메뉴 건너뛰기




Volumn , Issue , 2008, Pages 261-266

Comparing Chord, CAN, and Pastry Overlay networks for resistance to DoS attacks

Author keywords

[No Author keywords available]

Indexed keywords

APPLICATIONS; COMPUTER CRIME; INTERNET; INTERNET PROTOCOLS; TOPOLOGY;

EID: 63249136254     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CRISIS.2008.4757488     Document Type: Conference Paper
Times cited : (6)

References (14)
  • 12
    • 2642565295 scopus 로고    scopus 로고
    • Using overlay networks to resist denial-of-service attacks
    • Technical report, CSE department, university of california, San Diego
    • J. Wang and A. A. Chien. Using overlay networks to resist denial-of-service attacks. Technical report, CSE department, university of california, San Diego, 2003.
    • (2003)
    • Wang, J.1    Chien, A.A.2
  • 13
    • 63249094481 scopus 로고    scopus 로고
    • Understanding when location-hiding using overlay networks is feasible
    • special issue on overlay distribution structures and their applications
    • J. Wang and A. A. Chien. Understanding when location-hiding using overlay networks is feasible. Elsevier Journal of Computer Networks, special issue on overlay distribution structures and their applications, 2005.
    • (2005) Elsevier Journal of Computer Networks
    • Wang, J.1    Chien, A.A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.