-
1
-
-
17744375238
-
-
Feb.
-
Anderson, T., R. Mahajan, N. Spring, and D. Wetherall, "Rocketfuel: An ISP Topology Mapping Engine," http://www.cs.washington.edu/research/ networking/, Feb. 2006
-
(2006)
Rocketfuel: An ISP Topology Mapping Engine
-
-
Anderson, T.1
Mahajan, R.2
Spring, N.3
Wetherall, D.4
-
2
-
-
1642535783
-
A novel approach to detection of DoS attacks via adaptive sequential and batch-sequential change-point detection methods
-
June
-
Blazek, R., H. Kim, B. Rozovskii, and A. Tartakovsky, "A Novel Approach to Detection of DoS Attacks via Adaptive Sequential and Batch-sequential Change-Point Detection Methods," Proc. of IEEE Workshop on Infor-mation Assurance and Security, June 2001.
-
(2001)
Proc. of IEEE Workshop on Infor-mation Assurance and Security
-
-
Blazek, R.1
Kim, H.2
Rozovskii, B.3
Tartakovsky, A.4
-
3
-
-
14844318430
-
-
Berman, F., G. Fox, and A. Hey (editors), John Wiley, U.K
-
Berman, F., G. Fox, and A. Hey (editors), GRID COMPUTING, John Wiley, U.K., 2003.
-
(2003)
Grid Computing
-
-
-
4
-
-
84860047021
-
Cooperation in internet data acquisition and analysis
-
Cambridge, MA., Sept.
-
Monk, T. and K. Claffy, "Cooperation in Internet Data Acquisition and Analysis," Coordination and Administration of the Internet Workshop, Cambridge, MA., Sept. 1996. (CAIDA Project, http://www.caida.org/)
-
(1996)
Coordination and Administration of the Internet Workshop
-
-
Monk, T.1
Claffy, K.2
-
6
-
-
31544436627
-
Denial-of-service attack detection techniques
-
January
-
Carl, G., G. Kesidis, R. Brooks, and S. Rai, "Denial-of-Service Attack Detection Techniques," IEEE Internet Computing, January 2006.
-
(2006)
IEEE Internet Computing
-
-
Carl, G.1
Kesidis, G.2
Brooks, R.3
Rai, S.4
-
7
-
-
33746985496
-
Collaborative detection and filtering of shrew DDoS attacks with spectral analysis
-
Chen, Y. and K. Hwang, "Collaborative Detection and Filtering of Shrew DDoS Attacks with Spectral Analysis", Journal of Parallel and Distributed Computing, 2006.
-
(2006)
Journal of Parallel and Distributed Computing
-
-
Chen, Y.1
Hwang, K.2
-
8
-
-
33845584172
-
Defense against internet worms and DDoS attacks with dynamic hardware and network processors
-
Chapter 13 edited by R. Lee and S. Smith, Morgan Kaufmann
-
Chen, Y., M. Cai, and K. Hwang, "Defense against Internet Worms and DDoS Attacks with Dynamic Hardware and Network Processors", Chapter 13 in HARDWARE-BASED SECURITY, edited by R. Lee and S. Smith, Morgan Kaufmann, 2006
-
(2006)
Hardware-based Security
-
-
Chen, Y.1
Cai, M.2
Hwang, K.3
-
9
-
-
0036871268
-
Internet infrastructure security: A taxonomy
-
November
-
Chakrabarti, A. and G. Manimaran, "Internet Infrastructure Security: A Taxonomy", IEEE Network, November 2002.
-
(2002)
IEEE Network
-
-
Chakrabarti, A.1
Manimaran, G.2
-
11
-
-
0035455653
-
The anatomy of the grid
-
Foster, I., C, Kesselman, and S. Tuecke, "The Anatomy of the Grid," International Journal of Supercomputer Applications, 15(3), 2001
-
(2001)
International Journal of Supercomputer Applications
, vol.15
, Issue.3
-
-
Foster, I.1
Kesselman, C.2
Tuecke, S.3
-
12
-
-
9944219878
-
Peer-to-peer grids
-
Chapter 18 edited by Berman Fox, and Hey, Wiley
-
Fox, G., et al, "Peer-to-Peer Grids", Chapter 18 in GRID COMPUTING, edited by Berman Fox, and Hey, Wiley, 2003, pp.471-490.
-
(2003)
Grid Computing
, pp. 471-490
-
-
Fox, G.1
-
14
-
-
0003976889
-
-
Houle, K., G. Weaver, N. Long, and R. Thomas, "Trends in Denial of Service Attack Technology", CERT Coordination Center Document, 2001, www.cert.org/archive/pdf/.
-
(2001)
Trends in Denial of Service Attack Technology
-
-
Houle, K.1
Weaver, G.2
Long, N.3
Thomas, R.4
-
15
-
-
33646476351
-
Security binding and worm/DDoS defense infrastructure for trusted grid computing
-
Hwang, K., Y.K. Kwok, S. Song, M. Cai. And Yu Chen, and Ying Chen, "Security Binding and Worm/DDoS Defense Infrastructure for Trusted Grid Computing", International Journal on Critical Infrastructures, Vol.2, No.4, 2005.
