|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1449 occurrences of 631 keywords
|
|
|
Results
Found 2746 publication records. Showing 2745 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
73 | Douglas Stebila, Berkant Ustaoglu |
Towards Denial-of-Service-Resilient Key Agreement Protocols. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
|
73 | Virgil D. Gligor, Matt Blaze, John Ioannidis |
Denial of Service - Panel Discussion. |
Security Protocols Workshop |
2000 |
DBLP DOI BibTeX RDF |
|
66 | D. W. Gresty, Qi Shi 0001, Madjid Merabti |
Requirements for a General Framework for Response to Distributed Denial-of-Service. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
62 | Marcus Tylutki, Karl N. Levitt |
Mitigating Distributed Denial of Service Attacks Using a Proportional-Integral-Derivative Controller. |
RAID |
2003 |
DBLP DOI BibTeX RDF |
PID control law, Automated Response, Denial of Service, DoS, Distributed Denial of Service, DDoS, Control Theory, Distributed Attacks |
61 | Philip L. Campbell |
The Denial-of-Service Dance. |
IEEE Secur. Priv. |
2005 |
DBLP DOI BibTeX RDF |
network denial of service, Trinoo, TFN, Smurf, UDP flood, Land, Targa, denial of service, worms, distributed denial of service, SYN flood, spoofing |
55 | Zhang Fu, Marina Papatriantafilou, Philippas Tsigas, Wei Wei 0013 |
Mitigating denial of capability attacks using sink tree based quota allocation. |
SAC |
2010 |
DBLP DOI BibTeX RDF |
denial-of-capability, sink tree, denial-of-service |
55 | Vladimir V. Shakhov, Hyunseung Choo |
Denial of Sleeping: Performance Analysis and Counteracting Strategy. |
APCHI |
2008 |
DBLP DOI BibTeX RDF |
Denial of sleeping, Wireless sensor networks, Denial of Service, Energy consumption |
51 | Vijay Kumar Singh, Bhaskar Pratap Singh, Özgür Kisi, Denial Prakash Kushwaha |
Spatial and multi-depth temporal soil temperature assessment by assimilating satellite imagery, artificial intelligence and regression based models in arid area. |
Comput. Electron. Agric. |
2018 |
DBLP DOI BibTeX RDF |
|
49 | David Moore 0001, Colleen Shannon, Douglas J. Brown, Geoffrey M. Voelker, Stefan Savage |
Inferring Internet denial-of-service activity. |
ACM Trans. Comput. Syst. |
2006 |
DBLP DOI BibTeX RDF |
Backscatter, network security, denial-of-service, network measurement |
49 | Jelena Mirkovic, Peter L. Reiher, Sonia Fahmy, Roshan K. Thomas, Alefiya Hussain, Stephen Schwab, Calvin Ko |
Measuring denial Of service. |
QoP |
2006 |
DBLP DOI BibTeX RDF |
metrics, denial of service |
49 | Wenyuan Xu 0001, Timothy Wood 0001, Wade Trappe, Yanyong Zhang |
Channel surfing and spatial retreats: defenses against wireless denial of service. |
Workshop on Wireless Security |
2004 |
DBLP DOI BibTeX RDF |
denial of service, Jamming, CSMA |
47 | David R. Raymond, Scott F. Midkiff |
Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses. |
IEEE Pervasive Comput. |
2008 |
DBLP DOI BibTeX RDF |
denial-of-sleep attacks, security, wireless sensor networks, Denial-of-service attacks |
46 | Nikita Borisov, George Danezis, Prateek Mittal, Parisa Tabriz |
Denial of service or denial of security? |
CCS |
2007 |
DBLP DOI BibTeX RDF |
reliability, anonymity, denial of service, attacks |
43 | Jelena Mirkovic, Alefiya Hussain, Sonia Fahmy, Peter L. Reiher, Roshan K. Thomas |
Accurately Measuring Denial of Service in Simulation and Testbed Experiments. |
IEEE Trans. Dependable Secur. Comput. |
2009 |
