-
1
-
-
0027647490
-
Random early detection gateways for congestion avoidance
-
S. Floyd and V. Jacobson, "Random early detection gateways for congestion avoidance, " IEEE/ACM Trans. Networking, vol. 1, no. 4, pp. 397-413, 1993.
-
(1993)
IEEE/ACM Trans. Networking
, vol.1
, Issue.4
, pp. 397-413
-
-
Floyd, S.1
Jacobson, V.2
-
2
-
-
17744383634
-
Controlling high-bandwidth flows at the congested router
-
R. Mahajan, S. Floyd, and D. Wetherall, "Controlling high-bandwidth flows at the congested router, " in IEEE ICNP, 2001.
-
(2001)
IEEE ICNP
-
-
Mahajan, R.1
Floyd, S.2
Wetherall, D.3
-
3
-
-
0035012756
-
Stochastic fair blue: A queue management algorithm for enforcing fairness
-
F. Wu-Chang, D. D. Kandlur, D. Saha, and K. G. Shin, "Stochastic fair blue: a queue management algorithm for enforcing fairness, " in IEEE INFOCOM, 2001.
-
(2001)
IEEE INFOCOM
-
-
Wu-Chang, F.1
Kandlur, D.D.2
Saha, D.3
Shin, K.G.4
-
4
-
-
2442503637
-
An adaptive virtual queue (AVQ) algorithm for active queue management
-
S. S. Kunniyur and R. Srikant, "An adaptive virtual queue (AVQ) algorithm for active queue management, " IEEE/ACM Trans. Networking, vol. 12, no. 2, pp. 286-299, 2004.
-
(2004)
IEEE/ACM Trans. Networking
, vol.12
, Issue.2
, pp. 286-299
-
-
Kunniyur, S.S.1
Srikant, R.2
-
5
-
-
0036804084
-
Defending against flooding-based distributed denialof-service attacks: A tutorial
-
R. K. C. Chang, "Defending against flooding-based distributed denialof-service attacks: a tutorial, " IEEE Commun. Mag., vol. 40, no. 10, pp. 42-51, 2002.
-
(2002)
IEEE Commun. Mag.
, vol.40
, Issue.10
, pp. 42-51
-
-
Chang, R.K.C.1
-
6
-
-
33744524845
-
Low-rate TCP-targeted denial of service attacks and counter strategies
-
A. Kuzmanovic and E. W. Knightly, "Low-rate TCP-targeted denial of service attacks and counter strategies, " IEEE/ACM Trans. Netw., vol. 14, no. 4, pp. 683-696, 2006.
-
(2006)
IEEE/ACM Trans. Netw.
, vol.14
, Issue.4
, pp. 683-696
-
-
Kuzmanovic, A.1
Knightly, E.W.2
-
7
-
-
77951895562
-
Exploiting the transients of adaptation for RoQ attacks on Internet resources
-
M. Guirguis, A. Bestavros, and I. Matta, "Exploiting the transients of adaptation for RoQ attacks on Internet resources, " in IEEE ICNP, 2004.
-
(2004)
IEEE ICNP
-
-
Guirguis, M.1
Bestavros, A.2
Matta, I.3
-
8
-
-
57849083201
-
Fully pipelined bloom filter architecture
-
M. Paynter and T. Kocak, "Fully pipelined bloom filter architecture, " IEEE Commun. Lett., vol. 12, no. 11, pp. 855-857, 2008.
-
(2008)
IEEE Commun. Lett.
, vol.12
, Issue.11
, pp. 855-857
-
-
Paynter, M.1
Kocak, T.2
-
9
-
-
39649096981
-
A router-based technique to mitigate reduction of quality (RoQ) attacks
-
A. Shevtekar and N. Ansari, "A router-based technique to mitigate reduction of quality (RoQ) attacks, " Computer Networks, vol. 52, no. 5, pp. 957-970, 2008.
-
(2008)
Computer Networks
, vol.52
, Issue.5
, pp. 957-970
-
-
Shevtekar, A.1
Ansari, N.2
|