-
7
-
-
0022093904
-
Optimal attack and reinforcement of a network
-
W. H. Cunningham. Optimal attack and reinforcement of a network. J. ACM, 32(3):549-561, 1985.
-
(1985)
J. ACM
, vol.32
, Issue.3
, pp. 549-561
-
-
Cunningham, W.H.1
-
9
-
-
0004035026
-
-
Addison-Wesley Longman, Inc., Reading, MA, USA
-
D. E. Denning. Information warfare and security. Addison-Wesley Longman, Inc., Reading, MA, USA, 1999.
-
(1999)
Information Warfare and Security
-
-
Denning, D.E.1
-
11
-
-
0026900438
-
A logic for reasoning about security
-
J. Glasgow, G. MacEwen, and P. Panangaden. A logic for reasoning about security. ACM TOGS, 10(3):226-264, 1992.
-
(1992)
ACM TOGS
, vol.10
, Issue.3
, pp. 226-264
-
-
Glasgow, J.1
Macewen, G.2
Panangaden, P.3
-
13
-
-
0021426851
-
A note on denial-of-service in operating systems
-
V. D. Gligor. A note on denial-of-service in operating systems. IEEE TOSE, 10(3):320-324, 1984.
-
(1984)
IEEE TOSE
, vol.10
, Issue.3
, pp. 320-324
-
-
Gligor, V.D.1
-
14
-
-
84958674474
-
Enhancing the resistance of a provably secure key agreement protocol to a denial-of-service attack
-
Springer-Verlag
-
S. Hirose and K. Matsuura. Enhancing the resistance of a provably secure key agreement protocol to a denial-of-service attack. In ICICS'99, LNCS 1726. Springer-Verlag, 1999.
-
(1999)
ICICS'99, LNCS 1726
-
-
Hirose, S.1
Matsuura, K.2
-
15
-
-
85066117646
-
-
version 1.2. COM(92) 298 final, Brussels, Sept
-
Information technology security evaluation criteria (ITSEC), version 1.2. COM(92) 298 final, Brussels, Sept., 1992.
-
(1992)
-
-
-
22
-
-
84957867935
-
A method to implement a denial of service protection base
-
Springer Verlag
-
J. Leiwo, C. Gamage, and Y. Zheng. A method to implement a denial of service protection base. In ACISP'97, LNCS 1270, Springer Verlag, 1997.
-
(1997)
ACISP'97, LNCS 1270
-
-
Leiwo, J.1
Gamage, C.2
Zheng, Y.3
-
26
-
-
2342570485
-
A resource allocation model for denial of service
-
J. K. Millen. A resource allocation model for denial of service. In IEEE S&P, 1992.
-
(1992)
IEEE S&P
-
-
Millen, J.K.1
-
30
-
-
0028532812
-
Denial of service: An example
-
R. M. Needham. Denial of service: An example. CACM, 37(11):42-46, 1994.
-
(1994)
CACM
, vol.37
, Issue.11
, pp. 42-46
-
-
Needham, R.M.1
-
36
-
-
1542597342
-
Analysis of a denial of service attack on TCP
-
C. L. Schuba, I. V. Krsul, M.G. Kuhn, E. H. Spafford, A. Sundaram, and D. Zamboni. Analysis of a denial of service attack on TCP. In IEEE S&P, 1997.
-
(1997)
IEEE S&P
-
-
Schuba, C.L.1
Krsul, I.V.2
Kuhn, M.G.3
Spafford, E.H.4
Sundaram, A.5
Zamboni, D.6
-
39
-
-
0031176702
-
A simple min-cut algorithm
-
M. Stoer and F. Wagner. A simple min-cut algorithm. J.ACM, 44(4):585-591, 1997.
-
(1997)
J.ACM
, vol.44
, Issue.4
, pp. 585-591
-
-
Stoer, M.1
Wagner, F.2
-
40
-
-
0025441368
-
A specification and verification method for preventing denial of service
-
C.-F. Yu and V. D. Gligor. A specification and verification method for preventing denial of service. IEEE TOSE, 16(6):581-592, 1990.
-
(1990)
IEEE TOSE
, vol.16
, Issue.6
, pp. 581-592
-
-
Yu, C.-F.1
Gligor, V.D.2
|