DBLP DOI BibTeX RDF |
|
43 | Srinivas Mukkamala, Andrew H. Sung |
Computational Intelligent Techniques for Detecting Denial of Service Attacks. |
IEA/AIE |
2004 |
DBLP DOI BibTeX RDF |
|
41 | Yalin Evren Sagduyu, Anthony Ephremides |
A game-theoretic analysis of denial of service attacks in wireless random access. |
Wirel. Networks |
2009 |
DBLP DOI BibTeX RDF |
Malicious operation, Adaptive update algorithms, Wireless networks, Game theory, Cooperation, Medium access control, Pricing, Competition, Distributed control, Random access, Denial of service attacks |
41 | Timothy X. Brown, Amita Sethi |
Potential Cognitive Radio Denial-of-Service Vulnerabilities and Protection Countermeasures: a Multi-dimensional Analysis and Assessment. |
Mob. Networks Appl. |
2008 |
DBLP DOI BibTeX RDF |
denial of service, cognitive radio, vulnerability, countermeasure |
41 | George S. Oreku, Jianzhong Li 0001, Tamara Pazynyuk |
An application-driven perspective on wireless devises security: the case of distributed denial-of-service (ddos). |
PM2HW2N |
2007 |
DBLP DOI BibTeX RDF |
handheld devices, distributed denial of service attacks (DDoS), wireless sensor nodes |
41 | Aleksandar Kuzmanovic, Edward W. Knightly |
Low-rate TCP-targeted denial of service attacks and counter strategies. |
IEEE/ACM Trans. Netw. |
2006 |
DBLP DOI BibTeX RDF |
TCP, TCP/IP, denial of service, retransmission timeout |
41 | Amit B. Kulkarni, Stephen F. Bush |
Detecting Distributed Denial-of-Service Attacks Using Kolmogorov Complexity Metrics. |
J. Netw. Syst. Manag. |
2006 |
DBLP DOI BibTeX RDF |
complexity probes, entropy, active network, Kolmogorov Complexity, denial-of-service attack |
41 | Valer Bocan, Vladimir Cretu |
Mitigating Denial of Service Threats in GSM Networks. |
ARES |
2006 |
DBLP DOI BibTeX RDF |
2G, security, wireless networks, denial of service, attack, GSM, GPRS |
41 | Jason Smith 0001, Juan Manuel González Nieto, Colin Boyd |
Modelling denial of service attacks on JFK with Meadows's cost-based framework. |
ACSW |
2006 |
DBLP BibTeX RDF |
security analysis methodologies, cryptographic protocols, denial of service |
41 | Ashraf Matrawy, Paul C. van Oorschot, Anil Somayaji |
Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
network denial of service, flash worms, network security, diversity, traffic shaping |
41 | Sanjeev Kumar |
Impact of Distributed Denial of Service (DDoS) Attack Due to ARP Storm. |
ICN (2) |
2005 |
DBLP DOI BibTeX RDF |
ARP attack, Distributed Denial of Service Attacks, Computer Network Security |
41 | Dimitris Gavrilis, Ioannis G. Tsoulos, Evangelos Dermatas |
Feature Selection for Robust Detection of Distributed Denial-of-Service Attacks Using Genetic Algorithms. |
SETN |
2004 |
DBLP DOI BibTeX RDF |
Genetic Algorithms, Neural Networks, Denial of Service |
41 | Aleksandar Kuzmanovic, Edward W. Knightly |
Low-rate TCP-targeted denial of service attacks: the shrew vs. the mice and elephants. |
SIGCOMM |
2003 |
DBLP DOI BibTeX RDF |
TCP, denial of service, retransmission timeout |
41 | Shouhuai Xu, Ravi S. Sandhu |
Authenticated multicast immune to denial-of-service attack. |
SAC |
2002 |
DBLP DOI BibTeX RDF |
multicast authentication, denial-of-service |
41 | Che-Fn Yu, Virgil D. Gligor |
A Specification and Verification Method for Preventing Denial of Service. |
IEEE Trans. Software Eng. |
1990 |
DBLP DOI BibTeX RDF |
