-
1
-
-
84967701397
-
The design philosophy of the DARPA Internet protocols
-
David D. Clark, "The design philosophy of the DARPA Internet protocols". ACM SIGCOMM Computer Communication Review, 1998, pp. 106-114.
-
(1998)
ACM SIGCOMM Computer Communication Review
, pp. 106-114
-
-
Clark, D.D.1
-
2
-
-
0002000920
-
Denial-of-Service attacks rip the Internet
-
Lee Garber, "Denial-of-Service attacks rip the Internet". Computer, 2000, pp. 12-17.
-
(2000)
Computer
, pp. 12-17
-
-
Garber, L.1
-
5
-
-
1242287724
-
A Framework for Classifying Denial of Service Attacks
-
Alefiya Hussain, John Heidemann, Christos Papadopoulos, "A Framework for Classifying Denial of Service Attacks". In: Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications, 2003, pp. 99-110.
-
(2003)
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
, pp. 99-110
-
-
Hussain, A.1
Heidemann, J.2
Papadopoulos, C.3
-
6
-
-
34548050218
-
A taxonomy for denial of service attacks in content-based publish/subscribe systems
-
Toronto, Ontario, Canada
-
Alex Wun, Alex Cheung, Hans-Arno Jacobsen, "A taxonomy for denial of service attacks in content-based publish/subscribe systems". In: Proceedings of the 2007 inaugural international conference on Distributed event-based systems, Toronto, Ontario, Canada, 2007, pp. 116-127.
-
(2007)
Proceedings of the 2007 inaugural international conference on Distributed event-based systems
, pp. 116-127
-
-
Wun, A.1
Cheung, A.2
Jacobsen, H.-A.3
-
7
-
-
33749377422
-
A Comprehensive Categorization of DDoS Attack and DDoS Defense Techniques
-
springer Berlin
-
Usman Tariq, ManPyo Hong, and Kyung-suk Lhee, "A Comprehensive Categorization of DDoS Attack and DDoS Defense Techniques". Lecture Notes in Computer Science, springer Berlin, 2006, pp. 1025-1036.
-
(2006)
Lecture Notes in Computer Science
, pp. 1025-1036
-
-
Tariq, U.1
Hong, M.2
Lhee, K.-S.3
-
8
-
-
0038119011
-
Distributed Denial-of-Service Characterization
-
Technical Report, Sandia National Laboratories
-
T. Draelos, et. Al, "Distributed Denial-of-Service Characterization". Technical Report, Sandia National Laboratories, 2003.
-
(2003)
-
-
Draelos, T.1
et., Al.2
-
12
-
-
0034776786
-
On the Effectiveness of Route-Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets
-
San Diego, California, United States
-
Kihong Park, Heejo Lee, "On the Effectiveness of Route-Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets". In: Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications, San Diego, California, United States, 2001, pp. 15-26.
-
(2001)
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
, pp. 15-26
-
-
Park, K.1
Lee, H.2
-
13
-
-
0036349004
-
SAVE: Source address validity enforcement protocol
-
New York, NY, USA. Piscataway, NJ, USA: IEEE
-
J. Li, J. Mirkovic, M. Wang, P. Reiher, L. Zhang, "SAVE: source address validity enforcement protocol". Proceedings of IEEE Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2002), New York, NY, USA. Piscataway, NJ, USA: IEEE, 2002, pp. 1557-1566.
-
(2002)
Proceedings of IEEE Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM
, pp. 1557-1566
-
-
Li, J.1
Mirkovic, J.2
Wang, M.3
Reiher, P.4
Zhang, L.5
-
14
-
-
84861587712
-
Client puzzles: A cryptographic countermeasure against connection depletion attacks
-
Reston, VA, USA
-
Ari Juels, John Brainard, "Client puzzles: A cryptographic countermeasure against connection depletion attacks". Proceedings of the 1999 Network and Distributed System Security Symposium, Reston, VA, USA, 1999, pp. 151-165.
-
(1999)
Proceedings of the 1999 Network and Distributed System Security Symposium
, pp. 151-165
-
-
Juels, A.1
Brainard, J.2
-
17
-
-
35248835679
-
On Memory-Bound Functions for Fighting Spam
-
Springer-Verlag, CA
-
Dwork C., Goldberg A., Naor M. "On Memory-Bound Functions for Fighting Spam". Proceedings of Annual International Cryptology Conference, Springer-Verlag, CA. 2003, pp. 426-444
-
(2003)
Proceedings of Annual International Cryptology Conference
, pp. 426-444
-
-
Dwork, C.1
Goldberg, A.2
Naor, M.3
-
18
-
-
85084163167
-
-
Thomer M. Gil, PMassimiliano Poletto, MULTOPS: a datastructure for bandwidth attack detection. In: Proceedings of the 10th conference on USENIX Security Symposium, Washington, D. C, 2001, pp. 3-3.
-
Thomer M. Gil, PMassimiliano Poletto, "MULTOPS: a datastructure for bandwidth attack detection". In: Proceedings of the 10th conference on USENIX Security Symposium, Washington, D. C, 2001, pp. 3-3.
-
-
-
-
20
-
-
33745371142
-
Proactively Detecting Distributed Denial of Service Attacks Using Source IP Address Monitoring
-
Peng, T., Leckie, C., and Kotagiri, R, "Proactively Detecting Distributed Denial of Service Attacks Using Source IP Address Monitoring". Proceedings of the 3rd International IFIP-TC6 Networking Conference (Networking 2004), 2004, pp. 771-782.
-
(2004)
Proceedings of the 3rd International IFIP-TC6 Networking Conference (Networking
, pp. 771-782
-
-
Peng, T.1
Leckie, C.2
Kotagiri, R.3
-
21
-
-
33744945767
-
SOS: Secure Overlay Services
-
Pittsburgh, Pennsylvania, USA
-
Angelos D. Keromytis, Vishal Misra, Dan Rubenstein. "SOS: Secure Overlay Services". Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications, Pittsburgh, Pennsylvania, USA, 2002, pp. 61-72.
-
(2002)
Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications
, pp. 61-72
-
-
Keromytis, A.D.1
Misra, V.2
Rubenstein, D.3
-
22
-
-
24344471722
-
A Practical Method to Counteract Denial of Service Attacks
-
Adelaide, Australia
-
Udaya Kiran Tupakula, Vijay Varadharajan, "A Practical Method to Counteract Denial of Service Attacks". Proceedings of the 26th Australasian computer science conference, Adelaide, Australia, 2003, pp. 275-284.
-
(2003)
Proceedings of the 26th Australasian computer science conference
, pp. 275-284
-
-
Kiran Tupakula, U.1
Varadharajan, V.2
|