The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for denial with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1980-1993 (17) 1995-1998 (17) 1999-2000 (48) 2001 (42) 2002 (62) 2003 (113) 2004 (128) 2005 (199) 2006 (200) 2007 (177) 2008 (184) 2009 (126) 2010 (66) 2011 (67) 2012 (48) 2013 (53) 2014 (63) 2015 (85) 2016 (66) 2017 (75) 2018 (103) 2019 (122) 2020 (148) 2021 (154) 2022 (176) 2023 (158) 2024 (48)
Publication types (Num. hits)
article(1094) book(3) data(1) incollection(21) inproceedings(1589) phdthesis(37)
Venues (Conferences, Journals, ...)
CoRR(114) IEEE Access(44) ICC(31) CCS(28) GLOBECOM(22) IEEE/ACM Trans. Netw.(22) ARES(21) Comput. Networks(21) Comput. Secur.(21) CDC(20) Sensors(20) ACSAC(18) Secur. Commun. Networks(18) IEEE Trans. Cybern.(17) ISCC(17) LCN(17) More (+10 of total 1002)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1449 occurrences of 631 keywords

Results
Found 2746 publication records. Showing 2745 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
73Douglas Stebila, Berkant Ustaoglu Towards Denial-of-Service-Resilient Key Agreement Protocols. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
73Virgil D. Gligor, Matt Blaze, John Ioannidis Denial of Service - Panel Discussion. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
66D. W. Gresty, Qi Shi 0001, Madjid Merabti Requirements for a General Framework for Response to Distributed Denial-of-Service. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
62Marcus Tylutki, Karl N. Levitt Mitigating Distributed Denial of Service Attacks Using a Proportional-Integral-Derivative Controller. Search on Bibsonomy RAID The full citation details ... 2003 DBLP  DOI  BibTeX  RDF PID control law, Automated Response, Denial of Service, DoS, Distributed Denial of Service, DDoS, Control Theory, Distributed Attacks
61Philip L. Campbell The Denial-of-Service Dance. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF network denial of service, Trinoo, TFN, Smurf, UDP flood, Land, Targa, denial of service, worms, distributed denial of service, SYN flood, spoofing
55Zhang Fu, Marina Papatriantafilou, Philippas Tsigas, Wei Wei 0013 Mitigating denial of capability attacks using sink tree based quota allocation. Search on Bibsonomy SAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF denial-of-capability, sink tree, denial-of-service
55Vladimir V. Shakhov, Hyunseung Choo Denial of Sleeping: Performance Analysis and Counteracting Strategy. Search on Bibsonomy APCHI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Denial of sleeping, Wireless sensor networks, Denial of Service, Energy consumption
51Vijay Kumar Singh, Bhaskar Pratap Singh, Özgür Kisi, Denial Prakash Kushwaha Spatial and multi-depth temporal soil temperature assessment by assimilating satellite imagery, artificial intelligence and regression based models in arid area. Search on Bibsonomy Comput. Electron. Agric. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
49David Moore 0001, Colleen Shannon, Douglas J. Brown, Geoffrey M. Voelker, Stefan Savage Inferring Internet denial-of-service activity. Search on Bibsonomy ACM Trans. Comput. Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Backscatter, network security, denial-of-service, network measurement
49Jelena Mirkovic, Peter L. Reiher, Sonia Fahmy, Roshan K. Thomas, Alefiya Hussain, Stephen Schwab, Calvin Ko Measuring denial Of service. Search on Bibsonomy QoP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF metrics, denial of service
49Wenyuan Xu 0001, Timothy Wood 0001, Wade Trappe, Yanyong Zhang Channel surfing and spatial retreats: defenses against wireless denial of service. Search on Bibsonomy Workshop on Wireless Security The full citation details ... 2004 DBLP  DOI  BibTeX  RDF denial of service, Jamming, CSMA
47David R. Raymond, Scott F. Midkiff Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses. Search on Bibsonomy IEEE Pervasive Comput. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF denial-of-sleep attacks, security, wireless sensor networks, Denial-of-service attacks
46Nikita Borisov, George Danezis, Prateek Mittal, Parisa Tabriz Denial of service or denial of security? Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF reliability, anonymity, denial of service, attacks
43Jelena Mirkovic, Alefiya Hussain, Sonia Fahmy, Peter L. Reiher, Roshan K. Thomas Accurately Measuring Denial of Service in Simulation and Testbed Experiments. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
