-
1
-
-
0003515463
-
-
Prentice Hall
-
R. K. Ahuja, T. L. Magnanti, and J. B. Orlin. Network Flows: Theory, Algorithms, and Applications. Prentice Hall, 1993.
-
(1993)
Network Flows: Theory, Algorithms, and Applications
-
-
Ahuja, R.K.1
Magnanti, T.L.2
Orlin, J.B.3
-
2
-
-
0038483826
-
Emergence of scaling in random networks
-
Oct.
-
A. Barabási and R. Albert. Emergence of Scaling in Random Networks. Science, pages 509-512, Oct. 1999.
-
(1999)
Science
, pp. 509-512
-
-
Barabási, A.1
Albert, R.2
-
3
-
-
0036346132
-
The origin of power laws in internet topologies revisited
-
Q. Chen, H. Chang, R. Govindan, S. Jamin, S. Shenker, and W. Willinger. The Origin of Power Laws in Internet Topologies Revisited. In INFOCOM, 2002.
-
(2002)
INFOCOM
-
-
Chen, Q.1
Chang, H.2
Govindan, R.3
Jamin, S.4
Shenker, S.5
Willinger, W.6
-
4
-
-
0033204106
-
On power-law relationships of the internet topology
-
M. Faloutsos, P. Faloutsos, and C. Faloutsos. On Power-law Relationships of the Internet Topology. In SIGCOMM, pages 251-262, 1999.
-
(1999)
SIGCOMM
, pp. 251-262
-
-
Faloutsos, M.1
Faloutsos, P.2
Faloutsos, C.3
-
7
-
-
0003726345
-
Inet: Internet topology generator
-
Department of EECS, University of Michigan
-
C. Jin, Q. Chen, and S. Jamin. Inet: Internet Topology Generator. Technical Report CSE-TR-443-00, Department of EECS, University of Michigan, 2000.
-
(2000)
Technical Report CSE-TR-443-00
-
-
Jin, C.1
Chen, Q.2
Jamin, S.3
-
8
-
-
0035010963
-
On the effectiveness of probabilistic packet marking for IP traceback under Denial of service attack
-
H. Lee and K. Park. On the Effectiveness of Probabilistic Packet Marking for IP Traceback under Denial of Service Attack. In IEEE INFOCOM, pages 338-347, 2001.
-
(2001)
IEEE INFOCOM
, pp. 338-347
-
-
Lee, H.1
Park, K.2
-
9
-
-
0036349004
-
SAVE: Source address validity enforcement protocol
-
J. Li, J. Mirkovic, M. Wang, P. Reiher, and L. Zhang. SAVE: Source Address Validity Enforcement Protocol. In INFOCOM, 2002.
-
(2002)
INFOCOM
-
-
Li, J.1
Mirkovic, J.2
Wang, M.3
Reiher, P.4
Zhang, L.5
-
10
-
-
0034776786
-
On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets
-
K. Park and H. Lee. On the Effectiveness of Route-based Packet Filtering for Distributed DoS Attack Prevention in Power-law Internets. In ACM SIGCOMM, pages 15-26, 2001.
-
(2001)
ACM SIGCOMM
, pp. 15-26
-
-
Park, K.1
Lee, H.2
-
11
-
-
0029323403
-
Wide-area traffic: The failure of poisson modeling
-
V. Paxson and S. Floyd. Wide-area Traffic: The Failure of Poisson Modeling. IEEE/ACM Transaction on Networking, 3(3):226-244, 1995.
-
(1995)
IEEE/ACM Transaction on Networking
, vol.3
, Issue.3
, pp. 226-244
-
-
Paxson, V.1
Floyd, S.2
-
12
-
-
0033650584
-
Practical network support for IP traceback
-
S. Savage, D. Wetherall, A. R. Karlin, and T. Anderson. Practical network support for IP traceback. In ACM SIGCOMM, pages 295-306, 2000.
-
(2000)
ACM SIGCOMM
, pp. 295-306
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.R.3
Anderson, T.4
-
13
-
-
0034775309
-
Hash-based IP traceback
-
A. C. Snoeren. Hash-based IP traceback. In ACM SIGCOMM, pages 3-14, 2001.
-
(2001)
ACM SIGCOMM
, pp. 3-14
-
-
Snoeren, A.C.1
-
14
-
-
0043186292
-
Does size determine degree in AS topology?
-
Oct.
-
H. Tangmunarunkit, J. Doyle, R. Govindan, S. Jamin, S. Shenker, and W. Willinger. Does Size Determine Degree in AS Topology? ACM Computer Communication Review, Oct. 2001.
-
(2001)
ACM Computer Communication Review
-
-
Tangmunarunkit, H.1
Doyle, J.2
Govindan, R.3
Jamin, S.4
Shenker, S.5
Willinger, W.6
|