-
1
-
-
33845591142
-
DDos- Resilient scheduling to counter application layer attacks under imperfect detection
-
Apr.
-
S. Ranjan, R. Swaminathan, M. Uysal, and E. Knightly, "DDos- Resilient Scheduling to Counter Application Layer Attacks under Imperfect Detection," Proc. IEEE INFOCOM, Apr. 2006.
-
(2006)
Proc. IEEE INFOCOM
-
-
Ranjan, S.1
Swaminathan, R.2
Uysal, M.3
Knightly, E.4
-
3
-
-
84924375780
-
Botz-4-sale: Surviving organized DDoS attacks that mimic flash crowds
-
May
-
S. Kandula, D. Katabi, M. Jacob, and A.W. Berger, "Botz-4-Sale: Surviving Organized DDoS Attacks That Mimic Flash Crowds," Proc. Second Symp. Networked Systems Design and Implementation (NSDI), May 2005.
-
(2005)
Proc. Second Symp. Networked Systems Design and Implementation (NSDI)
-
-
Kandula, S.1
Katabi, D.2
Jacob, M.3
Berger, A.W.4
-
4
-
-
51349125816
-
Live baiting for service-level dos attackers
-
S. Khattab, S. Gobriel, R. Melhem, and D. Mosse, "Live Baiting for Service-Level DoS Attackers," Proc. IEEE INFOCOM, 2008.
-
(2008)
Proc. IEEE INFOCOM
-
-
Khattab, S.1
Gobriel, S.2
Melhem, R.3
Mosse, D.4
-
5
-
-
51849166403
-
On detection of malicious users using group testing techniques
-
M.T. Thai, Y. Xuan, I. Shin, and T. Znati, "On Detection of Malicious Users Using Group Testing Techniques," Proc. Int'l Conf. Distributed Computing Systems (ICDCS), 2008.
-
(2008)
Proc. Int'l Conf. Distributed Computing Systems (ICDCS)
-
-
Thai, M.T.1
Xuan, Y.2
Shin, I.3
Znati, T.4
-
6
-
-
45149084219
-
Approximation algorithms of nonunique probes selection for biological target identification
-
M.T. Thai, P. Deng, W. Wu, and T. Znati, "Approximation Algorithms of Nonunique Probes Selection for Biological Target Identification," Proc. Conf. Data Mining, Systems Analysis and Optimization in Biomedicine, 2007.
-
(2007)
Proc. Conf. Data Mining, Systems Analysis and Optimization in Biomedicine
-
-
Thai, M.T.1
Deng, P.2
Wu, W.3
Znati, T.4
-
7
-
-
1642283261
-
A taxonomy of DDoS attacks and DDoS defense mechanisms
-
Computer Science Dept., UCLA
-
J. Mirkovic, J. Martin, and P. Reiher, "A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms," Technical Report 020018, Computer Science Dept., UCLA, 2002.
-
(2002)
Technical Report 020018\
-
-
Mirkovic, J.1
Martin, J.2
Reiher, P.3
-
8
-
-
26444537503
-
Indexing information for data forensics
-
M.J. Atallah, M.T. Goodrich, and R. Tamassia, "Indexing Information for Data Forensics," Proc. Int'l Conf. Applied Cryptography and Network Security (ACNS), pp. 206-221, 2005.
-
(2005)
Proc. Int'l Conf. Applied Cryptography and Network Security (ACNS)
, pp. 206-221
-
-
Atallah, M.J.1
Goodrich, M.T.2
Tamassia, R.3
-
9
-
-
3042859154
-
Resisting SYN flood DoS attacks with a SYN cache
-
J. Lemon, "Resisting SYN Flood DoS Attacks with a SYN Cache," Proc. BSDCON, 2002.
-
(2002)
Proc. BSDCON
-
-
Lemon, J.1
-
11
-
-
8344261545
-
Packetscore: Statisticsbased overload control against distributed denial-of- service attacks
-
Y. Kim, W.C. Lau, M.C. Chuah, and H.J. Chao, "Packetscore: Statisticsbased Overload Control against Distributed Denial-of- Service Attacks," Proc. IEEE INFOCOM, 2004.
-
(2004)
Proc. IEEE INFOCOM
-
-
Kim, Y.1
Lau, W.C.2
Chuah, M.C.3
Chao, H.J.4
-
12
-
-
85034043506
-
Protecting web servers from distributed denial of service attacks
-
F. Kargl, J. Maier, and M. Weber, "Protecting Web Servers from Distributed Denial of Service Attacks," Proc. 10th Int'l Conf. World Wide Web (WWW '01), pp. 514-524, 2001.