43Srinivas Mukkamala, Andrew H. Sung Computational Intelligent Techniques for Detecting Denial of Service Attacks. Search on Bibsonomy IEA/AIE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
41Yalin Evren Sagduyu, Anthony Ephremides A game-theoretic analysis of denial of service attacks in wireless random access. Search on Bibsonomy Wirel. Networks The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Malicious operation, Adaptive update algorithms, Wireless networks, Game theory, Cooperation, Medium access control, Pricing, Competition, Distributed control, Random access, Denial of service attacks
41Timothy X. Brown, Amita Sethi Potential Cognitive Radio Denial-of-Service Vulnerabilities and Protection Countermeasures: a Multi-dimensional Analysis and Assessment. Search on Bibsonomy Mob. Networks Appl. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF denial of service, cognitive radio, vulnerability, countermeasure
41George S. Oreku, Jianzhong Li 0001, Tamara Pazynyuk An application-driven perspective on wireless devises security: the case of distributed denial-of-service (ddos). Search on Bibsonomy PM2HW2N The full citation details ... 2007 DBLP  DOI  BibTeX  RDF handheld devices, distributed denial of service attacks (DDoS), wireless sensor nodes
41Aleksandar Kuzmanovic, Edward W. Knightly Low-rate TCP-targeted denial of service attacks and counter strategies. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF TCP, TCP/IP, denial of service, retransmission timeout
41Amit B. Kulkarni, Stephen F. Bush Detecting Distributed Denial-of-Service Attacks Using Kolmogorov Complexity Metrics. Search on Bibsonomy J. Netw. Syst. Manag. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF complexity probes, entropy, active network, Kolmogorov Complexity, denial-of-service attack
41Valer Bocan, Vladimir Cretu Mitigating Denial of Service Threats in GSM Networks. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF 2G, security, wireless networks, denial of service, attack, GSM, GPRS
41Jason Smith 0001, Juan Manuel González Nieto, Colin Boyd Modelling denial of service attacks on JFK with Meadows's cost-based framework. Search on Bibsonomy ACSW The full citation details ... 2006 DBLP  BibTeX  RDF security analysis methodologies, cryptographic protocols, denial of service
41Ashraf Matrawy, Paul C. van Oorschot, Anil Somayaji Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF network denial of service, flash worms, network security, diversity, traffic shaping
41Sanjeev Kumar Impact of Distributed Denial of Service (DDoS) Attack Due to ARP Storm. Search on Bibsonomy ICN (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF ARP attack, Distributed Denial of Service Attacks, Computer Network Security
41Dimitris Gavrilis, Ioannis G. Tsoulos, Evangelos Dermatas Feature Selection for Robust Detection of Distributed Denial-of-Service Attacks Using Genetic Algorithms. Search on Bibsonomy SETN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Genetic Algorithms, Neural Networks, Denial of Service
41Aleksandar Kuzmanovic, Edward W. Knightly Low-rate TCP-targeted denial of service attacks: the shrew vs. the mice and elephants. Search on Bibsonomy SIGCOMM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF TCP, denial of service, retransmission timeout
41Shouhuai Xu, Ravi S. Sandhu Authenticated multicast immune to denial-of-service attack. Search on Bibsonomy SAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF multicast authentication, denial-of-service
41Che-Fn Yu, Virgil D. Gligor A Specification and Verification Method for Preventing Denial of Service. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1990 DBLP  DOI  BibTeX  RDF failure absence, integrity violations, user agreements, simultaneity conditions, denial-of-service prevention, formal specification, concurrent programs, security of data, specification method, verification method
38Chu-Hsing Lin, Jung-Chun Liu, Hsun-Chi Huang, Tsung-Che Yang Using Adaptive Bandwidth Allocation Approach to Defend DDoS Attacks. Search on Bibsonomy MUE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF bandwidth, network simulator, priority queue, DDoS attack, IP spoofing, DoS attack
38Tuomas Aura DOS-Resistant Authentication with Client Puzzles (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
35Haiyang Qian, Steve Dispensa, Deep Medhi Optimizing request denial and latency in an agent-based VPN architecture. Search on Bibsonomy NOMS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
