메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages

Defending against TCP SYN flooding attacks under different types of IP spoofing

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SIMULATION; DATA STRUCTURES; DISTRIBUTED COMPUTER SYSTEMS; INTERNET; SECURITY OF DATA;

EID: 33750958535     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICNICONSMCL.2006.72     Document Type: Conference Paper
Times cited : (56)

References (13)
  • 3
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • July
    • B. H. Bloom. Space/time trade-offs in hash coding with allowable errors. Communications of the ACM, 13(7):422-426, July 1970.
    • (1970) Communications of the ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.H.1
  • 8
    • 11144272176 scopus 로고    scopus 로고
    • A taxonomy of DDoS attack and DDoS defense mechanisms
    • April
    • J. Mirkovic and P. Reiher. A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Computer Communications Review, 34(2):39-54, April 2004.
    • (2004) ACM SIGCOMM Computer Communications Review , vol.34 , Issue.2 , pp. 39-54
    • Mirkovic, J.1    Reiher, P.2
  • 9
    • 0003260777 scopus 로고
    • Transmission control protocol: DARPA internet program protocol specification
    • September
    • J. Postel. Transmission Control Protocol : DARPA internet program protocol specification,RFC 793, September 1981.
    • (1981) RFC , vol.793
    • Postel, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.