-
1
-
-
3042823049
-
Design and analysis of a replicated elusive server scheme for mitigating denial of service attacks
-
C. Sangpachatanaruk, S. M. Khattab, T. Znati, R Melhem, D. Mossé, "Design and analysis of a replicated elusive server scheme for mitigating denial of service attacks," Journal of Systems and Software, Vol. 73, Issue 1, pp. 15 - 29, 2004.
-
(2004)
Journal Of Systems And Software
, vol.73
, Issue.1
, pp. 15-29
-
-
Sangpachatanaruk, C.1
Khattab, M.S.2
Znati, T.3
Melhem, R.4
Mossé, D.5
-
3
-
-
66649107367
-
Ddos attacks on yahoo, buy.com, ebay, amazon, datek, e*trade
-
Feb
-
"DDoS attacks on Yahoo, Buy.com, eBay, Amazon, Datek, E*Trade," CNN Headline News, Feb. 7-11, 2000.
-
(2000)
Cnn Headline News
, vol.7-11
-
-
-
4
-
-
84864569071
-
2005 australian computer crime and security survey
-
Available: [accessed Jan. 4, 2006]
-
AusCERT, "2005 Australian computer crime and security survey," Tech. Report, Australian Computer Emergency Response Team, 2005. Available: http://www.auscert.org.au/ crimesurvey [accessed Jan. 4, 2006].
-
(2005)
Tech. Report, Australian Computer Emergency Response Team
-
-
Auscert1
-
5
-
-
24344440328
-
2005 csi/fbi computer crime and security survey
-
Available
-
L. A. Gordon, M. P. Loeb, W. Lucyshyn, R. Richardson, "2005 CSI/FBI computer crime and security survey," Tech. Report, Computer Security Institute, 2005. Available: www.GCSI.com.
-
(2005)
Tech. Report, Computer Security Institute
-
-
Gordon, A.L.1
Loeb, P.M.2
Lucyshyn, W.3
Richardson, R.4
-
7
-
-
66649090780
-
-
Available
-
NS Documentation, Available: http://www.isi.edu/ nsnam/ns.
-
-
-
Documentation, N.1
-
8
-
-
29244465140
-
Mitigating denial of service attacks: a tutorial
-
IOS Press
-
J. Molsa, "Mitigating denial of service attacks: A tutorial," Journal of computer security, 13, pp. 807-837, IOS Press, 2005.
-
(2005)
Journal Of Computer Security
, vol.13
, pp. 807-837
-
-
Molsa, J.1
-
9
-
-
11144272176
-
A taxonomy of ddos attack and ddos defense mechanisms
-
Apri.
-
J. Mirkovic, P. Reiher, "A Taxonomy of DDoS Attack and DDoS defense Mechanisms," ACM SIGCOMM Computer Communications Review, vol. 34 (2), pp. 39-53, April 2004.
-
(2004)
Acm Sigcomm Computer Communications Review
, vol.34
, Issue.2
, pp. 39-53
-
-
Mirkovic, J.1
Reiher, P.2
-
10
-
-
34147099073
-
Survey of network based defense mechanisms countering the dos and ddos problems
-
April
-
T Peng, C Leckie, K Ramamohanarao, "Survey of Network Based Defense Mechanisms Countering the DoS and DDoS Problems," ACM Computing Surveys, vol. 39 (1), Article 3, April 2007.
-
(2007)
Acm Computing Surveys
, vol.39
, Issue.1
, pp. 3
-
-
Peng, T.1
Leckie, C.2
Ramamohanarao, K.3
-
11
-
-
84856757768
-
An integrated approach for defending against distributed denial-of-service (ddos) attacks
-
India
-
Krishan Kumar, R. C. Joshi, and Kuldip Singh, "An Integrated Approach for Defending Against Distributed Denial-of-Service (DDoS) Attacks," In proceedings of IRISS-2006, India.
-
(2006)
In Proceedings Of Iriss
-
-
Kumar, K.1
Joshi, C.R.2
Singh, K.3
-
14
-
-
84904888755
-
Attacking ddos at the source
-
J. Mirkovic, G. Prier, and P. Reiher, "Attacking DDoS at the source," In Proceedings of ICNP-2002, Paris, France, pp. 312-321, 2002.
-
(2002)
In Proceedings Of Icnp-2002, Paris, France
, pp. 312-321
-
-
Mirkovic, J.1
Prier, G.2
Reiher, P.3
-
15
-
-
0036967463
-
Use of spectral analysis in defense against dos attacks
-
C. M. Cheng, H. T. Kung, and K. S. Tan, "Use of spectral analysis in defense against DoS attacks," In Proceedings of IEEE GLOBECOM 2002, Taipei, Taiwan, pp. 2143-2148, 2002.
-
(2002)
proceedings of IEEE globecom 2002, taipei, taiwan
, pp. 2143-2148
-
-
Cheng, M.C.1
Kung, T.H.2
Tan, S.K.3
-
16
-
-
0032676506
-
A data mining framework for building intrusion detection models
-
May, 9-12
-
W. Lee, S. J. Stolfo, and K. W. Mok, "A data mining framework for building intrusion detection models," In Proceedings of the 1999 IEEE Symposium on Security and Privacy, Oakland, CA, pp. 120-132, May 9-12, 1999.
-
(1999)
In Proceedings Of The 1999 IEEE Symposium On Security And Privacy, Oakland, Ca
, pp. 120-132
-
-
Lee, W.1
Stolfo, J.S.2
Mok, W.K.3
-
17
-
-
0032676506
-
A data mining framework for building intrusion detection models
-
May 9-12
-
W. Lee, S. J. Stolfo, and K. W. Mok, "A data mining framework for building intrusion detection models," In Proceedings of the 1999 IEEE Symposium on Security and Privacy, Oakland, CA, pp. 120-132, May 9-12, 1999.
-
(1999)
In Proceedings Of The 1999 IEEE Symposium On Security And Privacy, Oakland, Ca
, pp. 120-132
-
-
Lee, W.1
Stolfo, J.S.2
Mok, W.K.3
-
18
-
-
0031334402
-
A quantitative comparison of graph-based models for internet topology
-
PII S1063669297084860
-
Ellen W. Zegura, Kenneth L. Calvert, and Michael J. Donahoo, "A quantitative comparison of graph-based models for Internet Topology," IEEE/ACM Transactions on Networking, 5(6), pp. 770-783, 1997. (Pubitemid 127768486)
-
(1997)
IEEE/ACM Transactions on Networking
, vol.5
, Issue.6
, pp. 770-783
-
-
Zegura, E.W.1
Calvert, K.L.2
Donahoo, M.J.3
-
19
-
-
66649114948
-
Tcp limitations on file transfer performance hamper the global internet
-
Sept., Available
-
B. Gibson, "TCP Limitations on File Transfer Performance Hamper the Global Internet," White paper, Sept. 2006. Available: http://www. niwotnetworks.com/gbx/TCPLimitsFastFileTransfer.htm.
-
(2006)
White Paper
-
-
Gibson, B.1
|