex King Yeung Cheung, Hans-Arno Jacobsen A taxonomy for denial of service attacks in content-based publish/subscribe systems. Search on Bibsonomy DEBS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, denial of service, publish/subscribe
45Ronghua Wang, Wenliang Du, Peng Ning Containing denial-of-service attacks in broadcast authentication in sensor networks. Search on Bibsonomy MobiHoc The full citation details ... 2007 DBLP  DOI  BibTeX  RDF broadcast delay, security, wireless sensor networks, energy saving, denial of service attack
45Joseph Chee Ming Teo, Chik How Tan Denial-of-service resilience password-based group key agreement for wireless networks. Search on Bibsonomy Q2SWinet The full citation details ... 2007 DBLP  DOI  BibTeX  RDF denial-of-service, group key agreement, secure group communication, password-based authentication
45Steven Cheung Denial of Service against the Domain Name System. Search on Bibsonomy IEEE Security & Privacy The full citation details ... 2006 DBLP  DOI  BibTeX  RDF denial of service, countermeasures, domain name system, threat analysis, network infrastructure
45Glenn Carl, George Kesidis, Richard R. Brooks, Suresh Rai Denial-of-Service Attack-Detection Techniques. Search on Bibsonomy IEEE Internet Computing The full citation details ... 2006 DBLP  DOI  BibTeX  RDF denial-of-service, DoS, flooding attacks
45Mudhakar Srivatsa, Arun Iyengar, Jian Yin, Ling Liu 0001 A Client-Transparent Approach to Defend Against Denial of Service Attacks. Search on Bibsonomy SRDS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Client Transparency, Denial of Service (DoS) attacks, Authentication, Availability, Web Servers
45David K. Y. Yau, John C. S. Lui, Feng Liang, Yeung Yam Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF router throttling, network security, congestion control, distributed denial of service
45Ying Xu, Roch Guérin On the robustness of router-based denial-of-service (DoS) defense systems. Search on Bibsonomy Computer Communication Review The full citation details ... 2005 DBLP  DOI  BibTeX  RDF router-based defense, denial-of-service
45Dan Dumitriu, Edward W. Knightly, Aleksandar Kuzmanovic, Ion Stoica, Willy Zwaenepoel Denial-of-service resilience in peer-to-peer file sharing systems. Search on Bibsonomy SIGMETRICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF file pollution, network-targeted attacks, peer-to-peer, denial of service
45P. Sharma, P. Shah, S. Bhattacharya Mirror Hopping Approach for Selective Denial of Service Prevention. Search on Bibsonomy WORDS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Mirror sites, E-Commerce, Information Security, Denial of Service, HTTP
45Alefiya Hussain, John S. Heidemann, Christos Papadopoulos A framework for classifying denial of service attacks. Search on Bibsonomy SIGCOMM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF security, measurement, time series analysis, denial of service attacks
45Jaeyeon Jung, Balachander Krishnamurthy, Michael Rabinovich Flash crowds and denial of service attacks: characterization and implications for CDNs and web sites. Search on Bibsonomy WWW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF content distribution network performance, web workload characterization, World Wide Web (WWW), flash crowd, denial of service attack
45Nathalie Weiler Honeypots for Distributed Denial of Service Attacks. Search on Bibsonomy WETICE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Security Practices, Honeypot, Distributed Denial of Service Attacks
45Stamatis Karnouskos Dealing with Denial-of-Service Attacks in Agent-enabled Active and Programmable Infrastructures. Search on Bibsonomy COMPSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Intrusion Detection Systems, Active Networks, Agent Technology, Distributed Denial of Service Attacks
45E. Strother Denial of Service Protection - The Nozzle. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF denial of service protection, nozzle, domain name server, network pumps, untrusted user, trusted traffic, packet placement, protocols, protocol, intrusion detection, computer networks, Web server, firewalls, cost, authorisation, telecommunication security, network resource
44Srinivas Padmanabhuni, Vineet Singh, K. M. Senthil Kumar, Abhishek Chatterjee Preventing Service Oriented Denial of Service (PreSODoS): A Proposed Approach. Search on Bibsonomy ICWS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
