-
1
-
-
79957779849
-
DDoS attacks on Yahoo, Buy.com, eBay, Amazon, Datek, E Trade
-
CNN
-
CNN, DDoS attacks on Yahoo, Buy.com, eBay, Amazon, Datek, E Trade, CNN Headline News, 2000.
-
(2000)
CNN Headline News
-
-
-
2
-
-
38349151789
-
-
CERT Coordination Center
-
CERT Coordination Center, Code Red II, http://www.cert.org/ incident_notes/IN-2001-09.htm 1
-
Code Red II
-
-
-
3
-
-
38349130092
-
-
CERT Coordination Center
-
CERT Coordination Center, Nimda worm, http://www.cert.org/ advisories/CA-2001-26.html
-
Nimda worm
-
-
-
5
-
-
38349174055
-
-
The Trustees of Indiana University
-
The Trustees of Indiana University, DDoSResources, http://www.anml.iu.edu/ddos/types.html.
-
DDoSResources
-
-
-
8
-
-
38349136121
-
help archive
-
Internet Relay Chat IRC
-
Internet Relay Chat (IRC) help archive, Denial of Service or "Nuke" Attacks, 1996, http://www.irchelp.org/irchelp/imke/info. html.
-
(1996)
Denial of Service or "Nuke" Attacks
-
-
-
9
-
-
38349176675
-
-
More Ping of Death information
-
Insecure, "More Ping of Death information, 1996, http://www.insecure.org/sploits/ping-o-death.html.
-
(1996)
Insecure
-
-
-
11
-
-
0036804084
-
Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial
-
Rocky K. C. Chang, Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial, IEEE Communications Magazine, 2002, 42-51
-
(2002)
IEEE Communications Magazine
, pp. 42-51
-
-
Chang, R.K.C.1
-
12
-
-
0038687704
-
Query-Flood DoS Attacks in Gnutella
-
Washington, U.S.A
-
N. Daswani and H. Garcia-Molina, Query-Flood DoS Attacks in Gnutella, in the Proc. of CCS '02, Washington, U.S.A., 2002, 181-192.
-
(2002)
Proc. of CCS '02
, pp. 181-192
-
-
Daswani, N.1
Garcia-Molina, H.2
-
14
-
-
0026960366
-
Theory and applications of neural networks for industrial control systems
-
T. Fukuda and T. Shibata, Theory and applications of neural networks for industrial control systems, Industrial Electronics, 39(6), 1992, 472 - 489
-
(1992)
Industrial Electronics
, vol.39
, Issue.6
, pp. 472-489
-
-
Fukuda, T.1
Shibata, T.2
-
15
-
-
38349193972
-
-
W. Yen, On Application-Level DDoS Attacks and Countermeasures, 2004 Symposium on Digital Life and Internet Technologies, 2004.
-
W. Yen, On Application-Level DDoS Attacks and Countermeasures, 2004 Symposium on Digital Life and Internet Technologies, 2004.
-
-
-
-
16
-
-
33845328457
-
Defending Application DDoS with Constraint Random, 2005
-
W. Yen and M. F. Lee, Defending Application DDoS with Constraint Random, 2005 Asia-Pacific Conference on Communications, 2005, Perth, Western Australia, EI, 2005.
-
(2005)
Asia-Pacific Conference on Communications, 2005, Perth, Western Australia, EI
-
-
Yen, W.1
Lee, M.F.2
-
17
-
-
27544465087
-
-
Christos Siaterlis and Vasilis Maglaris, Detecting incoming and outgoing DDoS attacks at the edge using a single set of network characteristics, Computers and Communications, 2005. ISCC 2005. Proceedings. 10th IEEE Symposium on 27-30, 2005, 469 - 475
-
Christos Siaterlis and Vasilis Maglaris, Detecting incoming and outgoing DDoS attacks at the edge using a single set of network characteristics, Computers and Communications, 2005. ISCC 2005. Proceedings. 10th IEEE Symposium on 27-30, 2005, 469 - 475
-
-
-
|