-
1
-
-
0031700563
-
Wavelet analysis of long-range-dependent traffic
-
P. Abry and D. Veitch, "Wavelet Analysis of Long-Range-Dependent Traffic," IEEE Trans. Information Theory, vol. 44, no. 1, 1998, pp. 2-15.
-
(1998)
IEEE Trans. Information Theory
, vol.44
, Issue.1
, pp. 2-15
-
-
Abry, P.1
Veitch, D.2
-
2
-
-
85032752116
-
Multiscale nature of network traffic
-
P. Abry, R. Baraniuk, P. Flandrin, R. Riedi, and D. Veitch, "Multiscale Nature of Network Traffic," IEEE Signal Processing Magazine, vol. 19, no. 3, 2002, pp. 28-46.
-
(2002)
IEEE Signal Processing Magazine
, vol.19
, Issue.3
, pp. 28-46
-
-
Abry, P.1
Baraniuk, R.2
Flandrin, P.3
Riedi, R.4
Veitch, D.5
-
3
-
-
27744442107
-
-
John Wiley & Sons
-
R. Allen and D. Mills, Signal Analysis: Time, Frequency, Scale, and Structure, John Wiley & Sons, 2004.
-
(2004)
Signal Analysis: Time, Frequency, Scale, and Structure
-
-
Allen, R.1
Mills, D.2
-
4
-
-
0141427794
-
A signal analysis of network traffic anomalies
-
P. Barford, J. Kline, D. Plonka, and A. Ron, "A Signal Analysis of Network Traffic Anomalies," Proc. Internet Measurement Workshop, 2002.
-
(2002)
Proc. Internet Measurement Workshop
-
-
Barford, P.1
Kline, J.2
Plonka, D.3
Ron, A.4
-
5
-
-
0036804084
-
Defending against flooding-based distributed denial-of-service attacks: A tutorial
-
Oct.
-
R. K. Chang, "Defending Against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial," IEEE Communications Magazine, Oct. 2002.
-
(2002)
IEEE Communications Magazine
-
-
Chang, R.K.1
-
8
-
-
0036967463
-
Use of spectral analysis in defense against DoS attacks
-
Taipei, China
-
C.-M. Cheng, H. Kung, and K.-S. Tan, "Use of Spectral Analysis in Defense against DoS Attacks," Proc. IEEE GLOBECOM, Taipei, China, 2002.
-
(2002)
Proc. IEEE GLOBECOM
-
-
Cheng, C.-M.1
Kung, H.2
Tan, K.-S.3
-
9
-
-
4243137229
-
Cyber defence technology networking and evaluation
-
DETER and EMIST Team Members Mar.
-
DETER and EMIST Team Members, "Cyber Defence Technology Networking and Evaluation," Comm. ACM, vol. 47, no. 3, Mar. 2004, pp. 58-61.
-
(2004)
Comm. ACM
, vol.47
, Issue.3
, pp. 58-61
-
-
-
14
-
-
33751407605
-
-
under submission
-
X. He, C. Papadopoulos, J. Heidemann, and A. Hussain, "Spectral Characteristics of Saturated Links," under submission, http://www.isi.edu/ ~johnh/PAPERS/He04a.html.
-
Spectral Characteristics of Saturated Links
-
-
He, X.1
Papadopoulos, C.2
Heidemann, J.3
Hussain, A.4
-
15
-
-
0003254064
-
A non-intrusive, wavelet-based approach to detecting network performance problems
-
P. Huang, A. Feldmann, and W. Willinger, "A Non-Intrusive, Wavelet-Based Approach to Detecting Network Performance Problems," Proc. ACM SIGCOMM Internet Measurement Workshop, 2001.
-
(2001)
Proc. ACM SIGCOMM Internet Measurement Workshop
-
-
Huang, P.1
Feldmann, A.2
Willinger, W.3
-
17
-
-
8344224137
-
Low-rate TCP-targeted denial of service attacks - The shrew vs. the mice and elephants
-
Aug.