-
(2005)
International Journal on Critical Infrastructures
, vol.2
, Issue.4
-
-
Hwang, K.1
Kwok, Y.K.2
Song, S.3
Cai, M.4
Chen, Y.5
Chen, Y.6
-
16
-
-
77953077374
-
Flash crowds and denial-of-service attacks: Characterization and implications for CDNs and web sites
-
ACM Press
-
Jung, J., B. Krishnamurthy, and M. Rabinovich, "Flash Crowds and Denial-of-Service Attacks: Characterization and Implications for CDNs and Web Sites," Proc. of Int'l World Wide Web Conference, ACM Press, 2002.
-
(2002)
Proc. of Int'l World Wide Web Conference
-
-
Jung, J.1
Krishnamurthy, B.2
Rabinovich, M.3
-
17
-
-
8344224137
-
Low-rate TCP-targeted denial of service attacks - The shrew vs. the mice and elephants
-
Aug.
-
Kuzmanovic, A. and E. W. Knightly, "Low-Rate TCP-Targeted Denial of Service Attacks - The Shrew vs. the Mice and Elephants," Proc. of ACM SIGCOMM 2003, Aug. 2003
-
(2003)
Proc. of ACM SIGCOMM 2003
-
-
Kuzmanovic, A.1
Knightly, E.W.2
-
19
-
-
3543115759
-
Alliance formation for DDoS defense
-
August
-
Mirkovic, J., M. Robinson, P. Reiher, and G. Kuenning, "Alliance Formation for DDoS Defense," in Proceedings of the New Security Paradigms Workshop, ACM SIGSAC, August 2003.
-
(2003)
Proceedings of the New Security Paradigms Workshop, ACM SIGSAC
-
-
Mirkovic, J.1
Robinson, M.2
Reiher, P.3
Kuenning, G.4
-
20
-
-
27644518127
-
D-WARD: A source-end defense against flooding denial-of-service attacks
-
July
-
Mirkovic, J. and P. Reiher, "D-WARD: A Source-End Defense Against Flooding Denial-of-Service Attacks," IEEE Trans. on Dependable and Secure Computing, Vol. 2, No. 3, July 2005, pp. 216-232
-
(2005)
IEEE Trans. on Dependable and Secure Computing
, vol.2
, Issue.3
, pp. 216-232
-
-
Mirkovic, J.1
Reiher, P.2
-
23
-
-
84942253601
-
COSSACK: Coordinated suppression of simultaneous attacks
-
Papadopoulos, C., R. Lindell, J. Mehringer, A. Hussain, R. Govindan, "COSSACK: Coordinated Suppression of Simultaneous Attacks," Proceedings of DISCEX III, 2003, pp. 2-13.
-
(2003)
Proceedings of DISCEX III
, pp. 2-13
-
-
Papadopoulos, C.1
Lindell, R.2
Mehringer, J.3
Hussain, A.4
Govindan, R.5
-
24
-
-
38049152816
-
Detecting distributed denial of service attacks by sharing distributed beliefs
-
LNCS 2727
-
Peng, T., C. Leckie, and K. Ramamohanarao, "Detecting Distributed Denial of Service Attacks by Sharing Distributed Beliefs," ACISP 2003, LNCS 2727, pp.214-225, 2003.
-
(2003)
ACISP 2003
, pp. 214-225
-
-
Peng, T.1
Leckie, C.2
Ramamohanarao, K.3
-
25
-
-
84878737375
-
Combining filtering and statistical methods for anomaly detection
-
Berkeley, CA. Oct. 19-21
-
Soule, A., K. Salamatian, and N. Taft, "Combining Filtering and Statistical Methods for Anomaly Detection," Proc. of ACM Internet Measurement Conf. Berkeley, CA. Oct. 19-21, 2005.
-
(2005)
Proc. of ACM Internet Measurement Conf.
-
-
Soule, A.1
Salamatian, K.2
Taft, N.3
-
27
-
-
14644397228
-
Change-point monitoring for the detection of DoS attacks
-
Oct.
-
Wang, H., D. Zhang, and K. Shin, "Change-Point Monitoring for the Detection of DoS Attacks," IEEE Trans. on Dependable and Secure Computing, Vol.1, No.4, Oct., 2004.
-
(2004)
IEEE Trans. on Dependable and Secure Computing
, vol.1
, Issue.4
-
-
Wang, H.1
Zhang, D.2
Shin, K.3
-
28
-
-
33847114017
-
Trust-preserving overlay networks for global reputation aggregation in scalable P2P grids
-
Rhodes Island, Greece, April 25-28
-
Zhou, R. and K. Hwang, "Trust-Preserving Overlay Networks for Global Reputation Aggregation in Scalable P2P Grids", IEEE Parallel and Distributed Processing Symposium (IPDPS-2206), Rhodes Island, Greece, April 25-28, 2006..
-
(2006)
IEEE Parallel and Distributed Processing Symposium (IPDPS-2206)
-
-
Zhou, R.1
Hwang, K.2
|