-
1
-
-
33749575547
-
-
S. Axelsson, Research in intrusion detection systems: A survey, Tech. Rep. TR 98-17, Chalmers University of Technology, 1999.
-
-
-
-
2
-
-
0002590071
-
Set covering algorithms using cutting planes, heuristics, and subgradient optimization
-
Balas E., and Ho A.C. Set covering algorithms using cutting planes, heuristics, and subgradient optimization. Mathematical Programming Study 12 (1980) 37-60
-
(1980)
Mathematical Programming Study
, vol.12
, pp. 37-60
-
-
Balas, E.1
Ho, A.C.2
-
3
-
-
33749559650
-
-
Computer Emergency Response Team (CERT), Advisory CA-2000-01 Denial-of-service developments, 2000. Available from: .
-
-
-
-
4
-
-
33749567377
-
-
CERT/CC, SANS Institute, and CERIAS, Consensus roadmap for defeating distributed denial of service attacks, 2000. Available from: .
-
-
-
-
5
-
-
0035899770
-
Perfect, ideal and balanced matrices
-
Conforti M., Cornuéjols G., Kapoor A., and Vuskovic K. Perfect, ideal and balanced matrices. European Journal of Operational Research 133 3 (2001) 455-461
-
(2001)
European Journal of Operational Research
, vol.133
, Issue.3
, pp. 455-461
-
-
Conforti, M.1
Cornuéjols, G.2
Kapoor, A.3
Vuskovic, K.4
-
6
-
-
84974862896
-
Solution of set-covering and set-partitioning problem using assignment relaxations
-
El-Darzi E., and Mitra G. Solution of set-covering and set-partitioning problem using assignment relaxations. Journal of the Operational Research Society 5 (1992) 483-493
-
(1992)
Journal of the Operational Research Society
, vol.5
, pp. 483-493
-
-
El-Darzi, E.1
Mitra, G.2
-
7
-
-
0033204106
-
-
M. Faloutsos, P. Faloutsos, C. Faloutsos, On power-law relationships of the Internet topology, in: Proc. ACM SIGCOMM, 1999, pp. 251-262.
-
-
-
-
8
-
-
33749545519
-
-
P. Ferguson, D. Senie, Network Ingress Filtering: Defeating Denial of Service Attacks which Employ IP Source Address Spoofing, RFC 2827, 2000.
-
-
-
-
9
-
-
0000554525
-
Optimal solution of set covering/partitioning problems using dual heuristics
-
Fisher M.L., and Kedia P. Optimal solution of set covering/partitioning problems using dual heuristics. Management Science 36 (1990) 674-688
-
(1990)
Management Science
, vol.36
, pp. 674-688
-
-
Fisher, M.L.1
Kedia, P.2
-
10
-
-
0002000920
-
Denial-of-service attacks rip the Internet
-
Garber L. Denial-of-service attacks rip the Internet. Computer 33 4 (2000) 12-17
-
(2000)
Computer
, vol.33
, Issue.4
, pp. 12-17
-
-
Garber, L.1
-
13
-
-
0000253416
-
Approximation algorithms for the set covering and vertex cover problems
-
Hochbaum D.S. Approximation algorithms for the set covering and vertex cover problems. SIAM Journal on Computing 11 3 (1982) 555-556
-
(1982)
SIAM Journal on Computing
, vol.11
, Issue.3
, pp. 555-556
-
-
Hochbaum, D.S.1
-
14
-
-
0037118770
-
Solving integer programs over monotone inequalities in three variables: A framework for half integrality and good approximations
-
Hochbaum D.S. Solving integer programs over monotone inequalities in three variables: A framework for half integrality and good approximations. European Journal of Operational Research 140 2 (2002) 291-321
-
(2002)
European Journal of Operational Research
, vol.140
, Issue.2
, pp. 291-321
-
-
Hochbaum, D.S.1
-
15
-
-
0035010963
-
-
K. Park, H. Lee, On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack, in: Proc. IEEE INFOCOM, 2001, pp. 338-347.
-
-
-
-
16
-
-
0034776786
-
-
K. Park, H. Lee, On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets, in: Proc. ACM SIGCOMM, 2001, pp. 15-26.
-
-
-
-
17
-
-
0033650584
-
-
S. Savage, D. Wetherall, A. Karlin, T. Anderson, Practical network support for IP traceback, in: Proc. of ACM SIGCOMM, 2000, pp. 295-306.
-
-
-
-
18
-
-
0034838197
-
-
M. Schultz, E. Eskin, E. Zadok, S. Stolfo, Data mining methods for detection of new malicious executables, in: Proc. IEEE Symposium on Security and Privacy, 2001, pp. 178-184.
-
-
-
|