40Xianglin Deng, Malcolm Shore Advanced Flooding Attack on a SIP Server. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
40Tao Peng 0002, Christopher Leckie, Kotagiri Ramamohanarao Survey of network-based defense mechanisms countering the DoS and DDoS problems. Search on Bibsonomy ACM Comput. Surv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF DNS reflector attack, bandwidth attack, resource management, DoS, DDoS, Botnet, Internet security, IP traceback, IRC, IP spoofing, SYN flood, VoIP security
39Haining Wang, Kang G. Shin Transport-Aware IP Routers: A Built-In Protection Mechanism to Counter DDoS Attacks. Search on Bibsonomy IEEE Trans. Parallel Distrib. Syst. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Distributed Denial of Service (DDoS) attacks, layer-4 differentiation, resource isolation, packet classification
39Yuh-Min Tseng Efficient authenticated key agreement protocols resistant to a denial-of-service attack. Search on Bibsonomy Int. Journal of Network Management The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
39Roger M. Needham Denial of Service. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
39Zhang Fu, Marina Papatriantafilou, Philippas Tsigas, Wei Wei 0013 Mitigating denial of capability attacks using sink tree based quota allocation. Search on Bibsonomy SAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF denial-of-capability, sink tree, denial-of-service
39Iftikhar Ahmad 0002, Azween B. Abdullah, Abdullah Sharaf Alghamdi Application of artificial neural network in detection of DOS attacks. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF internet control message protocol, multiple layered perceptron, resilient backpropagation, neural network, artificial neural network, false positive, dataset, false negative, detection rate, denial of service attack
39Steven Cheung, Bruno Dutertre, Ulf Lindqvist Detecting Disruptive Routers in Wireless Sensor Networks. Search on Bibsonomy ADHOC-NOW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF sensor networks, intrusion detection, Denial of service, routing security
39Seonho Choi, Yanggon Kim Resource Requirement Analysis for a Predictive-Hashing Based Multicast Authentication Protocol. Search on Bibsonomy EUC Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cryptographic hashing, authentication, protocol, multicast, denial-of-service, resource requirement
39Eun-Jun Yoon, Kee-Young Yoo One-Time Password Authentication Scheme Using Smart Cards Providing User Anonymity. Search on Bibsonomy ICCSA (5) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Security, Cryptography, Smart card, User authentication, One-time password, Denial-of-Service attacks
39Bernardo Alarcos, María Calderón, Marifeli Sedano, Juan R. Velasco DoS Protection for a Pragmatic Multiservice Network Based on Programmable Networks. Search on Bibsonomy Autonomic Networking The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Security, Denial of Service, Active Networks
39Ya-Fen Chang, Chin-Chen Chang 0001 A secure and efficient strong-password authentication protocol. Search on Bibsonomy Operating Systems Review The full citation details ... 2004 DBLP  DOI  BibTeX  RDF strong password, smart card, password authentication, mutual authentication, denial-of-service attack, stolen-verifier attack
39Mike Just, Evangelos Kranakis, Tao Wan Resisting Malicious Packet Dropping in Wireless Ad Hoc Networks. Search on Bibsonomy ADHOC-NOW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Distributed Probing, Security, Wireless Ad Hoc Networks, Denial of Service (DoS), Secure Routing Protocols
39Fan Min, Jun-yan Zhang, Guo-wie Yang An IP Traceback Scheme Integrating DPM and PPM. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Deterministic Packet Marking, Denial of Service, IP traceback, IP spoofing, Probabilistic Packet Marking
39Christopher D. Gill RT-POD: A Framework for Real-Time Systems Participation in Own Defense. Search on Bibsonomy WORDS Fall The full citation details ... 2003 DBLP  DOI  BibTeX  RDF real-time security, temporal signatures, denial of service, middleware frameworks
38Meiko Jensen, Nils Gruschka, Norbert Luttenberger The Impact of Flooding Attacks on Network-based Services. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Web Services, availability, DoS, attacks, flooding