failure absence, integrity violations, user agreements, simultaneity conditions, denial-of-service prevention, formal specification, concurrent programs, security of data, specification method, verification method |
38 | Chu-Hsing Lin, Jung-Chun Liu, Hsun-Chi Huang, Tsung-Che Yang |
Using Adaptive Bandwidth Allocation Approach to Defend DDoS Attacks. |
MUE |
2008 |
DBLP DOI BibTeX RDF |
bandwidth, network simulator, priority queue, DDoS attack, IP spoofing, DoS attack |
38 | Tuomas Aura |
DOS-Resistant Authentication with Client Puzzles (Transcript of Discussion). |
Security Protocols Workshop |
2000 |
DBLP DOI BibTeX RDF |
|
35 | Haiyang Qian, Steve Dispensa, Deep Medhi |
Optimizing request denial and latency in an agent-based VPN architecture. |
NOMS |
2008 |
DBLP DOI BibTeX RDF |
|
35 | H. R. Nagesh, K. Chandra Sekaran, Adarsh Rao Kordcal |
Proactive model for Mitigating Internet Denial-of-Service Attacks. |
ITNG |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Seonho Choi |
Denial-of-Service Resistant Multicast Authentication Protocol with Prediction Hashing and One-way Key Chain. |
ISM |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Tao Peng 0002, Christopher Leckie, Kotagiri Ramamohanarao |
Proactively Detecting Distributed Denial of Service Attacks Using Source IP Address Monitoring. |
NETWORKING |
2004 |
DBLP DOI BibTeX RDF |
|
35 | Luciano Rila |
Denial of Access in Biometrics-Based Authentication Systems. |
InfraSec |
2002 |
DBLP DOI BibTeX RDF |
|
35 | Sazia Parvin, Shohrab Ali, Song Han 0004, Tharam S. Dillon |
Security against DOS attack in mobile IP communication. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
care-of-address (coa), correspondent node (cn), denial-of-service (dos), distributed denial-of-service (ddos), foreign agent (fa), home agent (ha), mobile host (mh), mobile node (mn) |
34 | Xin Liu 0059, Xiaowei Yang 0001, Yong Xia 0008 |
NetFence: preventing internet denial of service from inside out. |
SIGCOMM |
2010 |
DBLP DOI BibTeX RDF |
congestion policing, internet, denial-of-service, capability |
34 | Jiangtao Li 0001, Ninghui Li, XiaoFeng Wang 0001, Ting Yu 0001 |
Denial of service attacks and defenses in decentralized trust management. |
Int. J. Inf. Sec. |
2009 |
DBLP DOI BibTeX RDF |
Access control, Game theory, Denial of service, Trust management, Trust negotiation |
34 | Norman Danner, Danny Krizanc, Marc Liberatore |
Detecting Denial of Service Attacks in Tor. |
Financial Cryptography |
2009 |
DBLP DOI BibTeX RDF |
reliability, Anonymity, denial of service, detection, attack |
34 | Jayashree Padmanabhan, K. S. Easwarakumar, Gokul B., Harishankar S. |
Trust based traffic monitoring approach for preventing denial of service attacks. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
clustering, networks, trust, denial of service, centroid, dos |
34 | Guoxing Zhang, Shengming Jiang, Gang Wei, Quansheng Guan |
A prediction-based detection algorithm against distributed denial-of-service attacks. |
IWCMC |
2009 |
DBLP DOI BibTeX RDF |
available service rate, prediction-based detection of DDoS and low-rate TCP attacks, distributed DoS (DDoS), denial-of-service attacks (DoS) |
34 | José M. Garrido |
Understanding distributed denial of service with object oriented simulation. |
ACM Southeast Regional Conference |
2009 |
DBLP DOI BibTeX RDF |
network security, discrete event simulation, denial of service, protection |
34 | Martin Eian |
Fragility of the Robust Security Network: 802.11 Denial of Service. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