-
A. Kuzmanovic and E. W. Knightly, "Low-Rate TCP-Targeted Denial of Service Attacks - The Shrew vs. the Mice and Elephants," Proc. ACM SIGCOMM2003, Aug. 2003.
-
(2003)
Proc. ACM SIGCOMM2003
-
-
Kuzmanovic, A.1
Knightly, E.W.2
-
18
-
-
26444519904
-
HAWK: Halting anomaly with weighted choking to rescue well-behaved TCP sessions from shrew DoS attacks
-
Zhangjiajie, China, Aug. 2-4
-
Y.-K. Kwok, R. Tripathi, Y. Chen, and K. Hwang, "HAWK: Halting Anomaly with Weighted ChoKing to Rescue Well-Behaved TCP Sessions from Shrew DoS Attacks," Proc. Int'l Conf. on Computer Networks and Mobile Computing (ICCNMC 2005), Zhangjiajie, China, Aug. 2-4, 2005.
-
(2005)
Proc. Int'l Conf. on Computer Networks and Mobile Computing (ICCNMC 2005)
-
-
Kwok, Y.-K.1
Tripathi, R.2
Chen, Y.3
Hwang, K.4
-
19
-
-
4544388084
-
The effect of malicious traffic on the network
-
La Jolla, Apr. 6-8
-
K. C. Lan, A. Hussain, and D. Dutta, "The Effect of Malicious Traffic on the Network," Proc. PAM, La Jolla, Apr. 6-8, 2003.
-
(2003)
Proc. PAM
-
-
Lan, K.C.1
Hussain, A.2
Dutta, D.3
-
20
-
-
84939860310
-
On a new class of pulsing denial-of-service attacks and the defense
-
San Diego, CA, Feb. 2-5
-
X. Luo and R. K. Chang, "On a New Class of Pulsing Denial-of-Service Attacks and the Defense," Network and Distributed System Security Symposium (NDSS'05), San Diego, CA, Feb. 2-5, 2005.
-
(2005)
Network and Distributed System Security Symposium (NDSS'05)
-
-
Luo, X.1
Chang, R.K.2
-
23
-
-
33751426782
-
-
NS-2
-
NS-2, http://www.isi.edu/nsnam/ns/, 2004.
-
(2004)
-
-
-
24
-
-
0036980251
-
Using signal processing to analyze wireless data traffic
-
Atlanta, GA, Sept.
-
C. Partridge, D. Cousins, A. Jackson, R. Krishnan, T. Saxena, and W. T. Strayer, "Using Signal Processing to Analyze Wireless Data Traffic," Proc. ACM Workshop on Wireless Security, Atlanta, GA, Sept. 2002.
-
(2002)
Proc. ACM Workshop on Wireless Security
-
-
Partridge, C.1
Cousins, D.2
Jackson, A.3
Krishnan, R.4
Saxena, T.5
Strayer, W.T.6
-
25
-
-
0003273441
-
Computing TCP's retransmission timer
-
Nov.
-
V. Paxson and M. Allman, "Computing TCP's Retransmission Timer," Internet RFC 2988, Nov. 2000.
-
(2000)
Internet RFC
, vol.2988
-
-
Paxson, V.1
Allman, M.2
-
26
-
-
85132972574
-
Distributed denial of service: Taxonomies of attacks, tools and countermeasures
-
Sept. 18
-
S. M. Specht and R. B. Lee, "Distributed Denial of Service: Taxonomies of Attacks, Tools and Countermeasures," Proc. PDCS, Sept. 18, 2004.
-
(2004)
Proc. PDCS
-
-
Specht, S.M.1
Lee, R.B.2
-
27
-
-
17744379157
-
Defending against low-rate TCP attacks: Dynamic detection and protection
-
Berlin, Germany, Oct.
-
H. Sun, J. Lui, and D. Yau, "Defending Against Low-rate TCP Attacks: Dynamic Detection and Protection," Proc. IEEE International Conference on Network Protocols (ICNP), Berlin, Germany, Oct. 2004.
-
(2004)
Proc. IEEE International Conference on Network Protocols (ICNP)
-
-
Sun, H.1
Lui, J.2
Yau, D.3
|