메뉴 건너뛰기




Volumn , Issue , 2006, Pages

Bio-inspired promoters and inhibitors for self-organized network security facilities

Author keywords

[No Author keywords available]

Indexed keywords

BIOLOGICAL SYSTEMS; COMPUTER SYSTEMS; INTERNET; NETWORK SECURITY; STATISTICAL METHODS;

EID: 50249172774     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/BIMNICS.2006.361818     Document Type: Conference Paper
Times cited : (10)

References (21)
  • 2
    • 0036804084 scopus 로고    scopus 로고
    • Defending against Flooding-Based Distributed Denialof-Service Attacks: A Tutorial
    • October
    • R. K. C. Chang, "Defending against Flooding-Based Distributed Denialof-Service Attacks: A Tutorial," IEEE Communications Magazine, vol. 10, pp. 42-51, October 2002.
    • (2002) IEEE Communications Magazine , vol.10 , pp. 42-51
    • Chang, R.K.C.1
  • 4
    • 18144371695 scopus 로고    scopus 로고
    • Internet-Draft work in progress, draft-ietf-ipfix-protocol-22.txt, June
    • _, "IPFIX Protocol Specification," Internet-Draft (work in progress), draft-ietf-ipfix-protocol-22.txt, June 2006.
    • (2006) IPFIX Protocol Specification
    • Claise, B.1
  • 6
    • 24744432788 scopus 로고    scopus 로고
    • Efficient and Scalable Communication in Autonomous Networking using Bio-inspired Mechanisms - An Overview
    • July
    • _, "Efficient and Scalable Communication in Autonomous Networking using Bio-inspired Mechanisms - An Overview," Informatica - An International Journal of Computing and Informatics, vol. 29, no. 2, pp. 183-188, July 2005.
    • (2005) Informatica - An International Journal of Computing and Informatics , vol.29 , Issue.2 , pp. 183-188
    • Dressier, F.1
  • 7
    • 33847794611 scopus 로고    scopus 로고
    • Simulative Analysis of Adaptive Network Monitoring Methodologies for Attack Detection
    • Belgrade, Serbia and Montenegro, November
    • F. Dressier and I. Dietrich, "Simulative Analysis of Adaptive Network Monitoring Methodologies for Attack Detection," in IEEE EUROCON 2005 ?The International Conference on "Computer as a Tool", Belgrade, Serbia and Montenegro, November 2005, pp. 624-627.
    • (2005) IEEE EUROCON 2005 ?The International Conference on "Computer as a Tool" , pp. 624-627
    • Dressier, F.1    Dietrich, I.2
  • 10
    • 34447308129 scopus 로고    scopus 로고
    • InternetDraft work in progress, draft-dressler-ipfix-aggregation-03.txt, June
    • F. Dressier, C. Sommer, and G. Münz, "IPFIX Aggregation," InternetDraft (work in progress), draft-dressler-ipfix-aggregation-03.txt, June 2006.
    • (2006) IPFIX Aggregation
    • Dressier, F.1    Sommer, C.2    Münz, G.3
  • 12
    • 34250676260 scopus 로고    scopus 로고
    • Internet-Draft work in progress, draft-ietf-psamp-framework-10.txt, January
    • N. Duffield. "A Framework for Packet Selection and Reporting," Internet-Draft (work in progress), draft-ietf-psamp-framework-10.txt, January 2005.
    • (2005) A Framework for Packet Selection and Reporting
    • Duffield, N.1
  • 13
    • 34250746319 scopus 로고    scopus 로고
    • Adaptive Flow Aggregation - A New Solution for Robust Flow Monitoring under Security Attacks
    • Vancouver, Canada, April
    • Y. Hu, D.-M. Chiu, and J. C. Lui, "Adaptive Flow Aggregation - A New Solution for Robust Flow Monitoring under Security Attacks," in IEEE/IFIP Network Operations and Management Symposium (IEEE/IFIP NOMS 2006), Vancouver, Canada, April 2006, pp. 424-435.
    • (2006) IEEE/IFIP Network Operations and Management Symposium (IEEE/IFIP NOMS 2006) , pp. 424-435
    • Hu, Y.1    Chiu, D.-M.2    Lui, J.C.3
  • 15
    • 50249124419 scopus 로고    scopus 로고
    • B. Krüger and F. Dressier, Molecular Processes as a Basis for Autonomous Networking, IPSI Transactions on Advances Research: Issues in Computer Science and Engineering, 1, no. 1, pp. 43-50, January 2005.
    • B. Krüger and F. Dressier, "Molecular Processes as a Basis for Autonomous Networking," IPSI Transactions on Advances Research: Issues in Computer Science and Engineering, vol. 1, no. 1, pp. 43-50, January 2005.
  • 17
    • 11144272176 scopus 로고    scopus 로고
    • A Taxonomy of DDoS Attack and DDoS Defense Mechanisms
    • April
    • J. Mirkovic and P. Reiher, "A Taxonomy of DDoS Attack and DDoS Defense Mechanisms," ACM SIGCOMM Computer Communication Review, vol. 34, no. 2, pp. 39-53, April 2004.
    • (2004) ACM SIGCOMM Computer Communication Review , vol.34 , Issue.2 , pp. 39-53
    • Mirkovic, J.1    Reiher, P.2
  • 18
    • 50249143375 scopus 로고    scopus 로고
    • M. Molina, A scalable and efficient methodology for flow monitoring in the Internet, in 18th International Teletraffic Congress (ITC18), ser. Providing Quality of Service in Heterogeneous Environments. J. Charzinski, R. Lehnert, and P. Tran-Gia, Eds., 5a. Berlin, Germany: Elsevier, August 2003, pp. 271-280.
    • M. Molina, "A scalable and efficient methodology for flow monitoring in the Internet," in 18th International Teletraffic Congress (ITC18), ser. Providing Quality of Service in Heterogeneous Environments. J. Charzinski, R. Lehnert, and P. Tran-Gia, Eds., vol. 5a. Berlin, Germany: Elsevier, August 2003, pp. 271-280.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.