-
1
-
-
84886390769
-
Credit-card processor hit by DDoS attack
-
September 23
-
Arnfield, R. (2004) Credit-card processor hit by DDoS attack. News-Factor Magazine, September 23. http://www.newsfactor.com/story.xhtml?story-id=27154.
-
(2004)
News-Factor Magazine
-
-
Arnfield, R.1
-
2
-
-
34547970705
-
Reducing communication cost in privacy preserving distributed association rule mining
-
Ashrafi, M. Z., Taniar, D. and Smith, K. A. (2004) Reducing communication cost in privacy preserving distributed association rule mining. Database Systems for Advanced Applications, Lecture Notes in Computer Science, 2973: 381-392.
-
(2004)
Database Systems for Advanced Applications, Lecture Notes in Computer Science
, vol.2973
, pp. 381-392
-
-
Ashrafi, M.Z.1
Taniar, D.2
Smith, K.A.3
-
3
-
-
85001754530
-
PPDAM: Privacy preserving distributed association rule mining algorithm
-
Ashrafi, M. Z., Taniar, D. and Smith, K. A. (2005) PPDAM: Privacy preserving distributed association rule mining algorithm. Int. J. Intel. Infor. Technol. 1(1): 49-69.
-
(2005)
Int. J. Intel. Infor. Technol.
, vol.1
, Issue.1
, pp. 49-69
-
-
Ashrafi, M.Z.1
Taniar, D.2
Smith, K.A.3
-
5
-
-
84886382509
-
-
Computer emergency response team
-
CERT. Computer emergency response team. http://www.cert.org.
-
-
-
-
7
-
-
46449124364
-
A trust model for distributed systems based on reputation
-
Derbas, G., Kayssi, A., Chehab, A., Artail, H. and Tajeddine, A. (2005) A trust model for distributed systems based on reputation. Int. J. Web & Grid Services, 1(3/4): 416-447.
-
(2005)
Int. J. Web & Grid Services
, vol.1
, Issue.3-4
, pp. 416-447
-
-
Derbas, G.1
Kayssi, A.2
Chehab, A.3
Artail, H.4
Tajeddine, A.5
-
9
-
-
84886396042
-
A survey of software infrastructures and frameworks for ubiquitous computing
-
Endres, C.h., Butz, A. and MacWilliams, A. (2005) A survey of software infrastructures and frameworks for ubiquitous computing. Mobile Information Systems, 1(1): 41-80.
-
(2005)
Mobile Information Systems
, vol.1
, Issue.1
, pp. 41-80
-
-
Endres, Ch.1
Butz, A.2
MacWilliams, A.3
-
10
-
-
4544227726
-
Taking steps to secure web services
-
Geer, D. Taking steps to secure web services. IEEE Computer, 36(10): 14-16.
-
IEEE Computer
, vol.36
, Issue.10
, pp. 14-16
-
-
Geer, D.1
-
12
-
-
0012802798
-
-
Householder, A., Manion, A., Pesante, L., Weaver, G. M. and Thomas, R. (2001) Managing the threat of denial-of-service attacks, CERT. http://www.cert.org/archive/pdf/Managing-DoS.pdf.
-
(2001)
Managing the Threat of Denial-of-service Attacks
-
-
Householder, A.1
Manion, A.2
Pesante, L.3
Weaver, G.M.4
Thomas, R.5
-
14
-
-
0942298614
-
Decision analysis of statistically detecting distributed denial-of-service flooding attacks
-
Li, M., Chi, C., Jia, W., Zhao, W., Zhou, W., Cao, J., Long D. and Meng, Q. (2003) Decision analysis of statistically detecting distributed denial-of-service flooding attacks. Int. J. Infor. Technol. and Decision Making, 2(3): 397-405.
-
(2003)
Int. J. Infor. Technol. and Decision Making
, vol.2
, Issue.3
, pp. 397-405
-
-
Li, M.1
Chi, C.2
Jia, W.3
Zhao, W.4
Zhou, W.5
Cao, J.6
Long, D.7
Meng, Q.8
-
15
-
-
4544272175
-
Controlling high bandwidth aggregates in the network
-
Mahajan, R., Bellovin, S. M. and Floyd, S. (2002) Controlling high bandwidth aggregates in the network. Computer Communications Review, 32(3): 62-73.
-
(2002)
Computer Communications Review
, vol.32
, Issue.3
, pp. 62-73
-
-
Mahajan, R.1
Bellovin, S.M.2
Floyd, S.3
-
18
-
-
84886418608
-
Hackers deface web sites
-
Naraine, R. and Singer, M. (2001) Hackers deface web sites; FBI issues DDoS warning. http://www.internetnews.com/dev-news/article.php/760451.
-
(2001)
FBI issues DDoS Warning
-
-
Naraine, R.1
Singer, M.2
-
19
-
-
84942253601
-
Cossack: Coordinated suppression of simultaneous attacks
-
Papadopoulos, C., Lindell, R., Mehringer, J., Hussain, A. and Govindan, R. (2003) Cossack: Coordinated suppression of simultaneous attacks. DARPA Information Survivability Conference and Exposition III, pp. 2-13.
-
(2003)
DARPA Information Survivability Conference and Exposition III
, pp. 2-13
-
-
Papadopoulos, C.1
Lindell, R.2
Mehringer, J.3
Hussain, A.4
Govindan, R.5
-
20
-
-
0034776786
-
On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law Internets
-
DOI 10.1145/964723.383061
-
Park, K. and Lee, H. (2001) On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internet. Proc. of ACM SIGCOMM, pp. 15-26. (Pubitemid 32981951)
-
(2001)
Computer Communication Review
, vol.31
, Issue.4
, pp. 15-26
-
-
Park, K.1
Lee, H.2
-
21
-
-
0038729330
-
Protection from distributed denial of service attack using history-based IP filtering
-
Peng, T., Christopher, L. and Kotagiri, R. (2003) Protection from distributed denial of service attack using history-based IP filtering. Proc. of IEEE ICC, pp. 482-486.
-
(2003)
Proc. of IEEE ICC
, pp. 482-486
-
-
Peng, T.1
Christopher, L.2
Kotagiri, R.3
-
22
-
-
0000783098
-
Optimal detection of a change in distribution
-
Pollak, M. (1986) Optimal detection of a change in distribution. The Annals of Statistics, 13: 206-227.
-
(1986)
The Annals of Statistics
, vol.13
, pp. 206-227
-
-
Pollak, M.1
-
23
-
-
84886415379
-
-
Scalable simulation framework
-
SSFNet. Scalable simulation framework. http://www.ssfnet.org.
-
-
-
-
25
-
-
28844439716
-
A survey of active and passive defence mechanisms against DDoS attacks.K
-
School of Information Technology, Deakin University, Australia
-
Xiang, Y., Zhou, W. and Chowdhury, M. (2004) A survey of active and passive defence mechanisms against DDoS attacks.k Technical Report, TR C04/02, School of Information Technology, Deakin University, Australia.
-
(2004)
Technical Report, TR C04/02
-
-
Xiang, Y.1
Zhou, W.2
Chowdhury, M.3
|