35H. R. Nagesh, K. Chandra Sekaran, Adarsh Rao Kordcal Proactive model for Mitigating Internet Denial-of-Service Attacks. Search on Bibsonomy ITNG The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
35Seonho Choi Denial-of-Service Resistant Multicast Authentication Protocol with Prediction Hashing and One-way Key Chain. Search on Bibsonomy ISM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
35Tao Peng 0002, Christopher Leckie, Kotagiri Ramamohanarao Proactively Detecting Distributed Denial of Service Attacks Using Source IP Address Monitoring. Search on Bibsonomy NETWORKING The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
35Luciano Rila Denial of Access in Biometrics-Based Authentication Systems. Search on Bibsonomy InfraSec The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
35Sazia Parvin, Shohrab Ali, Song Han 0004, Tharam S. Dillon Security against DOS attack in mobile IP communication. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF care-of-address (coa), correspondent node (cn), denial-of-service (dos), distributed denial-of-service (ddos), foreign agent (fa), home agent (ha), mobile host (mh), mobile node (mn)
34Xin Liu 0059, Xiaowei Yang 0001, Yong Xia 0008 NetFence: preventing internet denial of service from inside out. Search on Bibsonomy SIGCOMM The full citation details ... 2010 DBLP  DOI  BibTeX  RDF congestion policing, internet, denial-of-service, capability
34Jiangtao Li 0001, Ninghui Li, XiaoFeng Wang 0001, Ting Yu 0001 Denial of service attacks and defenses in decentralized trust management. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Access control, Game theory, Denial of service, Trust management, Trust negotiation
34Norman Danner, Danny Krizanc, Marc Liberatore Detecting Denial of Service Attacks in Tor. Search on Bibsonomy Financial Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF reliability, Anonymity, denial of service, detection, attack
34Jayashree Padmanabhan, K. S. Easwarakumar, Gokul B., Harishankar S. Trust based traffic monitoring approach for preventing denial of service attacks. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF clustering, networks, trust, denial of service, centroid, dos
34Guoxing Zhang, Shengming Jiang, Gang Wei, Quansheng Guan A prediction-based detection algorithm against distributed denial-of-service attacks. Search on Bibsonomy IWCMC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF available service rate, prediction-based detection of DDoS and low-rate TCP attacks, distributed DoS (DDoS), denial-of-service attacks (DoS)
34José M. Garrido Understanding distributed denial of service with object oriented simulation. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2009 DBLP  DOI  BibTeX  RDF network security, discrete event simulation, denial of service, protection
34Martin Eian Fragility of the Robust Security Network: 802.11 Denial of Service. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF 802.11w, Security, Wireless, Denial of Service, 802.11, 802.11i
34XiaoFeng Wang 0001, Michael K. Reiter A multi-layer framework for puzzle-based denial-of-service defense. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Denial of service, Network protocols, Client puzzles
34Roman Chertov, Sonia Fahmy, Ness B. Shroff Fidelity of network simulation and emulation: A case study of TCP-targeted denial of service attacks. Search on Bibsonomy ACM Trans. Model. Comput. Simul. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF low-rate TCP-targeted attacks, Simulation, congestion control, TCP, emulation, testbeds, denial of service attacks
34Rajani Muraleedharan, Lisa Ann Osadciw Secure Health Monitoring Network against Denial-Of-Service Attacks Using Cognitive Intelligence. Search on Bibsonomy CNSR The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Cognitive Intelligence, Sensor Network, Ant Colony Optimization, Denial-of-Service
34Gal Badishi, Idit Keidar Improving denial of service resistance using dynamic local adaptations. Search on Bibsonomy SAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF adaptive denial-of-service resistance, adaptive gossip-based protocols, application-level multicast
34Siddharth Maru, Timothy X. Brown Denial of service vulnerabilities in the 802.16 protocol. Search on Bibsonomy WICON The full citation details ... 2008 DBLP  DOI  BibTeX  RDF encryption, denial of service, traffic analysis, IEEE 802.16, sensing, jamming, broadband wireless access
