-
1
-
-
85044551501
-
Reconstructing algebraic functions from mixed data
-
IEEE Computer Society Press, Los Alamitos, Calif.
-
AR, S., LIPTON, R., RUBINFELD, R., AND SUDAN, M. 1992. Reconstructing algebraic functions from mixed data. In Proceedings of 33rd Annual Symposium on Foundations of Computer Science. IEEE Computer Society Press, Los Alamitos, Calif. 503-512.
-
(1992)
Proceedings of 33rd Annual Symposium on Foundations of Computer Science
, pp. 503-512
-
-
Ar, S.1
Lipton, R.2
Rubinfeld, R.3
Sudan, M.4
-
2
-
-
0004075434
-
ICMP traceback messages
-
draft-bellovin-itrace-00.txt
-
BELLOVIN, S. M. 2000. ICMP traceback messages. Internet Draft: draft-bellovin-itrace-00.txt.
-
(2000)
Internet Draft
-
-
Bellovin, S.M.1
-
6
-
-
0034448864
-
Using router stamping to identify the source of IP packets
-
ACM, New York
-
DOEPPNER, T., KLEIN, P., AND KOYFMAN, A. 2000. Using router stamping to identify the source of IP packets. In Proceedings of the 7th ACM Conference on Computer and Communications Security. ACM, New York, 184-189.
-
(2000)
Proceedings of the 7th ACM Conference on Computer and Communications Security
, pp. 184-189
-
-
Doeppner, T.1
Klein, P.2
Koyfman, A.3
-
7
-
-
27844574631
-
Efficient schemes for probabilistic packet marking
-
University of Massachusetts
-
DONG, Q., ADLER, M., AND HIRATA, K. 2004. Efficient schemes for probabilistic packet marking. Amherst Tech. Rep. 2004-67, University of Massachusetts.
-
(2004)
Amherst Tech. Rep.
, vol.2004
, Issue.67
-
-
Dong, Q.1
Adler, M.2
Hirata, K.3
-
8
-
-
0003553457
-
Network ingress filetring: Defeating denial of service attacks which employ IP source address spoofing
-
FERGUSON, P., AND SENIE, D. 1998. Network ingress filetring: Defeating denial of service attacks which employ IP source address spoofing. The Internet Society RFC 2267.
-
(1998)
The Internet Society RFC
, vol.2267
-
-
Ferguson, P.1
Senie, D.2
-
10
-
-
3042802739
-
Tracing the source of network attack: A technical, legal and societal problem
-
IEEE Computer Society Press, Los Alamitos, Calif.
-
LEE, S., AND SHIELDS, C. 2001. Tracing the source of network attack: A technical, legal and societal problem. In Proceedings of the 2001 IEEE Workshop on Information Assurance and Security. IEEE Computer Society Press, Los Alamitos, Calif.
-
(2001)
Proceedings of the 2001 IEEE Workshop on Information Assurance and Security
-
-
Lee, S.1
Shields, C.2
-
12
-
-
0035010963
-
On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack
-
IEEE Computer Society Press, Los Alamitos, Calif.
-
PARK, K., AND LEE, H. 2001a. On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack. In Proceedings of the IEEE INFOCOM. IEEE Computer Society Press, Los Alamitos, Calif., 338-347.
-
(2001)
Proceedings of the IEEE INFOCOM
, pp. 338-347
-
-
Park, K.1
Lee, H.2
-
13
-
-
0001083965
-
On the effectiveness of route-based packet filtering for distributed dos attack prevention in power-law internets
-
ACM, New York
-
PARK, K., AND LEE, H. 2001b. On the effectiveness of route-based packet filtering for distributed dos attack prevention in power-law internets. In Proceedings of the ACM SIGCOMM. ACM, New York.
-
(2001)
Proceedings of the ACM SIGCOMM
-
-
Park, K.1
Lee, H.2
-
14
-
-
0031122982
-
Effective erasure codes for reliable computer communication protocols
-
RIZZO, L. 1997. Effective erasure codes for reliable computer communication protocols. ACM Comput. Commun. Rev. 27, 2 (Apr.), 24-36.
-
(1997)
ACM Comput. Commun. Rev.
, vol.27
, Issue.2 APR.
, pp. 24-36
-
-
Rizzo, L.1
-
15
-
-
0033650584
-
Practical network support for IP traceback
-
ACM, New York
-
SAVAGE, S., WETHERALL, D., KARLIN, A., AND ANDERSON, T. 2000. Practical network support for IP traceback. In Proceedings of ACM SIGCOMM. ACM, New York, 295-306.
-
(2000)
Proceedings of ACM SIGCOMM
, pp. 295-306
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
16
-
-
0001887844
-
Hash-based IP traceback
-
ACM, New York
-
SNOEREN, A. C., PARTRIDGE, C., SANCHEZ, L. A., JONES, C. E., TCHAKOUNTIO, F., KENT, S. T., AND STRAYER, W. T. 2001. Hash-based IP traceback. In Proceedings of the ACM SIGCOMM. ACM, New York.
-
(2001)
Proceedings of the ACM SIGCOMM
-
-
Snoeren, A.C.1
Partridge, C.2
Sanchez, L.A.3
Jones, C.E.4
Tchakountio, F.5
Kent, S.T.6
Strayer, W.T.7
-
17
-
-
0034997397
-
Advanced and authenticated marking schemes for IP traceback
-
IEEE Computer Society Press, Los Alamitos, Calif.
-
SONG, D. X., AND PERRIG, A. 2001. Advanced and authenticated marking schemes for IP traceback. In Proceedings of the IEEE INFOCOM. IEEE Computer Society Press, Los Alamitos, Calif.
-
(2001)
Proceedings of the IEEE INFOCOM
-
-
Song, D.X.1
Perrig, A.2
-
18
-
-
0037810705
-
Pi: A path identification mechanism to defend against DDoS attacks
-
IEEE Computer Society Press, Los Alamitos, Calif.
-
YAAR, A., PERRIG, A., AND SONG, D. 2003. Pi: A path identification mechanism to defend against DDoS attacks. In Proceedings of the IEEE Security and Privacy Symposium. IEEE Computer Society Press, Los Alamitos, Calif.
-
(2003)
Proceedings of the IEEE Security and Privacy Symposium
-
-
Yaar, A.1
Perrig, A.2
Song, D.3
|