-
1
-
-
85010849899
-
Denial of service via algorithmic complexity attacks
-
S. A. Crosby and D. S. Wallach, "Denial of service via algorithmic complexity attacks,' in Usenix Security, 2003.
-
(2003)
Usenix Security
-
-
Crosby, S.A.1
Wallach, D.S.2
-
2
-
-
79952452968
-
Aggressiveness protective fair queueing for bursty applications (short paper)
-
A. Bremler-Barr, H. Levy, and N. Halachmi, "Aggressiveness protective fair queueing for bursty applications (short paper)," in IWQoS, 2006.
-
(2006)
IWQoS
-
-
Bremler-Barr, A.1
Levy, H.2
Halachmi, N.3
-
3
-
-
17744369470
-
Exploiting the transients of adaptation for RoQ attacks on internet resources
-
M. Guirguis, A. Bestavros, and I. Matta, "Exploiting the transients of adaptation for RoQ attacks on internet resources," in ICNP, 2004.
-
(2004)
ICNP
-
-
Guirguis, M.1
Bestavros, A.2
Matta, I.3
-
4
-
-
25844458510
-
Reduction of quality (roq) attacks on internet end-systems
-
M. Guirguis, A. Bestavros, I. Matta, and Y. Zhang, "Reduction of quality (roq) attacks on internet end-systems," in INFOCOM, 2005.
-
(2005)
INFOCOM
-
-
Guirguis, M.1
Bestavros, A.2
Matta, I.3
Zhang, Y.4
-
5
-
-
8344224137
-
Low-rate tcp-targeted denial of service attacks (the shrew vs. the mice and elephants)
-
A. Kuzmanovic and E. W. Knightly, "Low-rate tcp-targeted denial of service attacks (the shrew vs. the mice and elephants)," in ACM SIGCOMM, 2003.
-
(2003)
ACM SIGCOMM
-
-
Kuzmanovic, A.1
Knightly, E.W.2
-
6
-
-
51449086315
-
Reduction of quality (roq) attacks on dynamic load balancers: Vulnerability assessment and design tradeoffs
-
I. M. M. Guirguism, A. Bestavros and Z. Y, "Reduction of quality (roq) attacks on dynamic load balancers: Vulnerability assessment and design tradeoffs," in Inforom, 2007.
-
(2007)
Inforom
-
-
Guirguism, I.M.M.1
Bestavros, A.2
-
8
-
-
0017467242
-
Individual versus social optimization in exponential congestion systems
-
S. Lippman and S. Stidham, "Individual versus social optimization in exponential congestion systems," Operations Research, vol. 25, pp. 233-247, 1997.
-
(1997)
Operations Research
, vol.25
, pp. 233-247
-
-
Lippman, S.1
Stidham, S.2
-
11
-
-
51449119524
-
-
T. Peters, 2003. http://mail.python.org/pipermail/python-dev/2003-May/ 035916.html.
-
(2003)
-
-
Peters, T.1
-
12
-
-
1542350966
-
Fast content-based packet handling for intrusion detectin
-
CS2001-0670
-
M. Fisk and G. Varghese, "Fast content-based packet handling for intrusion detectin." UCSD TR CS2001-0670.
-
UCSD TR
-
-
Fisk, M.1
Varghese, G.2
-
15
-
-
0004116989
-
-
Second Edition, MIT Press and McGraw-Hill
-
T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein, Introduction to Algorithms (Second Edition). MIT Press and McGraw-Hill, 2001.
-
(2001)
Introduction to Algorithms
-
-
Cormen, T.H.1
Leiserson, C.E.2
Rivest, R.L.3
Stein, C.4
|