34Marek Ostaszewski, Pascal Bouvry, Franciszek Seredynski Denial of service detection and analysis using idiotypic networks paradigm. Search on Bibsonomy GECCO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF idiotypic networks, denial of service
34Ronghua Wang, Wenliang Du, Peng Ning Containing denial-of-service attacks in broadcast authentication in sensor networks. Search on Bibsonomy MobiHoc The full citation details ... 2007 DBLP  DOI  BibTeX  RDF broadcast delay, security, wireless sensor networks, energy saving, denial of service attack
34Alex Wun, Alex King Yeung Cheung, Hans-Arno Jacobsen A taxonomy for denial of service attacks in content-based publish/subscribe systems. Search on Bibsonomy DEBS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, denial of service, publish/subscribe
34Baruch Awerbuch, Christian Scheideler A denial-of-service resistant DHT. Search on Bibsonomy PODC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF distributed information systems, denial-of-service attacks
34Joseph Chee Ming Teo, Chik How Tan Denial-of-service resilience password-based group key agreement for wireless networks. Search on Bibsonomy Q2SWinet The full citation details ... 2007 DBLP  DOI  BibTeX  RDF denial-of-service, group key agreement, secure group communication, password-based authentication
34Jelena Mirkovic, Alefiya Hussain, Brett Wilson, Sonia Fahmy, Peter L. Reiher, Roshan K. Thomas, Wei-Min Yao, Stephen Schwab Towards user-centric metrics for denial-of-service measurement. Search on Bibsonomy Experimental Computer Science The full citation details ... 2007 DBLP  DOI  BibTeX  RDF metrics, denial of service
34Glenn Carl, George Kesidis, Richard R. Brooks, Suresh Rai Denial-of-Service Attack-Detection Techniques. Search on Bibsonomy IEEE Internet Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF denial-of-service, DoS, flooding attacks
34Steven Cheung Denial of Service against the Domain Name System. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF denial of service, countermeasures, domain name system, threat analysis, network infrastructure
34Mudhakar Srivatsa, Arun Iyengar, Jian Yin 0002, Ling Liu 0001 A Client-Transparent Approach to Defend Against Denial of Service Attacks. Search on Bibsonomy SRDS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Client Transparency, Denial of Service (DoS) attacks, Authentication, Availability, Web Servers
34Ying Xu, Roch Guérin On the robustness of router-based denial-of-service (DoS) defense systems. Search on Bibsonomy Comput. Commun. Rev. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF router-based defense, denial-of-service
34David K. Y. Yau, John C. S. Lui, Feng Liang, Yeung Yam Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF router throttling, network security, congestion control, distributed denial of service
34Gregory J. Conti, Mustaque Ahamad A Framework for Countering Denial-of-Information Attacks. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF H.3.3 Information Search and Retrieval, H.3.4 Systems and Software, DOI, security, denial-of-service
34Dan Dumitriu, Edward W. Knightly, Aleksandar Kuzmanovic, Ion Stoica, Willy Zwaenepoel Denial-of-service resilience in peer-to-peer file sharing systems. Search on Bibsonomy SIGMETRICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF file pollution, network-targeted attacks, peer-to-peer, denial of service
34Marek Hejmo, Brian L. Mark, Charikleia Zouridaki, Roshan K. Thomas Denial-of-service resistant quality-of-service signaling for mobile ad hoc networks. Search on Bibsonomy SASN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF qos signaling, security, quality of service, ad hoc networks, denial of service, attacks
34Jun (Jim) Xu, Wooyong Lee Sustaining Availability of Web Services under Distributed Denial of Service Attacks. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2003 DBLP  DOI  BibTeX  RDF World-Wide Web, game theory, Availability, survivability, Distributed Denial of Service (DDoS)
34Alefiya Hussain, John S. Heidemann, Christos Papadopoulos A framework for classifying denial of service attacks. Search on Bibsonomy SIGCOMM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF security, measurement, time series analysis, denial of service attacks
34P. Sharma, P. Shah, S. Bhattacharya Mirror Hopping Approach for Selective Denial of Service Prevention. Search on Bibsonomy WORDS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Mirror sites, E-Commerce, Information Security, Denial of Service, HTTP
