-
2
-
-
25644445353
-
The design and implementation of network puzzles
-
Miami, FL, March
-
W. Feng, E. Kaiser, W. Feng, and A. Luu. The design and implementation of network puzzles. In Proceedings of IEEE INFOCOM'05, Miami, FL, March 2005.
-
(2005)
Proceedings of IEEE INFOCOM'05
-
-
Feng, W.1
Kaiser, E.2
Feng, W.3
Luu, A.4
-
3
-
-
17744369470
-
Exploiting the transients of adaptation for roq attacks on internet resources
-
Berlin, Germany, October
-
M. Guirguis, A. Bestavros, and I. Malta. Exploiting the transients of adaptation for roq attacks on internet resources. In Proceedings of IEEE ICNP'04, Berlin, Germany, October 2004.
-
(2004)
Proceedings of IEEE ICNP'04
-
-
Guirguis, M.1
Bestavros, A.2
Malta, I.3
-
4
-
-
84924375780
-
Botz-4-sale: Surviving organized DDoS attacks that mimic flash crowds
-
Boston, MA, May
-
S. Kandula, D. Katabi, M. Jacob, and A. Berger. Botz-4-sale: surviving organized DDoS attacks that mimic flash crowds. In Proceedings of NSDI'05, Boston, MA, May 2005.
-
(2005)
Proceedings of NSDI'05
-
-
Kandula, S.1
Katabi, D.2
Jacob, M.3
Berger, A.4
-
5
-
-
8344261545
-
Packetscore: Statistics-based overload control against distributed denial-of-service attacks
-
Hong Kong, March
-
Y. Kim, W. Lau, M. Chuah, and H. Chao. Packetscore: statistics-based overload control against distributed denial-of-service attacks. In Proceedings of IEEE INFOCOM'04, Hong Kong, March 2004.
-
(2004)
Proceedings of IEEE INFOCOM'04
-
-
Kim, Y.1
Lau, W.2
Chuah, M.3
Chao, H.4
-
6
-
-
33751110528
-
Taming IP packet flooding attacks
-
Cambridge, MA, November
-
K. Lakshminarayanan, D. Adkins, A. Perrig, and I. Stoica. Taming IP packet flooding attacks. In Proceedings of HotNets-II, Cambridge, MA, November 2003.
-
(2003)
Proceedings of HotNets-II
-
-
Lakshminarayanan, K.1
Adkins, D.2
Perrig, A.3
Stoica, I.4
-
8
-
-
18744376590
-
Using graphic turing tests to counter automated DDoS attacks against web servers
-
Washington, DC, October
-
W. Morein, A. Stavrou, D. Cook, A. Keromytis, V. Misra, and D. Rubenstein. Using graphic turing tests to counter automated DDoS attacks against web servers. In Proceedings of ACM CCS'03, Washington, DC, October 2003.
-
(2003)
Proceedings of ACM CCS'03
-
-
Morein, W.1
Stavrou, A.2
Cook, D.3
Keromytis, A.4
Misra, V.5
Rubenstein, D.6
-
9
-
-
0035361712
-
Network support for IP traceback
-
June
-
S. Savage, D. Wetherall, A. Karlin, and T. Anderson. Network support for IP traceback. IEEE/ACM Transactions on Networking, 9(3):226-237, June 2001.
-
(2001)
IEEE/ACM Transactions on Networking
, vol.9
, Issue.3
, pp. 226-237
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
10
-
-
12244282921
-
CAPTCHA: Using hard AI problems for security
-
Warsaw, Poland, May
-
L. von Ahn, M. Blum, N. Hopper, and J. Langford. CAPTCHA: using hard AI problems for security. In Proceedings of EUROCRYPT'03, Warsaw, Poland, May 2003.
-
(2003)
Proceedings of EUROCRYPT'03
-
-
Von Ahn, L.1
Blum, M.2
Hopper, N.3
Langford, J.4
-
11
-
-
84954422497
-
Pi: A path identification mechanism to defend against DDoS attacks
-
Oakland, CA, May
-
A. Yaar, A. Perrig, and D. Song. Pi: a path identification mechanism to defend against DDoS attacks. In Proceedings of IEEE Symposium on Security and Privacy, Oakland, CA, May 2003.
-
(2003)
Proceedings of IEEE Symposium on Security and Privacy
-
-
Yaar, A.1
Perrig, A.2
Song, D.3
-
12
-
-
3543097593
-
Siff: A stateless internet flow filter to mitigate DDoS flooding attacks
-
Oakland, CA, May
-
A. Yaar, A. Perrig, and D. Song. Siff: a stateless internet flow filter to mitigate DDoS flooding attacks. In Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 2004.
-
(2004)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Yaar, A.1
Perrig, A.2
Song, D.3
-
13
-
-
33750320244
-
A DoS-limiting network architecture
-
Philadelphia, PA, August
-
X. Yang, D. Wetherall, and T. Anderson. A DoS-limiting network architecture. In ACM SIGCOMM'05, Philadelphia, PA, August 2005.
-
(2005)
ACM SIGCOMM'05
-
-
Yang, X.1
Wetherall, D.2
Anderson, T.3
|