-
(2001)
Proc. 10th Int'l Conf. World Wide Web (WWW '01)
, pp. 514-524
-
-
Kargl, F.1
Maier, J.2
Weber, M.3
-
15
-
-
34250885670
-
Decoding algorithms in pooling designs with inhibitors and fault tolerance
-
M.T. Thai, D. MacCallum, P. Deng, and W. Wu, "Decoding Algorithms in Pooling Designs with Inhibitors and Fault Tolerance," Int'l J. Bioinformatics Research and Applications, vol.3, no.2, pp. 145-152, 2007.
-
(2007)
Int'l J. Bioinformatics Research and Applications
, vol.3
, Issue.2
, pp. 145-152
-
-
Thai, M.T.1
MacCallum, D.2
Deng, P.3
Wu, W.4
-
16
-
-
0005471121
-
Two models of nonadaptive group testing for designing screening experiments
-
A.G. Dyachkov, A.J. Macula, D.C. Torney, and P.A. Vilenkin, "Two models of Nonadaptive Group Testing for Designing Screening Experiments," Proc. Sixth Int'l Workshop Model-Oriented Designs and Analysis, pp. 63-75, 2001.
-
(2001)
Proc. Sixth Int'l Workshop Model-Oriented Designs and Analysis
, pp. 63-75
-
-
Dyachkov, A.G.1
MacUla, A.J.2
Torney, D.C.3
Vilenkin, P.A.4
-
18
-
-
33947284998
-
Mean response time for a G/G/1 queueing system: Simulated computation
-
Mar.
-
Y. Chu and J. Ke, "Mean Response Time for a G/G/1 Queueing System: Simulated Computation," Applied Math. and Computation, vol.186, no.1, pp. 772-779, Mar. 2007.
-
(2007)
Applied Math. and Computation
, vol.186
, Issue.1
, pp. 772-779
-
-
Chu, Y.1
Ke, J.2
-
21
-
-
3543119176
-
Guaranteeing access in spite of distributed service- flooding attacks
-
V.D. Gligor, "Guaranteeing Access in spite of Distributed Service- Flooding Attacks," Proc. Security Protocols Workshop, 2003.
-
(2003)
Proc. Security Protocols Workshop
-
-
Gligor, V.D.1
-
22
-
-
0034279480
-
How to fit a response time distribution
-
T.V. Zandt, "How to Fit a Response Time Distribution," Psychonomic Bull. and Rev., vol.7, no.3, 2000.
-
(2000)
Psychonomic Bull. and Rev.
, vol.7
, Issue.3
-
-
Zandt, T.V.1
-
23
-
-
0024927205
-
Superimposed distance codes
-
A.G. Dyachkov, V.V. Rykov, and A.M. Rashad, "Superimposed Distance Codes," Problems of Control and Information Theory, vol.18, pp. 237-250, 1989.
-
(1989)
Problems of Control and Information Theory
, vol.18
, pp. 237-250
-
-
Dyachkov, A.G.1
Rykov, V.V.2
Rashad, A.M.3
-
24
-
-
2442597231
-
Honeypots for mitigating service-level denial-of- service attacks
-
S.M. Khattab, C. Sangpachatanaruk, D. Mosse, R. Melhem, and T. Znati, "Honeypots for Mitigating Service-Level Denial-of- Service Attacks," Proc. Int'l Conf. Distributed Computing Systems (ICDCS '04), 2004.
-
(2004)
Proc. Int'l Conf. Distributed Computing Systems (ICDCS '04)
-
-
Khattab, S.M.1
Sangpachatanaruk, C.2
Mosse, D.3
Melhem, R.4
Znati, T.5
-
25
-
-
79955747674
-
Large-scale automated DDoS detection system
-
V. Sekar, N. Duffield, K. van der Merwe, O. Spatscheck, and H. Zhang, "Large-Scale Automated DDoS Detection System," Proc. USENIX Ann. Technical Conf., 2006.
-
(2006)
Proc. USENIX Ann. Technical Conf.
-
-
Sekar, V.1
Duffield, N.2
Merwe Der K.Van3
Spatscheck, O.4
Zhang, H.5
-
26
-
-
85034043506
-
Protecting web servers from distributed denial of service attacks
-
F. Kargl, J. Maier, and M. Weber, "Protecting Web Servers from Distributed Denial of Service Attacks," Proc. World Wide Web Conf., pp. 514-524, 2001.
-
(2001)
Proc. World Wide Web Conf.
, pp. 514-524
-
-
Kargl, F.1
Maier, J.2
Weber, M.3
-
27
-
-
26844550492
-
Improved combinatorial group testing algorithms for real-world problem sizes
-
D. Eppstein, M.T. Goodrich, and D. Hirschberg, "Improved Combinatorial Group Testing Algorithms for Real-World Problem Sizes," Proc. Workshop Algorithms and Data Structures (WADS), pp. 86-98, 2005.
-
(2005)
Proc. Workshop Algorithms and Data Structures (WADS)
, pp. 86-98
-
-
Eppstein, D.1
Goodrich, M.T.2
Hirschberg, D.3
|