-
2
-
-
0842332412
-
An efficient filter for denial-of-service bandwidth attacks
-
Dec
-
S. Abdelsayed, D. Glimsholt, C. Leckie, S. Ryan, and S. Shami. An efficient filter for denial-of-service bandwidth attacks. In IEEE Global Telecommunications Conference(GLOBECOM'03), volume 3, pages 1353-1357, Dec 2003.
-
(2003)
IEEE Global Telecommunications Conference(GLOBECOM'03)
, vol.3
, pp. 1353-1357
-
-
Abdelsayed, S.1
Glimsholt, D.2
Leckie, C.3
Ryan, S.4
Shami, S.5
-
3
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
July
-
B. H. Bloom. Space/time trade-offs in hash coding with allowable errors. Communications of the ACM, 13(7):422-426, July 1970.
-
(1970)
Communications of the ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.H.1
-
5
-
-
3543070612
-
IDR: An intrusion detection router for defending against distributed denial-of-service(DDoS) attacks
-
E. Chan, H. Chan, K. Chan, V. Chan, S. Chanson, and etc. IDR: an intrusion detection router for defending against distributed denial-of-service(DDoS) attacks. In Proceedings of the 7th International Symposium on Parallel Architectures, Algorithms and Networks 2004(ISPAN'04)., pages 581-586, 2004.
-
(2004)
Proceedings of the 7th International Symposium on Parallel Architectures, Algorithms and Networks 2004(ISPAN'04)
, pp. 581-586
-
-
Chan, E.1
Chan, H.2
Chan, K.3
Chan, V.4
Chanson, S.5
-
6
-
-
84962260018
-
Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation
-
January
-
R. Lippmann, D. Fried, I. Graf, J. Haines, K. Kendall, D. McClung, D. Weber, S. Webster, D. W. andR. Cunninghan, and M. Zissman. Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation. In the 2000 DARPA Information Survivability Conference and Exposition, January 2000.
-
(2000)
The 2000 DARPA Information Survivability Conference and Exposition
-
-
Lippmann, R.1
Fried, D.2
Graf, I.3
Haines, J.4
Kendall, K.5
McClung, D.6
Weber, D.7
Webster, S.8
W., D.9
Cunninghan, R.10
Zissman, M.11
-
9
-
-
0003260777
-
Transmission control protocol: DARPA internet program protocol specification
-
September
-
J. Postel. Transmission Control Protocol : DARPA internet program protocol specification,RFC 793, September 1981.
-
(1981)
RFC
, vol.793
-
-
Postel, J.1
-
10
-
-
0030715989
-
Analysis of a denial of service attack on TCP
-
IEEE Computer Society, May
-
C. L. Schuba, I. V. Krsul, M. G. Kuhn, E. H. Spafford, A. Sundaram, and D. Zamboni. Analysis of a denial of service attack on TCP. In Proceedings of the 1997 IEEE Symposium on Security and Privacy, pages 208-223. IEEE Computer Society, May 1997.
-
(1997)
Proceedings of the 1997 IEEE Symposium on Security and Privacy
, pp. 208-223
-
-
Schuba, C.L.1
Krsul, I.V.2
Kuhn, M.G.3
Spafford, E.H.4
Sundaram, A.5
Zamboni, D.6
-
12
-
-
0036343692
-
Detecting SYN flooding attacks
-
June 23-27
-
H. Wang, D. Zhang, and K. G. Shin. Detecting SYN flooding attacks. In Proceedings of Annual Joint Conference of the IEEE Computer and Communications Societies(INFOCOM), volume 3, pages 1530-1539, June 23-27 2002.
-
(2002)
Proceedings of Annual Joint Conference of the IEEE Computer and Communications Societies(INFOCOM)
, vol.3
, pp. 1530-1539
-
-
Wang, H.1
Zhang, D.2
Shin, K.G.3
-
13
-
-
14644397228
-
Change-point monitoring for the detection of dos attack
-
October-December
-
H. Wang, D. Zhang, and K. G. Shin. Change-point monitoring for the detection of dos attack. IEEE Transactions on Dependable and Secure Computing, 1(4):193-208, October-December 2004.
-
(2004)
IEEE Transactions on Dependable and Secure Computing
, vol.1
, Issue.4
, pp. 193-208
-
-
Wang, H.1
Zhang, D.2
Shin, K.G.3
|