802.11w, Security, Wireless, Denial of Service, 802.11, 802.11i |
34 | XiaoFeng Wang 0001, Michael K. Reiter |
A multi-layer framework for puzzle-based denial-of-service defense. |
Int. J. Inf. Sec. |
2008 |
DBLP DOI BibTeX RDF |
Denial of service, Network protocols, Client puzzles |
34 | Roman Chertov, Sonia Fahmy, Ness B. Shroff |
Fidelity of network simulation and emulation: A case study of TCP-targeted denial of service attacks. |
ACM Trans. Model. Comput. Simul. |
2008 |
DBLP DOI BibTeX RDF |
low-rate TCP-targeted attacks, Simulation, congestion control, TCP, emulation, testbeds, denial of service attacks |
34 | Rajani Muraleedharan, Lisa Ann Osadciw |
Secure Health Monitoring Network against Denial-Of-Service Attacks Using Cognitive Intelligence. |
CNSR |
2008 |
DBLP DOI BibTeX RDF |
Cognitive Intelligence, Sensor Network, Ant Colony Optimization, Denial-of-Service |
34 | Gal Badishi, Idit Keidar |
Improving denial of service resistance using dynamic local adaptations. |
SAC |
2008 |
DBLP DOI BibTeX RDF |
adaptive denial-of-service resistance, adaptive gossip-based protocols, application-level multicast |
34 | Siddharth Maru, Timothy X. Brown |
Denial of service vulnerabilities in the 802.16 protocol. |
WICON |
2008 |
DBLP DOI BibTeX RDF |
encryption, denial of service, traffic analysis, IEEE 802.16, sensing, jamming, broadband wireless access |
34 | Marek Ostaszewski, Pascal Bouvry, Franciszek Seredynski |
Denial of service detection and analysis using idiotypic networks paradigm. |
GECCO |
2008 |
DBLP DOI BibTeX RDF |
idiotypic networks, denial of service |
34 | Ronghua Wang, Wenliang Du, Peng Ning |
Containing denial-of-service attacks in broadcast authentication in sensor networks. |
MobiHoc |
2007 |
DBLP DOI BibTeX RDF |
broadcast delay, security, wireless sensor networks, energy saving, denial of service attack |
34 | Alex Wun, Alex King Yeung Cheung, Hans-Arno Jacobsen |
A taxonomy for denial of service attacks in content-based publish/subscribe systems. |
DEBS |
2007 |
DBLP DOI BibTeX RDF |
security, denial of service, publish/subscribe |
34 | Baruch Awerbuch, Christian Scheideler |
A denial-of-service resistant DHT. |
PODC |
2007 |
DBLP DOI BibTeX RDF |
distributed information systems, denial-of-service attacks |
34 | Joseph Chee Ming Teo, Chik How Tan |
Denial-of-service resilience password-based group key agreement for wireless networks. |
Q2SWinet |
2007 |
DBLP DOI BibTeX RDF |
denial-of-service, group key agreement, secure group communication, password-based authentication |
34 | Jelena Mirkovic, Alefiya Hussain, Brett Wilson, Sonia Fahmy, Peter L. Reiher, Roshan K. Thomas, Wei-Min Yao, Stephen Schwab |
Towards user-centric metrics for denial-of-service measurement. |
Experimental Computer Science |
2007 |
DBLP DOI BibTeX RDF |
metrics, denial of service |
34 | Glenn Carl, George Kesidis, Richard R. Brooks, Suresh Rai |
Denial-of-Service Attack-Detection Techniques. |
IEEE Internet Comput. |
2006 |
DBLP DOI BibTeX RDF |
denial-of-service, DoS, flooding attacks |
34 | Steven Cheung |
Denial of Service against the Domain Name System. |
IEEE Secur. Priv. |
2006 |
DBLP DOI BibTeX RDF |
denial of service, countermeasures, domain name system, threat analysis, network infrastructure |
34 | Mudhakar Srivatsa, Arun Iyengar, Jian Yin 0002, Ling Liu 0001 |
A Client-Transparent Approach to Defend Against Denial of Service Attacks. |
