-
2
-
-
0003375670
-
An analysis of using reflectors for distributed denial-of-service attacks
-
Jul
-
V. Paxson. An Analysis of Using Reflectors for Distributed Denial-of-Service Attacks. ACM Computer Communications Review 31(3), Jul. 2001.
-
(2001)
ACM Computer Communications Review
, vol.31
, Issue.3
-
-
Paxson, V.1
-
3
-
-
0003804730
-
A Weakness in the 4.2BSD Unix TCP/IP Software
-
AT&T Bell Labs, Feb
-
R.T. Morris. A Weakness in the 4.2BSD Unix TCP/IP Software. Technical Report Computer Science #117, AT&T Bell Labs, Feb. 1985.
-
(1985)
Technical Report Computer Science #117
-
-
Morris, R.T.1
-
4
-
-
0003553457
-
Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing
-
Jan
-
P. Ferguson and D. Senie. Network Ingress Filtering: Defeating Denial of Service Attacks which Employ IP Source Address Spoofing. Tech. Rep. RFC 2267, Jan. 1998.
-
(1998)
Tech. Rep. RFC 2267
-
-
Ferguson, P.1
Senie, D.2
-
5
-
-
0033650584
-
Practical network support for IP traceback
-
Stockholm, Sweden, Aug
-
S. Savage, D. Wetherall, A. Karlin, and T. Anderson. Practical Network Support for IP Traceback. Proc. ACM SIGCOMM, pp. 295-306, Stockholm, Sweden, Aug. 2000.
-
(2000)
Proc. ACM SIGCOMM
, pp. 295-306
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
6
-
-
17644411571
-
Hop-count filtering an effective defense against spoofed traffic
-
ISBN 1-58113-738-9, Washington DC, Oct
-
S. Jing, H. Wang, and K. Shin. Hop-Count Filtering An Effective Defense Against Spoofed Traffic. Proc. ACM Conference on Computer and Communications Security, pp. 30-41, ISBN 1-58113-738-9, Washington DC, Oct. 2003.
-
(2003)
Proc. ACM Conference on Computer and Communications Security
, pp. 30-41
-
-
Jing, S.1
Wang, H.2
Shin, K.3
-
7
-
-
4544272175
-
Controlling high bandwidth aggregates in the network
-
July
-
R. Mahajan, S. Bellovin, S. Floyd, J. Ioannidis, V. Paxson, and S. Shenker. Controlling High Bandwidth Aggregates in the Network. SIGCOMM Computer Communications Review, 32(3):62-73, July 2002.
-
(2002)
SIGCOMM Computer Communications Review
, vol.32
, Issue.3
, pp. 62-73
-
-
Mahajan, R.1
Bellovin, S.2
Floyd, S.3
Ioannidis, J.4
Paxson, V.5
Shenker, S.6
-
8
-
-
33744945767
-
SOS: Secure overlay services
-
ISBN 1-58113-570-X, Pittsburgh, PA, Aug
-
A. Keromytis, V. Misra, and D. Rubenstein. SOS: Secure Overlay Services. Proc. ACM SIGCOMM, pp. 61-72, ISBN 1-58113-570-X, Pittsburgh, PA, Aug. 2002.
-
(2002)
Proc. ACM SIGCOMM
, pp. 61-72
-
-
Keromytis, A.1
Misra, V.2
Rubenstein, D.3
-
9
-
-
33745470948
-
Forming alliance for DDoS defense
-
Centro Stefano Francini, Ascona, Switzerland, Aug
-
J. Mirkovic, P. Reiher, and M. Robinson. Forming Alliance for DDoS Defense. New Security Paradigms Workshop, Centro Stefano Francini, Ascona, Switzerland, Aug. 2003.
-
(2003)
New Security Paradigms Workshop
-
-
Mirkovic, J.1
Reiher, P.2
Robinson, M.3
-
10
-
-
33846630543
-
Cognitive packet networks: Qos and performance
-
ISBN 0-7695-0728-X, Fort Worth, TX, Oct
-
E. Gelenbe, R. Lent, and Z. Xu. Cognitive Packet Networks: QoS and Performance. Proc. IEEE MASCOTS Conference, ISBN 0-7695-0728-X, pp. 3-12, Fort Worth, TX, Oct. 2002.
-
(2002)
Proc. IEEE MASCOTS Conference
, pp. 3-12
-
-
Gelenbe, E.1
Lent, R.2
Xu, Z.3
-
13
-
-
4544262689
-
Autonomous smart routing for network qos
-
ISBN 0-7695-2114-2, May 17-18, New York
-
E. Gelenbe, M. Gellman, R. Lent, P. Liu, Pu Su. Autonomous Smart Routing for Network QoS. Proc. First International Conference on Autonomic Computing (IEEE Computer Society), ISBN 0-7695-2114-2, pp. 232-239, May 17-18, 2004, New York.
-
(2004)
Proc. First International Conference on Autonomic Computing (IEEE Computer Society)
, pp. 232-239
-
-
Gelenbe, E.1
Gellman, M.2
Lent, R.3
Liu, P.4
Su, P.5
|