37Alberto López Toledo, Xiaodong Wang Robust Detection of MAC Layer Denial-of-Service Attacks in CSMA/CA Wireless Networks. Search on Bibsonomy IEEE Trans. Information Forensics and Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37William Conner, Klara Nahrstedt Protecting SIP Proxy Servers from Ringing-Based Denial-of-Service Attacks. Search on Bibsonomy ISM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Erol Gelenbe, Michael Gellman, George Loukas An Autonomic Approach to Denial of Service Defence. Search on Bibsonomy WOWMOM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
37Bao-Tung Wang, Henning Schulzrinne A denial-of-service-resistant IP traceback approach. Search on Bibsonomy ISCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
37Clayton Bolz, W. Romney, Brandon L. Rogers Safely train security engineers regarding the dangers presented by denial of service attacks. Search on Bibsonomy SIGITE Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF DoS lab, isolated lab, network security, information technology, DDoS
37W. J. Blackert, D. M. Gregg, A. K. Castner, E. M. Kyle, R. L. Hom, R. M. Jokerst Analyzing Interaction Between Distributed Denial of Service Attacks And Mitigation Technologies. Search on Bibsonomy DISCEX (1) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
37Tao Peng 0002, Christopher Leckie, Kotagiri Ramamohanarao Detecting Distributed Denial of Service Attacks by Sharing Distributed Beliefs. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
37Anthony D. Wood, John A. Stankovic Denial of Service in Sensor Networks. Search on Bibsonomy IEEE Computer The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
37Biljana Cubaleska, Markus Schneider 0002 A Method for Protecting Mobile Agents against Denial of Service Attacks. Search on Bibsonomy CIA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
37DongGook Park, JungJoon Kim, Colin Boyd, Ed Dawson Cryptographic Salt: A Countermeasure against Denial-of-Service Attacks. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
37Catherine A. Meadows A Formal Framework and Evaluation Method for Network Denial of Service. Search on Bibsonomy CSFW The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
37Chang-Lung Tsai, Allen Y. Chang, Ming-Szu Huang Early Warning System for DDoS Attacking Based on Multilayer Deployment of Time Delay Neural Network. Search on Bibsonomy IIH-MSP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Internet hacking, Information security, Denial of service, Distributed denial of service, Time-delay neural network
36Fareed Zaffar, Gershon Kedem A Service Architecture for Countering Distributed Denial of Service Attacks. Search on Bibsonomy AINA Workshops (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
36Ao-Jan Su, Aleksandar Kuzmanovic Thinning akamai. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF akamai, cdn, streaming, denial of service
35Suriadi Suriadi, Douglas Stebila, Andrew J. Clark, Hua Liu Defending Web Services against Denial of Service Attacks Using Client Puzzles. Search on Bibsonomy ICWS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF web services, client puzzles, denial of service attacks
35Mohammed A. Alhabeeb, Phu Dung Le, Bala Srinivasan 0002 Evaluating the Functionality of the Token Filtering Technique in Filtering Denial of Service Packets Using a New Formal Evaluation Model. Search on Bibsonomy ISPA The full citation details ... 2011 DBLP  DOI  BibTeX  RDF Token Filtering Technique, Denial of Service, packet filtering, flooding attack
35Mohammed A. Alhabeeb, Phu Dung Le, Bala Srinivasan 0002 Preventing Denial of Service Attacks in Government E-Services Using a New Efficient Packet Filtering Technique. Search on Bibsonomy ISPA The full citation details ... 2011 DBLP  DOI  BibTeX  RDF Token Filtering Technique, Denial of Service, flooding attack
35Raja Sekhar Reddy Gade, Hari Krishna Vellalacheruvu, Sanjeev Kumar Performance of Windows XP, Windows Vista and Apple's Leopard Computers under a Denial of Service Attack. Search on Bibsonomy ICDS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Denial of Service (DoS) Attack, Internet Control Message Protocol (ICMP), Land Attack, Ping utility
Displaying result #1 - #100 of 1709 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license