메뉴 건너뛰기




Volumn , Issue , 2005, Pages 493-503

On flow marking attacks in wireless anonymous communication networks

Author keywords

[No Author keywords available]

Indexed keywords

DIGITAL FILTERS; FREQUENCIES; FREQUENCY DOMAIN ANALYSIS; SIGNAL INTERFERENCE; TELECOMMUNICATION TRAFFIC; DIGITAL SIGNAL PROCESSING; DISTRIBUTED COMPUTER SYSTEMS; DISTRIBUTED PARAMETER NETWORKS; TELECOMMUNICATION NETWORKS;

EID: 27944485356     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (58)

References (51)
  • 4
    • 17444412778 scopus 로고    scopus 로고
    • Nist net - A linux-based network emulation tool
    • July
    • M. Carson and D. Santay. Nist net - a linux-based network emulation tool. Computer Communication Review, 33, July 2003.
    • (2003) Computer Communication Review , vol.33
    • Carson, M.1    Santay, D.2
  • 5
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • February
    • D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 4(2), February 1981.
    • (1981) Communications of the ACM , vol.4 , Issue.2
    • Chaum, D.1
  • 18
    • 0000629443 scopus 로고    scopus 로고
    • Dynamic source routing in ad hoc wireless networks
    • D. B. Johnson and D. A. Maltz. Dynamic source routing in ad hoc wireless networks. Mobile Computing, 1996.
    • (1996) Mobile Computing
    • Johnson, D.B.1    Maltz, D.A.2
  • 21
    • 0030646352 scopus 로고    scopus 로고
    • Position location: Fundamentals, implementation strategies, and sources of error
    • K. Krizman, T. Biedka, and T. S. Rappaport. Position location: fundamentals, implementation strategies, and sources of error. IEEE Communications Magazine, 1997.
    • (1997) IEEE Communications Magazine
    • Krizman, K.1    Biedka, T.2    Rappaport, T.S.3
  • 22
    • 8344224137 scopus 로고    scopus 로고
    • Low-rate tcptargeted denial of service attacks
    • Oakland, California
    • A. Kuzmanovic and E. W. Knightly. Low-rate tcptargeted denial of service attacks. In Proceedings of ACM SIGCOMM, Oakland, California, 2003.
    • (2003) Proceedings of ACM SIGCOMM
    • Kuzmanovic, A.1    Knightly, E.W.2
  • 28
    • 84928423206 scopus 로고    scopus 로고
    • netfilter.org. Netfilter. http://netfilter.samba.org/, 2003.
    • (2003)
  • 33
    • 0013035619 scopus 로고    scopus 로고
    • Ad-hoc on-demand distance vector routing
    • C. Perkins and E. Royer. Ad-hoc on-demand distance vector routing. Milcom, 1997.
    • (1997) Milcom
    • Perkins, C.1    Royer, E.2
  • 34
    • 85031307530 scopus 로고
    • Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers
    • C. E. Perkins and P. Bhagwat. Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. In Proceedings of SIGCOMM, 1994.
    • (1994) Proceedings of SIGCOMM
    • Perkins, C.E.1    Bhagwat, P.2
  • 43
    • 84928436170 scopus 로고    scopus 로고
    • tcpdump.org. tcpdump, 2004.
    • (2004) Tcpdump
  • 44
    • 0003610530 scopus 로고    scopus 로고
    • Computer Science Department, Texas A&M University
    • The Center for Information Assurance and Security at Texas A&M University. Flow marking attacks. Technical report. Computer Science Department, Texas A&M University, 2004.
    • (2004) Technical Report
    • Attacks, F.M.1
  • 45
    • 0031274649 scopus 로고    scopus 로고
    • Wide-area internet traffic patterns and characteristics
    • November/December
    • K. Thompson, G. Miller, and R. Wilder. Wide-area internet traffic patterns and characteristics. IEEE Network magazine, 11(6), November/December 1997.
    • (1997) IEEE Network Magazine , vol.11 , Issue.6
    • Thompson, K.1    Miller, G.2    Wilder, R.3
  • 46
    • 24344490149 scopus 로고    scopus 로고
    • TimeSys. Timesys linux docs, http://www.timesys.com/, 2003.
    • (2003) Timesys Linux Docs
  • 48
    • 0031078972 scopus 로고    scopus 로고
    • Self-similarity through high-variability: Statistical analysis of ethernet lan traffic at the source level
    • W. Willinger, M. S. Taqqu, R. Sherman, and D. V. Wilson. Self-similarity through high-variability: Statistical analysis of ethernet lan traffic at the source level. IEEE/ACM Transactions on Networking, 5(1):71-86, 1997.
    • (1997) IEEE/ACM Transactions on Networking , vol.5 , Issue.1 , pp. 71-86
    • Willinger, W.1    Taqqu, M.S.2    Sherman, R.3    Wilson, D.V.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.