34José Carlos Brustoloni Protecting electronic commerce from distributed denial-of-service attacks. Search on Bibsonomy WWW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF quality of service, electronic commerce, denial of service
34Jaeyeon Jung, Balachander Krishnamurthy, Michael Rabinovich Flash crowds and denial of service attacks: characterization and implications for CDNs and web sites. Search on Bibsonomy WWW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF content distribution network performance, web workload characterization, World Wide Web (WWW), flash crowd, denial of service attack
34Nathalie Weiler Honeypots for Distributed Denial of Service Attacks. Search on Bibsonomy WETICE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Security Practices, Honeypot, Distributed Denial of Service Attacks
34Stamatis Karnouskos Dealing with Denial-of-Service Attacks in Agent-enabled Active and Programmable Infrastructures. Search on Bibsonomy COMPSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Intrusion Detection Systems, Active Networks, Agent Technology, Distributed Denial of Service Attacks
34E. Strother Denial of Service Protection - The Nozzle. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF denial of service protection, nozzle, domain name server, network pumps, untrusted user, trusted traffic, packet placement, protocols, protocol, intrusion detection, computer networks, Web server, firewalls, cost, authorisation, telecommunication security, network resource
30Xianglin Deng, Malcolm Shore Advanced Flooding Attack on a SIP Server. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
30Tao Peng 0002, Christopher Leckie, Kotagiri Ramamohanarao Survey of network-based defense mechanisms countering the DoS and DDoS problems. Search on Bibsonomy ACM Comput. Surv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF DNS reflector attack, bandwidth attack, resource management, DoS, DDoS, Botnet, Internet security, IP traceback, IRC, IP spoofing, SYN flood, VoIP security
29Iftikhar Ahmad 0002, Azween B. Abdullah, Abdullah Sharaf Alghamdi Application of artificial neural network in detection of DOS attacks. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF internet control message protocol, multiple layered perceptron, resilient backpropagation, neural network, artificial neural network, false positive, dataset, false negative, detection rate, denial of service attack
29Steven Cheung, Bruno Dutertre, Ulf Lindqvist Detecting Disruptive Routers in Wireless Sensor Networks. Search on Bibsonomy ADHOC-NOW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF sensor networks, intrusion detection, Denial of service, routing security
29Gaeil An, Joon S. Park Packet Marking Based Cooperative Attack Response Service for Effectively Handling Suspicious Traffic. Search on Bibsonomy Inscrypt The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Attack Response, Quality of Service, Network Security, Packet Marking, Denial of Service Attack
29Eun-Jun Yoon, Kee-Young Yoo One-Time Password Authentication Scheme Using Smart Cards Providing User Anonymity. Search on Bibsonomy ICCSA (5) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Security, Cryptography, Smart card, User authentication, One-time password, Denial-of-Service attacks
29Seonho Choi, Yanggon Kim Resource Requirement Analysis for a Predictive-Hashing Based Multicast Authentication Protocol. Search on Bibsonomy EUC Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cryptographic hashing, authentication, protocol, multicast, denial-of-service, resource requirement
29Bernardo Alarcos, María Calderón, Marifeli Sedano, Juan R. Velasco DoS Protection for a Pragmatic Multiservice Network Based on Programmable Networks. Search on Bibsonomy Autonomic Networking The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Security, Denial of Service, Active Networks
29Jing Deng 0002, Richard Han 0001, Shivakant Mishra Defending against path-based DoS attacks in wireless sensor networks. Search on Bibsonomy SASN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, sensor networks, denial of services attacks
29Ya-Fen Chang, Chin-Chen Chang 0001 A secure and efficient strong-password authentication protocol. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF strong password, smart card, password authentication, mutual authentication, denial-of-service attack, stolen-verifier attack
