-
1
-
-
0242408742
-
Systems, "Artificial intelligent techniques for intrusion detection", 2003
-
Oct. vol.2
-
S. Mukkamala and A.H. Sung; Systems, "Artificial intelligent techniques for intrusion detection", 2003. IEEE International Conference on Man and Cybernetics, Volume: 2, Oct. 2003 Pages: 1266-1271 vol.2
-
(2003)
IEEE International Conference on Man and Cybernetics
, vol.2
, pp. 1266-1271
-
-
Mukkamala, S.1
Sung, A.H.2
-
3
-
-
0036947597
-
Single-packet IP traceback
-
Dec.
-
Snoeren A. C. et al., "Single-Packet IP Traceback," IEEE/ACM Trans. Net., vol. 10, no. 6, Dec. 2002, pp. 721-34.
-
(2002)
IEEE/ACM Trans. Net.
, vol.10
, Issue.6
, pp. 721-734
-
-
Snoeren, A.C.1
-
4
-
-
0042308614
-
On IP traceback
-
IEEE, July
-
A.Belenky and N. Ansar.;" On IP traceback", Communications Magazine, IEEE, Volume: 41, Issue: 7, July 2003 ,pp. 142-153
-
(2003)
Communications Magazine
, vol.41
, Issue.7
, pp. 142-153
-
-
Belenky, A.1
Ansar, N.2
-
5
-
-
0034997397
-
Advanced and authenticated marking schemes for IP traceback
-
INFOCOM 2001. Proceedings. IEEE, 22-26, April
-
Dawn X.D. Song and A. Perrig; "Advanced and authenticated marking schemes for IP traceback", INFOCOM 2001.Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE, Volume: 2, 22-26, April 2001, pp. 878-886
-
(2001)
Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies
, vol.2
, pp. 878-886
-
-
Song, D.X.D.1
Perrig, A.2
-
6
-
-
0036804084
-
Defending against flooding-based distributed denial-of-service attacks: A tutorial
-
Oct.
-
R.K.C. Chang; "Defending against flooding-based distributed denial-of-service attacks: a tutorial", IEEE Communications Magazine, Volume: 40, Issue: 10, Oct. 2002, pp. 42-51
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.10
, pp. 42-51
-
-
Chang, R.K.C.1
-
7
-
-
4143086429
-
ICMP traceback messages
-
S. M. Bellovin, "ICMP Traceback Messages," IETF draft, 2000;http://www.research.att.com/smb/papers/draftbellovin-itrace-00.txt.
-
(2000)
IETF Draft
-
-
Bellovin, S.M.1
-
8
-
-
0035361712
-
Network support for IP traceback
-
June
-
S. Savage et al., "Network Support for IP Traceback," IEEE/ACM Trans. Net., vol. 9, no. 3, June 2001, pp. 226-37.
-
(2001)
IEEE/ACM Trans. Net.
, vol.9
, Issue.3
, pp. 226-237
-
-
Savage, S.1
-
9
-
-
85084163540
-
Centertrack: An IP overlay network for tracking DoS floods
-
R. Stone, "Centertrack: An IP Overlay Network for Tracking DoS Floods," Proc. 9th USENIX Sec. Symp., 2000,pp. 199-212.
-
(2000)
Proc. 9th USENIX Sec. Symp.
, pp. 199-212
-
-
Stone, R.1
-
10
-
-
84962214242
-
Deciduous: Decentralized source identification for network-based intrusions
-
H.Y. Chang et al., "Deciduous: Decentralized Source Identification for Network-Based Intrusions," Proc. 6th IFIP/IEEE Int'l. Symp. Integrated Net. Mgmt., 1999,pp.701-714.
-
(1999)
Proc. 6th IFIP/IEEE Int'l. Symp. Integrated Net. Mgmt.
, pp. 701-714
-
-
Chang, H.Y.1
-
11
-
-
85011016678
-
Tracing anonymous packets to their approximate source
-
H. Burch and B. Cheswick, "Tracing Anonymous Packets to Their Approximate Source," Proc. USENIX LISA, 2000, pp. 319-27.
-
(2000)
Proc. USENIX LISA
, pp. 319-327
-
-
Burch, H.1
Cheswick, B.2
-
14
-
-
33744460532
-
Integrating grid with intrusion detection
-
(ANIA 2005), Taipei, March
-
F.Y Leu, J.C Lin, "Integrating Grid with Intrusion Detection", IEEE The 19th International Conference on Networking and Applications, (ANIA 2005), Taipei, March 2005,pp.304-309.
-
(2005)
IEEE the 19th International Conference on Networking and Applications
, pp. 304-309
-
-
Leu, F.Y.1
Lin, J.C.2
|