메뉴 건너뛰기




Volumn I, Issue , 2003, Pages 41-44

Modeling of Distributed Denial of Service Attacks in Wireless Networks

Author keywords

[No Author keywords available]

Indexed keywords

INTERNET; STATISTICAL METHODS; TELECOMMUNICATION SERVICES; TELECOMMUNICATION TRAFFIC; VECTORS;

EID: 0142199497     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (20)

References (8)
  • 1
    • 0036605066 scopus 로고    scopus 로고
    • Defending wireless infrastructure against the challenge of DDoS attacks
    • Jun.
    • X. Geng, Y. Huang and A. B. Whinston, " Defending wireless infrastructure against the challenge of DDoS attacks", Mobile Networks and Applications, vol.7, no.3, Jun. 2002.
    • (2002) Mobile Networks and Applications , vol.7 , Issue.3
    • Geng, X.1    Huang, Y.2    Whinston, A.B.3
  • 5
    • 0032095121 scopus 로고    scopus 로고
    • Diffusion Process Approximations of a Statistical Multiplexer with Markov Modulated Bursty Traffic Sources
    • June
    • Q. Ren and H. Kobayashi: " Diffusion Process Approximations of a Statistical Multiplexer with Markov Modulated Bursty Traffic Sources," IEEE Journal of Selected Areas in Communications, vol. 16, no. 5, pp. 679-691, June 1998.
    • (1998) IEEE Journal of Selected Areas in Communications , vol.16 , Issue.5 , pp. 679-691
    • Ren, Q.1    Kobayashi, H.2
  • 8
    • 0036793924 scopus 로고    scopus 로고
    • Denial of Service in Sensor Networks
    • Oct.
    • A. D. Wood and J. A. Stankovic, " Denial of Service in Sensor Networks", IEEE Computer Magazine, vol.35, no.10, pp.54-62, Oct. 2002.
    • (2002) IEEE Computer Magazine , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.D.1    Stankovic, J.A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.