SRDS |
2006 |
DBLP DOI BibTeX RDF |
Client Transparency, Denial of Service (DoS) attacks, Authentication, Availability, Web Servers |
34 | Ying Xu, Roch Guérin |
On the robustness of router-based denial-of-service (DoS) defense systems. |
Comput. Commun. Rev. |
2005 |
DBLP DOI BibTeX RDF |
router-based defense, denial-of-service |
34 | David K. Y. Yau, John C. S. Lui, Feng Liang, Yeung Yam |
Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles. |
IEEE/ACM Trans. Netw. |
2005 |
DBLP DOI BibTeX RDF |
router throttling, network security, congestion control, distributed denial of service |
34 | Gregory J. Conti, Mustaque Ahamad |
A Framework for Countering Denial-of-Information Attacks. |
IEEE Secur. Priv. |
2005 |
DBLP DOI BibTeX RDF |
H.3.3 Information Search and Retrieval, H.3.4 Systems and Software, DOI, security, denial-of-service |
34 | Dan Dumitriu, Edward W. Knightly, Aleksandar Kuzmanovic, Ion Stoica, Willy Zwaenepoel |
Denial-of-service resilience in peer-to-peer file sharing systems. |
SIGMETRICS |
2005 |
DBLP DOI BibTeX RDF |
file pollution, network-targeted attacks, peer-to-peer, denial of service |
34 | Marek Hejmo, Brian L. Mark, Charikleia Zouridaki, Roshan K. Thomas |
Denial-of-service resistant quality-of-service signaling for mobile ad hoc networks. |
SASN |
2004 |
DBLP DOI BibTeX RDF |
qos signaling, security, quality of service, ad hoc networks, denial of service, attacks |
34 | Jun (Jim) Xu, Wooyong Lee |
Sustaining Availability of Web Services under Distributed Denial of Service Attacks. |
IEEE Trans. Computers |
2003 |
DBLP DOI BibTeX RDF |
World-Wide Web, game theory, Availability, survivability, Distributed Denial of Service (DDoS) |
34 | Alefiya Hussain, John S. Heidemann, Christos Papadopoulos |
A framework for classifying denial of service attacks. |
SIGCOMM |
2003 |
DBLP DOI BibTeX RDF |
security, measurement, time series analysis, denial of service attacks |
34 | P. Sharma, P. Shah, S. Bhattacharya |
Mirror Hopping Approach for Selective Denial of Service Prevention. |
WORDS |
2003 |
DBLP DOI BibTeX RDF |
Mirror sites, E-Commerce, Information Security, Denial of Service, HTTP |
34 | José Carlos Brustoloni |
Protecting electronic commerce from distributed denial-of-service attacks. |
WWW |
2002 |
DBLP DOI BibTeX RDF |
quality of service, electronic commerce, denial of service |
34 | Jaeyeon Jung, Balachander Krishnamurthy, Michael Rabinovich |
Flash crowds and denial of service attacks: characterization and implications for CDNs and web sites. |
WWW |
2002 |
DBLP DOI BibTeX RDF |
content distribution network performance, web workload characterization, World Wide Web (WWW), flash crowd, denial of service attack |
34 | Nathalie Weiler |
Honeypots for Distributed Denial of Service Attacks. |
WETICE |
2002 |
DBLP DOI BibTeX RDF |
Security Practices, Honeypot, Distributed Denial of Service Attacks |
34 | Stamatis Karnouskos |
Dealing with Denial-of-Service Attacks in Agent-enabled Active and Programmable Infrastructures. |
COMPSAC |
2001 |
DBLP DOI BibTeX RDF |
Intrusion Detection Systems, Active Networks, Agent Technology, Distributed Denial of Service Attacks |
34 | E. Strother |
Denial of Service Protection - The Nozzle. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
denial of service protection, nozzle, domain name server, network pumps, untrusted user, trusted traffic, packet placement, protocols, protocol, intrusion detection, computer networks, Web server, firewalls, cost, authorisation, telecommunication security, network resource |
