-
1
-
-
0033716995
-
2000 CSI/FBI computer crime and security survey
-
R. Power, "2000 CSI/FBI Computer Crime and Security Survey," Computer Security J., vol. 16, no. 2, 2000, pp. 33-49.
-
(2000)
Computer Security J.
, vol.16
, Issue.2
, pp. 33-49
-
-
Power, R.1
-
2
-
-
84889319684
-
Risks of relying on cryptography
-
B. Schneier, "Risks of Relying on Cryptography," Comm. ACM, vol. 42, no. 10, 1999, p. 144.
-
(1999)
Comm. ACM
, vol.42
, Issue.10
, pp. 144
-
-
Schneier, B.1
-
3
-
-
0008922435
-
The XenoService-A distributed defeat for distributed denial of service
-
LNCS 1975, Springer-Verlag
-
J. Yan, S. Early, and R. Anderson, "The XenoService-A Distributed Defeat for Distributed Denial of Service," Proc. Information Survivability Workshop, LNCS 1975, Springer-Verlag, 2000, www.ftp.cl.cam.ac.uk/ftp/users/rja14/xeno.pdf.
-
(2000)
Proc. Information Survivability Workshop
-
-
Yan, J.1
Early, S.2
Anderson, R.3
-
4
-
-
85034043506
-
Protecting web servers from distributed denial-of-service attacks
-
ACM Press
-
F. Kargi, J. Maier, and M. Weber, "Protecting Web Servers from Distributed Denial-of-Service Attacks," Proc. Worldwide Web Conf. 10, ACM Press, 2001, pp. 514-524.
-
(2001)
Proc. Worldwide Web Conf.
, vol.10
, pp. 514-524
-
-
Kargi, F.1
Maier, J.2
Weber, M.3
-
5
-
-
0034776786
-
On the effectiveness of route-based packet filtering for distributed DoS attack and prevention in power-law internets
-
ACM Press
-
K. Park and H. Lee, "On the Effectiveness of Route-Based Packet Filtering for Distributed DoS Attack and Prevention in Power-Law Internets," Proc. ACM Sigcomm, ACM Press, 2001, pp. 15-26.
-
(2001)
Proc. ACM Sigcomm
, pp. 15-26
-
-
Park, K.1
Lee, H.2
-
6
-
-
0033204106
-
On power-law relationships of the internet topology
-
ACM Press
-
M. Faloutsos, P. Faloutsos, and C. Faloutsos, "On Power-Law Relationships of the Internet Topology," Proc. ACM Sigcomm, ACM Press, 1999, pp. 251-262.
-
(1999)
Proc. ACM Sigcomm
, pp. 251-262
-
-
Faloutsos, M.1
Faloutsos, P.2
Faloutsos, C.3
-
7
-
-
9444231917
-
Defending against a large-scale denial-of-service attack
-
US Military Academy, West Point
-
S. Mohiuddin et al., "Defending Against a Large-Scale Denial-of-Service Attack," Proc. 2002 IEEE Workshop Information Assurance, US Military Academy, West Point, 2002, pp. 139-146.
-
(2002)
Proc. 2002 IEEE Workshop Information Assurance
, pp. 139-146
-
-
Mohiuddin, S.1
-
8
-
-
16244362550
-
What do we mean by network denial of service?
-
US Military Academy, West Point
-
C. Shields, "What Do We Mean by Network Denial of Service?" Proc. 2002 IEEE Workshop Information Assurance, US Military Academy, West Point, 2002, pp. 196-203.
-
(2002)
Proc. 2002 IEEE Workshop Information Assurance
, pp. 196-203
-
-
Shields, C.1
-
10
-
-
85008056769
-
Protecting routing infrastructures from denial of service using cooperative intrusion detection
-
ACM Press
-
S. Cheung and K.N. Levitt, "Protecting Routing Infrastructures from Denial of Service Using Cooperative Intrusion Detection," Proc. New Security Paradigms Workshop, ACM Press, 1997, pp. 94-106.
-
(1997)
Proc. New Security Paradigms Workshop
, pp. 94-106
-
-
Cheung, S.1
Levitt, K.N.2
-
11
-
-
0031703272
-
Detecting disruptive routers: A distributed network monitoring approach
-
IEEE CS Press
-
K.A. Bradley et al., "Detecting Disruptive Routers: A Distributed Network Monitoring Approach," Proc. 1998 IEEE Symp. Security and Privacy, IEEE CS Press, 1998, pp. 115-124.
-
(1998)
Proc. 1998 IEEE Symp. Security and Privacy
, pp. 115-124
-
-
Bradley, K.A.1
-
12
-
-
0004934998
-
Vulnerabilities of network control protocols: An example
-
E.C. Rosen, "Vulnerabilities of Network Control Protocols: An Example," ACM Sigcomm Computer Comm. Rev., vol. 11, no. 3, 1981, pp. 10-16.
-
(1981)
ACM Sigcomm Computer Comm. Rev.
, vol.11
, Issue.3
, pp. 10-16
-
-
Rosen, E.C.1
-
13
-
-
9444235799
-
Analysis of denial of service using an address resolution protocol attack
-
US Military Academy, West Point
-
W.J. Blackert, D.C. Furnanage, and Y.A. Koukoulas, "Analysis of Denial of Service Using an Address Resolution Protocol Attack," Proc. 2002 IEEE Workshop on Information Assurance, US Military Academy, West Point, 2002, pp. 17-22.
-
(2002)
Proc. 2002 IEEE Workshop on Information Assurance
, pp. 17-22
-
-
Blackert, W.J.1
Furnanage, D.C.2
Koukoulas, Y.A.3
|