-
1
-
-
85084161486
-
Inferring internet denial-of-service activity
-
Washigton, D.C, Aug
-
D. Moore, G. Voelker, and S. Savage, "Inferring internet denial-of-service activity," in Proc. USENIX Security Symp., Washigton, D.C., Aug. 2001, pp. 9-22.
-
(2001)
Proc. USENIX Security Symp
, pp. 9-22
-
-
Moore, D.1
Voelker, G.2
Savage, S.3
-
3
-
-
84924375780
-
Botz-4-sale: Surviving organized ddos attacks that mimic flash crowds
-
presented at the, Boston, MA, May
-
S. Kandula, D. Katabi, M. Jacob, and A. Berger, "Botz-4-sale: Surviving organized ddos attacks that mimic flash crowds," presented at the 2nd Symp. Networked Systems Design and Implementation, Boston, MA, May 2005.
-
(2005)
2nd Symp. Networked Systems Design and Implementation
-
-
Kandula, S.1
Katabi, D.2
Jacob, M.3
Berger, A.4
-
4
-
-
33646114745
-
A survivable dos-resistant overlay network
-
Jun
-
T. Bu, S. Norden, and T. Woo, "A survivable dos-resistant overlay network," Comput. Netw., vol. 50, no. 9, pp. 1281-1301, Jun. 2006.
-
(2006)
Comput. Netw
, vol.50
, Issue.9
, pp. 1281-1301
-
-
Bu, T.1
Norden, S.2
Woo, T.3
-
5
-
-
17744379978
-
Trading resiliency for security: Model and algorithms
-
Berlin, Germany
-
T. Bu, S. Norden, and T. Woo, "Trading resiliency for security: Model and algorithms," in Proc. 12th IEEE Int. Conf. Network Protocols, Berlin, Germany, 2004, pp. 218-227.
-
(2004)
Proc. 12th IEEE Int. Conf. Network Protocols
, pp. 218-227
-
-
Bu, T.1
Norden, S.2
Woo, T.3
-
6
-
-
49549086941
-
Topological malware propagation on networks: Spatial dependence and its significance
-
submitted for publication
-
R. Narasimha, Z. Chen, and C. Ji, "Topological malware propagation on networks: Spatial dependence and its significance," IEEE Trans. Secute Dependable Comput., 2007, submitted for publication.
-
(2007)
IEEE Trans. Secute Dependable Comput
-
-
Narasimha, R.1
Chen, Z.2
Ji, C.3
-
7
-
-
84890522850
-
Communication theory of secrecy systems
-
C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, pp. 656-715, 1948.
-
(1948)
Bell Syst. Tech. J
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
8
-
-
0016562514
-
The wire-tap channel
-
Oct
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1367, Oct. 1975.
-
(1975)
Bell Syst. Tech. J
, vol.54
, Issue.8
, pp. 1355-1367
-
-
Wyner, A.D.1
-
9
-
-
0021595510
-
Wire tap channel II
-
Dec
-
L. H. Ozarow and A. D. Wyner, "Wire tap channel II," AT&T Bell Labomtories Tech. J., vol. 63, no. 10, pp. 2135-2157, Dec. 1984.
-
(1984)
AT&T Bell Labomtories Tech. J
, vol.63
, Issue.10
, pp. 2135-2157
-
-
Ozarow, L.H.1
Wyner, A.D.2
-
10
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. IT-24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.IT-24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
11
-
-
34547922334
-
Applications of LDPC codes to the wiretap channels
-
Aug
-
A. Thangaraj, S. Dihidar, A. R. Calderbank, S. W. McLaughlin, and J.-M. Merolla, "Applications of LDPC codes to the wiretap channels," IEEE Trans. Inf. Theory, vol. 53, no. 8, pp. 2933-2945, Aug. 2007.
-
(2007)
IEEE Trans. Inf. Theory
, vol.53
, Issue.8
, pp. 2933-2945
-
-
Thangaraj, A.1
Dihidar, S.2
Calderbank, A.R.3
McLaughlin, S.W.4
Merolla, J.-M.5
-
12
-
-
45249114841
-
Secure nested codes for type II wiretap channels
-
Lake Tahoe, CA, Sep
-
R. Liu, Y. Liang, H. V. Poor, and P. Spasojević, "Secure nested codes for type II wiretap channels," in Proc. IEEE Information Theory Workshop, Lake Tahoe, CA, Sep. 2007, pp. 337-342.
-
(2007)
Proc. IEEE Information Theory Workshop
, pp. 337-342
-
-
Liu, R.1
Liang, Y.2
Poor, H.V.3
Spasojević, P.4
-
13
-
-
84903755100
-
Honeypots for distributed denial of service attacks
-
Pittsburgh, PA, Jun
-
N. Weiler, "Honeypots for distributed denial of service attacks," in Proc. 11th IEEE Int. Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, Pittsburgh, PA, Jun. 2002, pp. 109-114.
-
(2002)
Proc. 11th IEEE Int. Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises
, pp. 109-114
-
-
Weiler, N.1
-
15
-
-
0031103783
-
On a special class of broadcast channels with confidential messages
-
Mar
-
M. van Dijk, "On a special class of broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 43, no. 2, pp. 712-714, Mar. 1997.
-
(1997)
IEEE Trans. Inf. Theory
, vol.43
, Issue.2
, pp. 712-714
-
-
van Dijk, M.1
|