-
2
-
-
0005908365
-
Distributed Firewalls
-
on security, November
-
S. M. Bellovin. Distributed Firewalls, ;login: magazine, special issue on security, pages 37-39, November 1999.
-
(1999)
Login: Magazine
, Issue.SPEC. ISSUE
, pp. 37-39
-
-
Bellovin, S.M.1
-
3
-
-
58049101580
-
Analyzing Interaction between Distributed Denial of Service Attacks and Mitigation Technologies
-
April
-
W. J. Blackert, D. M. Gregg, A. K. Castner, E. M. Kyle, R. L. Horn, and R. M. Jokerst. Analyzing Interaction Between Distributed Denial of Service Attacks and Mitigation Technologies. In Proceedings of DISCEX III, pages 26-36, April 2003.
-
(2003)
Proceedings of DISCEX III
, pp. 26-36
-
-
Blackert, W.J.1
Gregg, D.M.2
Castner, A.K.3
Kyle, E.M.4
Horn, R.L.5
Jokerst, R.M.6
-
11
-
-
3543119176
-
Guaranteeing Access in Spite of Distributed Service-Flooding Attacks
-
April
-
V. D. Gligor. Guaranteeing Access in Spite of Distributed Service-Flooding Attacks. In Proceedings of the Security Protocols Workshop, April 2003.
-
(2003)
Proceedings of the Security Protocols Workshop
-
-
Gligor, V.D.1
-
13
-
-
35048889161
-
Safeguarding Digital Library Contents
-
January
-
A. Herzberg. Safeguarding Digital Library Contents. D-lib Magazine, January 1998.
-
(1998)
D-lib Magazine
-
-
Herzberg, A.1
-
16
-
-
18844441915
-
Fileteller: Paying and Getting Paid for File Storage
-
March
-
J. Ioannidis, S. Ioannidis, A. D. Keromytis, and V. Prevelakis. Fileteller: Paying and Getting Paid for File Storage. In Proceeding of Financial Cryptography (FC) Conference, pages 282-299, March 2002.
-
(2002)
Proceeding of Financial Cryptography (FC) Conference
, pp. 282-299
-
-
Ioannidis, J.1
Ioannidis, S.2
Keromytis, A.D.3
Prevelakis, V.4
-
17
-
-
0034449536
-
Implementing a Distributed Firewall
-
November
-
S. Ioannidis, A. Keromytis, S. Bellovin, and J. Smith. Implementing a Distributed Firewall. In Proceedings of Computer and Communications Security (CCS), pages 190-199, November 2000.
-
(2000)
Proceedings of Computer and Communications Security (CCS)
, pp. 190-199
-
-
Ioannidis, S.1
Keromytis, A.2
Bellovin, S.3
Smith, J.4
-
19
-
-
0030704545
-
Consistent Hashing and Random Trees: Distributed Caching Protocols for Relievig Hot Spots on the World Wide Web
-
May
-
D. Karger, E. Lehman, F. Leighton, R. Panigrahy, M. Levine, and D. Lewin. Consistent Hashing and Random Trees: Distributed Caching Protocols for Relievig Hot Spots on the World Wide Web. In Proceedings of ACM Symposium on Theory of Computing (STOC), pages 654-663, May 1997.
-
(1997)
Proceedings of ACM Symposium on Theory of Computing (STOC)
, pp. 654-663
-
-
Karger, D.1
Lehman, E.2
Leighton, F.3
Panigrahy, R.4
Levine, M.5
Lewin, D.6
-
20
-
-
85034043506
-
Protecting web servers from distributed denial of service attacks
-
F. Kargl, J. Maier, and M. Weber. Protecting web servers from distributed denial of service attacks. In World Wide Web, pages 514-524, 2001.
-
(2001)
World Wide Web
, pp. 514-524
-
-
Kargl, F.1
Maier, J.2
Weber, M.3
-
23
-
-
18744376590
-
Using Graphic Turing Tests to Counter Automated DDoS Attacks Against Web Servers
-
October
-
W. G. Morein, A. Stavrou, D. L. Cook, A. D. Keromytis, V. Misra, and D. Rubenstein. Using Graphic Turing Tests to Counter Automated DDoS Attacks Against Web Servers. In Proceedings of the 10th ACM International Conference on Computer and Communications Security (CCS), pages 8-19, October 2003.
-
(2003)
Proceedings of the 10th ACM International Conference on Computer and Communications Security (CCS)
, pp. 8-19
-
-
Morein, W.G.1
Stavrou, A.2
Cook, D.L.3
Keromytis, A.D.4
Misra, V.5
Rubenstein, D.6
-
25
-
-
84942253601
-
COSSACK: Coordinated Suppression of Simultaneous Attacks
-
April
-
C. Papadopoulos, R. Lindell, J. Mehringer, A. Hussain, and R. Govindan. COSSACK: Coordinated Suppression of Simultaneous Attacks. In Proceedings of DlSCEX III, pages 2-13, April 2003.
-
(2003)
Proceedings of DlSCEX III
, pp. 2-13
-
-
Papadopoulos, C.1
Lindell, R.2
Mehringer, J.3
Hussain, A.4
Govindan, R.5
-
26
-
-
0034776786
-
On the Effectiveness of Route-based PAcket Filtering for Distributed DoS Attack Prevention in Power-law Internets
-
August
-
K. Park and H. Lee. On the Effectiveness of Route-based PAcket Filtering for Distributed DoS Attack Prevention in Power-law Internets. In Proceedings of ACM SIGCOMM, pages 15-26, August 2001.
-
(2001)
Proceedings of ACM SIGCOMM
, pp. 15-26
-
-
Park, K.1
Lee, H.2
-
29
-
-
0035361712
-
Network Support for IP Traceback
-
June
-
S. Savage, D. Wetherall, A. Karlin, and T. Anderson. Network Support for IP Traceback. ACM/IEEE Transactions on Networking, 9(3):226-237, June 2001.
-
(2001)
ACM/IEEE Transactions on Networking
, vol.9
, Issue.3
, pp. 226-237
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
30
-
-
0002245383
-
Chord: A Scalable Peer-To-Peer Lookup Service for Internet Application
-
August
-
I. Stoica, R. Morris, D. Karger, F. Kaashoek, and H. Balakrishnan. Chord: A Scalable Peer-To-Peer Lookup Service for Internet Application. In Proceedings of ACM SIGCOMM, August 2001.
-
(2001)
Proceedings of ACM SIGCOMM
-
-
Stoica, I.1
Morris, R.2
Karger, D.3
Kaashoek, F.4
Balakrishnan, H.5
-
32
-
-
34250620174
-
NetBouncer: Client-legitimacy-based High-performance DDoS Filtering
-
April
-
R. Thomas, B. Mark, T. Johnson, and J. Croall. NetBouncer: Client-legitimacy-based High-performance DDoS Filtering. In Proceedings of DISCEX III, pages 14-25, April 2003.
-
(2003)
Proceedings of DISCEX III
, pp. 14-25
-
-
Thomas, R.1
Mark, B.2
Johnson, T.3
Croall, J.4
|