30 | Xianglin Deng, Malcolm Shore |
Advanced Flooding Attack on a SIP Server. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
30 | Tao Peng 0002, Christopher Leckie, Kotagiri Ramamohanarao |
Survey of network-based defense mechanisms countering the DoS and DDoS problems. |
ACM Comput. Surv. |
2007 |
DBLP DOI BibTeX RDF |
DNS reflector attack, bandwidth attack, resource management, DoS, DDoS, Botnet, Internet security, IP traceback, IRC, IP spoofing, SYN flood, VoIP security |
29 | Iftikhar Ahmad 0002, Azween B. Abdullah, Abdullah Sharaf Alghamdi |
Application of artificial neural network in detection of DOS attacks. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
internet control message protocol, multiple layered perceptron, resilient backpropagation, neural network, artificial neural network, false positive, dataset, false negative, detection rate, denial of service attack |
29 | Steven Cheung, Bruno Dutertre, Ulf Lindqvist |
Detecting Disruptive Routers in Wireless Sensor Networks. |
ADHOC-NOW |
2006 |
DBLP DOI BibTeX RDF |
sensor networks, intrusion detection, Denial of service, routing security |
29 | Gaeil An, Joon S. Park |
Packet Marking Based Cooperative Attack Response Service for Effectively Handling Suspicious Traffic. |
Inscrypt |
2006 |
DBLP DOI BibTeX RDF |
Attack Response, Quality of Service, Network Security, Packet Marking, Denial of Service Attack |
29 | Eun-Jun Yoon, Kee-Young Yoo |
One-Time Password Authentication Scheme Using Smart Cards Providing User Anonymity. |
ICCSA (5) |
2006 |
DBLP DOI BibTeX RDF |
Security, Cryptography, Smart card, User authentication, One-time password, Denial-of-Service attacks |
29 | Seonho Choi, Yanggon Kim |
Resource Requirement Analysis for a Predictive-Hashing Based Multicast Authentication Protocol. |
EUC Workshops |
2006 |
DBLP DOI BibTeX RDF |
cryptographic hashing, authentication, protocol, multicast, denial-of-service, resource requirement |
29 | Bernardo Alarcos, María Calderón, Marifeli Sedano, Juan R. Velasco |
DoS Protection for a Pragmatic Multiservice Network Based on Programmable Networks. |
Autonomic Networking |
2006 |
DBLP DOI BibTeX RDF |
Security, Denial of Service, Active Networks |
29 | Jing Deng 0002, Richard Han 0001, Shivakant Mishra |
Defending against path-based DoS attacks in wireless sensor networks. |
SASN |
2005 |
DBLP DOI BibTeX RDF |
security, sensor networks, denial of services attacks |
29 | Ya-Fen Chang, Chin-Chen Chang 0001 |
A secure and efficient strong-password authentication protocol. |
ACM SIGOPS Oper. Syst. Rev. |
2004 |
DBLP DOI BibTeX RDF |
strong password, smart card, password authentication, mutual authentication, denial-of-service attack, stolen-verifier attack |
29 | Mike Just, Evangelos Kranakis, Tao Wan 0004 |
Resisting Malicious Packet Dropping in Wireless Ad Hoc Networks. |
ADHOC-NOW |
2003 |
DBLP DOI BibTeX RDF |
Distributed Probing, Security, Wireless Ad Hoc Networks, Denial of Service (DoS), Secure Routing Protocols |
29 | Fan Min 0001, Jun-yan Zhang, Guo-wie Yang |
An IP Traceback Scheme Integrating DPM and PPM. |
ACNS |
2003 |
DBLP DOI BibTeX RDF |
Deterministic Packet Marking, Denial of Service, IP traceback, IP spoofing, Probabilistic Packet Marking |
29 | Christopher D. Gill |
RT-POD: A Framework for Real-Time Systems Participation in Own Defense. |
