-
2
-
-
0003334329
-
Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing
-
May
-
Ferguson, P. and Senie, D., "Network Ingress Filtering: Defeating Denial of Service Attacks which Employ IP Source Address Spoofing," RFC 2827, May 2000.
-
(2000)
RFC
, vol.2827
-
-
Ferguson, P.1
Senie, D.2
-
3
-
-
0003168619
-
On traffic phase effects in packet-switched gateways
-
September
-
Floyd, S. and Jacobson, V., "On traffic phase effects in packet-switched gateways," Internetworking: Research and Experience, vol. 3, no.3, pp. 115-156, September 1992.
-
(1992)
Internetworking: Research and Experience
, vol.3
, Issue.3
, pp. 115-156
-
-
Floyd, S.1
Jacobson, V.2
-
6
-
-
0012802798
-
-
October
-
Householder, A., Manion A., Pesante, L., Weaver G., and Thomas, R., "Managing the Threat of Denial-of-Service Attacks," October 2001, http://www.cert.org/archive/pdf/Managing_DoS.pdf.
-
(2001)
Managing the Threat of Denial-of-Service Attacks
-
-
Householder, A.1
Manion, A.2
Pesante, L.3
Weaver, G.4
Thomas, R.5
-
7
-
-
0003254064
-
A non-intrusive, wavelet-based approach to detecting network performance problems
-
November
-
Huang, P., Feldmann, A., and Willinger, W., "A Non-Intrusive, Wavelet-Based Approach to Detecting Network Performance Problems," in Proceedings of ACM SIGCOMM Internet Measurement Workshop 2001, November 2001.
-
(2001)
Proceedings of ACM SIGCOMM Internet Measurement Workshop 2001
-
-
Huang, P.1
Feldmann, A.2
Willinger, W.3
-
8
-
-
85180745018
-
Implementing pushback: Router-based defense against DDoS attacks
-
February
-
Ioannidis, J. and Bellovin, S., "Implementing Pushback: Router-Based Defense against DDoS Attacks," in Proceedings of NDSS'02, February 2002.
-
(2002)
Proceedings of NDSS'02
-
-
Ioannidis, J.1
Bellovin, S.2
-
9
-
-
85013623251
-
Congestion avoidance and control
-
August
-
Jacobson, V., "Congestion avoidance and control," ACM Computer Communication Review, vol. 18, no. 4, pp. 314-329, August 1988.
-
(1988)
ACM Computer Communication Review
, vol.18
, Issue.4
, pp. 314-329
-
-
Jacobson, V.1
-
10
-
-
85013591309
-
On the self-similar nature of ethernet traffic
-
August
-
Leland, W., Taqq, M., Willinger, W., and Wilson, D., "On the Self-Similar Nature of Ethernet Traffic," in Proceedings of ACM SIGCOMM'93, August 1993.
-
(1993)
Proceedings of ACM SIGCOMM'93
-
-
Leland, W.1
Taqq, M.2
Willinger, W.3
Wilson, D.4
-
11
-
-
84872707204
-
-
Ostermann, S., Tcptrace, http://jarok.cs.ohiou.edu/software/tcptrace/index.html
-
Tcptrace
-
-
Ostermann, S.1
-
12
-
-
0003260777
-
Transmission control protocol - DARPA internet program protocol specification
-
September
-
Postel, J., "Transmission Control Protocol - DARPA Internet Program Protocol Specification," RFC 793, September 1981.
-
(1981)
RFC
, vol.793
-
-
Postel, J.1
-
14
-
-
0036343692
-
Detecting SYN flooding attacks
-
Wang, H., Zhang, D., and Shin, K., "Detecting SYN Flooding Attacks," in Proceedings of Infocom 2002, June, 2002
-
(2002)
Proceedings of Infocom 2002
-
-
Wang, H.1
Zhang, D.2
Shin, K.3
|