-
1
-
-
33646706570
-
Securing wireless mesh networks
-
April
-
N. B. Salem and J.-P. Hubaux, "Securing wireless mesh networks," IEEE Wireless Communications, 13(2), pp. 15-55, April 2006.
-
(2006)
IEEE Wireless Communications
, vol.13
, Issue.2
, pp. 15-55
-
-
Salem, N.B.1
Hubaux, J.-P.2
-
2
-
-
84967657448
-
-
C. Cordeiro, and D. P. Agrawal, Ad hoc & sensor networks, theory and applications, World scientific publishing, spring 2006, ISBN No. 81-256-681-3; 81-256-682-1 (paper back).
-
C. Cordeiro, and D. P. Agrawal, "Ad hoc & sensor networks, theory and applications," World scientific publishing, spring 2006, ISBN No. 81-256-681-3; 81-256-682-1 (paper back).
-
-
-
-
3
-
-
4043075741
-
Wireless mesh networks
-
R. Poor: "Wireless mesh networks," In Sensors Magazine, 2003.
-
(2003)
Sensors Magazine
-
-
Poor, R.1
-
4
-
-
34548136778
-
-
CERT Advisory CA-2000-01, Denial-of-Service Developments, CERT, 2000; www.cert.org/advisories/CA-2000-01.html.
-
CERT Advisory CA-2000-01, "Denial-of-Service Developments," CERT, 2000; www.cert.org/advisories/CA-2000-01.html.
-
-
-
-
5
-
-
34548139550
-
-
P. Ferguson, and D. Senie, Network ingress filtering: defeating denial of service attacks which employ IP source address spoofing, In Internet Eng. Task Force RFC 2827, May 2000; www.ietf.org/rfc/rfc2827.txt.
-
P. Ferguson, and D. Senie, "Network ingress filtering: defeating denial of service attacks which employ IP source address spoofing," In Internet Eng. Task Force RFC 2827, May 2000; www.ietf.org/rfc/rfc2827.txt.
-
-
-
-
6
-
-
0034776786
-
On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets
-
K. Park, and H. Lee, "On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets," In the Proc. of ACM SIGCOMM, pp. 15-26, 2001.
-
(2001)
In the Proc. of ACM SIGCOMM
, pp. 15-26
-
-
Park, K.1
Lee, H.2
-
8
-
-
34548136772
-
Taxonomy of IP traceback
-
In the
-
L. Santhanam, A. Kumar, and D. P. Agrawal, "Taxonomy of IP traceback," In the Journal of Information Assurance and Security, Vol. 1, No. 1, pp. 79-94, 2006.
-
(2006)
Journal of Information Assurance and Security
, vol.1
, Issue.1
, pp. 79-94
-
-
Santhanam, L.1
Kumar, A.2
Agrawal, D.P.3
-
9
-
-
0035361712
-
-
the Proc. of ACM SIGCOM, Trans. Networking
-
S. Savage, D. Wetherall, A. Karlin, and T. Anderson, "Practical network support for IP traceback," In the Proc. of ACM SIGCOM 2000, IEEE/ACM Trans. Networking, Vol. 9, No. 3, pp. 226-237, 2001.
-
(2000)
Practical network support for IP traceback
, vol.9
, Issue.3
, pp. 226-237
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
10
-
-
34548131850
-
-
A. C. Snoeren, C. Patridge, L. A. Sanchez, C. E. Jones, F. Tchakountio, S. T. Kent, and W.T. Strayer, Hash-based IP traceback, In the Journal of IEEE/ACM Trans. Networking, 1.0, No. 6, pp. 721-734, 2002.
-
A. C. Snoeren, C. Patridge, L. A. Sanchez, C. E. Jones, F. Tchakountio, S. T. Kent, and W.T. Strayer, "Hash-based IP traceback," In the Journal of IEEE/ACM Trans. Networking, Vol. 1.0, No. 6, pp. 721-734, 2002.
-
-
-
-
11
-
-
0027647490
-
Random early detection gateways for congestion avoidance
-
In the, August
-
S. Floyd, and V. Jacobson, "Random early detection gateways for congestion avoidance," In the Proc. of IEEE/ACM Transactions on Networking, Vol. 1,No. 4, August 1993.
-
(1993)
Proc. of IEEE/ACM Transactions on Networking
, vol.1
, Issue.4
-
-
Floyd, S.1
Jacobson, V.2
-
14
-
-
4544272175
-
Controlling high bandwidth aggregates in the network
-
July
-
R. Mahajan, S. M. Bellovin, S. Floyd, J. Ioannidis, V. Paxson, and S. Shenker, "Controlling high bandwidth aggregates in the network," Computer Communication Review 32(3), July 2002.
-
(2002)
Computer Communication Review
, vol.32
, Issue.3
-
-
Mahajan, R.1
Bellovin, S.M.2
Floyd, S.3
Ioannidis, J.4
Paxson, V.5
Shenker, S.6
-
16
-
-
34548142420
-
A cache based traffic regulator for improving performance in IEEE 802.11s based mesh networks
-
In the
-
N. S. Nandiraju, D. Nandiraju, L. Santhanam, and D. P. Agrawal, "A cache based traffic regulator for improving performance in IEEE 802.11s based mesh networks," In the Proc. of the RWC, 2006.
-
(2006)
Proc. of the RWC
-
-
Nandiraju, N.S.1
Nandiraju, D.2
Santhanam, L.3
Agrawal, D.P.4
-
17
-
-
84904888755
-
Attacking DDOS at the Source
-
In the
-
J. Mirkovic, G. Prier, and P. Reiher, "Attacking DDOS at the Source," In the Proc. of the 10th IEEE International Conference on Network Protocols, pp. 312-321, 2002.
-
(2002)
Proc. of the 10th IEEE International Conference on Network Protocols
, pp. 312-321
-
-
Mirkovic, J.1
Prier, G.2
Reiher, P.3
-
18
-
-
0002709112
-
Core-stateless fair queuing: A scalable architecture to approximate fair bandwidth allocations in high speed networks
-
In the
-
I. Stoica, S. Shenker, and H. Zhang, "Core-stateless fair queuing: A scalable architecture to approximate fair bandwidth allocations in high speed networks," In the Proc. of SIFCOMM, 1998.
-
(1998)
Proc. of SIFCOMM
-
-
Stoica, I.1
Shenker, S.2
Zhang, H.3
-
19
-
-
77953077374
-
Flash crowds and denial of service attacks: Characterization and Implications for CDNs and Web Sites
-
May
-
J. Jung, B. Krishnamurthy, and M. Rabinovich, "Flash crowds and denial of service attacks: Characterization and Implications for CDNs and Web Sites," In WWW, May 2002.
-
(2002)
In WWW
-
-
Jung, J.1
Krishnamurthy, B.2
Rabinovich, M.3
|