WORDS Fall |
2003 |
DBLP DOI BibTeX RDF |
real-time security, temporal signatures, denial of service, middleware frameworks |
28 | Alberto López Toledo, Xiaodong Wang 0001 |
Robust Detection of MAC Layer Denial-of-Service Attacks in CSMA/CA Wireless Networks. |
IEEE Trans. Inf. Forensics Secur. |
2008 |
DBLP DOI BibTeX RDF |
|
28 | William Conner, Klara Nahrstedt |
Protecting SIP Proxy Servers from Ringing-Based Denial-of-Service Attacks. |
ISM |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Bryan Parno, Dan Wendlandt, Elaine Shi, Adrian Perrig, Bruce M. Maggs, Yih-Chun Hu |
Portcullis: protecting connection setup from denial-of-capability attacks. |
SIGCOMM |
2007 |
DBLP DOI BibTeX RDF |
network capability, per-computation fairness |
28 | Guang Jin, Jiangang Yang, Wei Wei, Yabo Dong |
Mitigating Denial of Capability with An Notification Mechanism. |
IEEE NAS |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Srinivas Padmanabhuni, Vineet Singh, K. M. Senthil Kumar, Abhishek Chatterjee |
Preventing Service Oriented Denial of Service (PreSODoS): A Proposed Approach. |
ICWS |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Yuh-Min Tseng |
Efficient authenticated key agreement protocols resistant to a denial-of-service attack. |
Int. J. Netw. Manag. |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Erol Gelenbe, Michael Gellman, George Loukas |
An Autonomic Approach to Denial of Service Defence. |
WOWMOM |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Bao-Tung Wang, Henning Schulzrinne |
A denial-of-service-resistant IP traceback approach. |
ISCC |
2004 |
DBLP DOI BibTeX RDF |
|
28 | Clayton Bolz, Gordon W. Romney, Brandon L. Rogers |
Safely train security engineers regarding the dangers presented by denial of service attacks. |
SIGITE Conference |
2004 |
DBLP DOI BibTeX RDF |
DoS lab, isolated lab, network security, information technology, DDoS |
28 | Tao Peng 0002, Christopher Leckie, Kotagiri Ramamohanarao |
Detecting Distributed Denial of Service Attacks by Sharing Distributed Beliefs. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
|
28 | W. J. Blackert, Donna M. Gregg, A. K. Castner, E. M. Kyle, R. L. Hom, R. M. Jokerst |
Analyzing Interaction Between Distributed Denial of Service Attacks And Mitigation Technologies. |
DISCEX (1) |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Anthony D. Wood, John A. Stankovic |
Denial of Service in Sensor Networks. |
Computer |
2002 |
DBLP DOI BibTeX RDF |
|
28 | Biljana Cubaleska, Markus Schneider 0002 |
A Method for Protecting Mobile Agents against Denial of Service Attacks. |
CIA |
2002 |
DBLP DOI BibTeX RDF |
|
28 | DongGook Park, JungJoon Kim, Colin Boyd, Ed Dawson |
Cryptographic Salt: A Countermeasure against Denial-of-Service Attacks. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
28 | Catherine Meadows 0001 |
A Formal Framework and Evaluation Method for Network Denial of Service. |
CSFW |
1999 |
DBLP DOI BibTeX RDF |
|
28 | Roger M. Needham |
Denial of Service. |
CCS |
1993 |
DBLP DOI BibTeX RDF |
|
27 | Chang-Lung Tsai, Allen Y. Chang, Ming-Szu Huang |
Early Warning System for DDoS Attacking Based on Multilayer Deployment of Time Delay Neural Network. |
IIH-MSP |
2010 |
DBLP DOI BibTeX RDF |
Internet hacking, Information security, Denial of service, Distributed denial of service, Time-delay neural network |
Displaying result #1 - #100 of 2745 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|