메뉴 건너뛰기




Volumn 24, Issue , 2004, Pages 408-417

Analyzing the secure overlay services architecture under intelligent DDoS attacks

Author keywords

[No Author keywords available]

Indexed keywords

COMMUNICATION CHANNELS (INFORMATION THEORY); CONGESTION CONTROL (COMMUNICATION); HIERARCHICAL SYSTEMS; INTELLIGENT AGENTS; SECURITY OF DATA; SIGNAL RECEIVERS; TELECOMMUNICATION NETWORKS;

EID: 2442465978     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/icdcs.2004.1281606     Document Type: Conference Paper
Times cited : (16)

References (10)
  • 3
    • 2442520453 scopus 로고    scopus 로고
    • Analysis of the generalized secure overlay services architecture
    • The Department of Computer and Information Science, The Ohio State University, August
    • D. Xuan, S. Chellappan, X. Wang, and S. Wang, "Analysis of the generalized secure overlay services architecture," Technical Report, The Department of Computer and Information Science, The Ohio State University, August 2003.
    • (2003) Technical Report
    • Xuan, D.1    Chellappan, S.2    Wang, X.3    Wang, S.4
  • 8
    • 85084163540 scopus 로고    scopus 로고
    • Centertrack: An ip overlay network for tracking dos floods
    • San Francisco, CA, August
    • R. Stone, "Centertrack: An ip overlay network for tracking dos floods," in 9 th USENIX Security Symposium, San Francisco, CA, August 2000.
    • (2000) 9th USENIX Security Symposium
    • Stone, R.1
  • 10
    • 0037968856 scopus 로고    scopus 로고
    • Mutual anonymity protocols for hybrid peer-to-peer systems
    • Providence, RI, May
    • L. Xiao, Z. Xu, andX. Zhang, "Mutual anonymity protocols for hybrid peer-to-peer systems," in Proceedings of IEEE ICDCS, Providence, RI, May 2003.
    • (2003) Proceedings of IEEE ICDCS
    • Xiao, L.1    Xu, Z.2    Zhang, X.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.