29Mike Just, Evangelos Kranakis, Tao Wan 0004 Resisting Malicious Packet Dropping in Wireless Ad Hoc Networks. Search on Bibsonomy ADHOC-NOW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Distributed Probing, Security, Wireless Ad Hoc Networks, Denial of Service (DoS), Secure Routing Protocols
29Fan Min 0001, Jun-yan Zhang, Guo-wie Yang An IP Traceback Scheme Integrating DPM and PPM. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Deterministic Packet Marking, Denial of Service, IP traceback, IP spoofing, Probabilistic Packet Marking
29Christopher D. Gill RT-POD: A Framework for Real-Time Systems Participation in Own Defense. Search on Bibsonomy WORDS Fall The full citation details ... 2003 DBLP  DOI  BibTeX  RDF real-time security, temporal signatures, denial of service, middleware frameworks
28Alberto López Toledo, Xiaodong Wang 0001 Robust Detection of MAC Layer Denial-of-Service Attacks in CSMA/CA Wireless Networks. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28William Conner, Klara Nahrstedt Protecting SIP Proxy Servers from Ringing-Based Denial-of-Service Attacks. Search on Bibsonomy ISM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Bryan Parno, Dan Wendlandt, Elaine Shi, Adrian Perrig, Bruce M. Maggs, Yih-Chun Hu Portcullis: protecting connection setup from denial-of-capability attacks. Search on Bibsonomy SIGCOMM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF network capability, per-computation fairness
28Guang Jin, Jiangang Yang, Wei Wei, Yabo Dong Mitigating Denial of Capability with An Notification Mechanism. Search on Bibsonomy IEEE NAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Srinivas Padmanabhuni, Vineet Singh, K. M. Senthil Kumar, Abhishek Chatterjee Preventing Service Oriented Denial of Service (PreSODoS): A Proposed Approach. Search on Bibsonomy ICWS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Yuh-Min Tseng Efficient authenticated key agreement protocols resistant to a denial-of-service attack. Search on Bibsonomy Int. J. Netw. Manag. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Erol Gelenbe, Michael Gellman, George Loukas An Autonomic Approach to Denial of Service Defence. Search on Bibsonomy WOWMOM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Bao-Tung Wang, Henning Schulzrinne A denial-of-service-resistant IP traceback approach. Search on Bibsonomy ISCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
28Clayton Bolz, Gordon W. Romney, Brandon L. Rogers Safely train security engineers regarding the dangers presented by denial of service attacks. Search on Bibsonomy SIGITE Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF DoS lab, isolated lab, network security, information technology, DDoS
28Tao Peng 0002, Christopher Leckie, Kotagiri Ramamohanarao Detecting Distributed Denial of Service Attacks by Sharing Distributed Beliefs. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
28W. J. Blackert, Donna M. Gregg, A. K. Castner, E. M. Kyle, R. L. Hom, R. M. Jokerst Analyzing Interaction Between Distributed Denial of Service Attacks And Mitigation Technologies. Search on Bibsonomy DISCEX (1) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
28Anthony D. Wood, John A. Stankovic Denial of Service in Sensor Networks. Search on Bibsonomy Computer The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
28Biljana Cubaleska, Markus Schneider 0002 A Method for Protecting Mobile Agents against Denial of Service Attacks. Search on Bibsonomy CIA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
28DongGook Park, JungJoon Kim, Colin Boyd, Ed Dawson Cryptographic Salt: A Countermeasure against Denial-of-Service Attacks. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
28Catherine Meadows 0001 A Formal Framework and Evaluation Method for Network Denial of Service. Search on Bibsonomy CSFW The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
28Roger M. Needham Denial of Service. Search on Bibsonomy CCS The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
27Chang-Lung Tsai, Allen Y. Chang, Ming-Szu Huang Early Warning System for DDoS Attacking Based on Multilayer Deployment of Time Delay Neural Network. Search on Bibsonomy IIH-MSP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Internet hacking, Information security, Denial of service, Distributed denial of service, Time-delay neural network
Displaying result #1 - #100 of 2745 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license