-
2
-
-
77953887052
-
Worldwide infrastructure security report
-
Jan.
-
"Worldwide infrastructure security report," ARBOR Networks, Tech. Rep. Volume V, Jan. 2010.
-
(2010)
ARBOR Networks, Tech. Rep.
, vol.5
-
-
-
3
-
-
33644696610
-
Cooperative defence against ddos attacks
-
G. Zhang and M. Parashar, "Cooperative defence against ddos attacks," Journal of Research and Practice in Information Technology, vol. 38, no. 1, pp. 69-84, 2006.
-
(2006)
Journal of Research and Practice in Information Technology
, vol.38
, Issue.1
, pp. 69-84
-
-
Zhang, G.1
Parashar, M.2
-
6
-
-
0344118858
-
Gossip-based computation of aggregate information
-
Oct.
-
D. Kempe, A. Dobra, and J. Gehrke, "Gossip-based computation of aggregate information," in Proc. of the 44th Annual IEEE ymposium on Foundations of Computer Science(FOCS'03), Oct. 2003, pp. 482-491.
-
(2003)
Proc. of the 44th Annual IEEE Ymposium on Foundations of Computer Science(FOCS'03)
, pp. 482-491
-
-
Kempe, D.1
Dobra, A.2
Gehrke, J.3
-
7
-
-
0003403663
-
-
[Online] Available:
-
The network simulator ns-2 (2009). [Online]. Available: http://www.isi.edu/nsnam/ns/
-
(2009)
The Network Simulator ns-2
-
-
-
9
-
-
49049110543
-
A distributed defense framework for flooding-based ddos attacks
-
Barcelona, Mar.
-
Y. You, M. Zulkernine, and A. Haque, "A distributed defense framework for flooding-based ddos attacks," in The Third International Conference on Availability, Reliability and Security, Barcelona, Mar. 2008, pp. 245-252.
-
(2008)
The Third International Conference on Availability, Reliability and Security
, pp. 245-252
-
-
You, Y.1
Zulkernine, M.2
Haque, A.3
-
10
-
-
0038052872
-
Random flow network modeling and simulations for ddos attack mitigation
-
May
-
J. Kong, M. Mirza, J. Shu, C. Yoedhana, M. Gerla, and S. Lu, "Random flow network modeling and simulations for ddos attack mitigation," in IEEE International Conference on Communications (ICC '03), vol. 1, May 2003, pp. 487-491.
-
(2003)
IEEE International Conference on Communications (ICC '03)
, vol.1
, pp. 487-491
-
-
Kong, J.1
Mirza, M.2
Shu, J.3
Yoedhana, C.4
Gerla, M.5
Lu, S.6
-
11
-
-
0011352799
-
Sos: Secure overlay services
-
Pittsburgh, Pennsylvania, Aug.
-
A. D. Keromytis, V. Misra, and D. Rubenstein, "Sos: Secure overlay services," in Proc. ACM SIGCOMM'02, Pittsburgh, Pennsylvania, Aug. 2002.
-
(2002)
Proc. ACM SIGCOMM'02
-
-
Keromytis, A.D.1
Misra, V.2
Rubenstein, D.3
-
12
-
-
33745686749
-
On the effectiveness of secure overlay forwarding systems under intelligent distributed dos attacks
-
X. Wang, S. Chellappan, P. Boyer, and D. Xuan, "On the effectiveness of secure overlay forwarding systems under intelligent distributed dos attacks," IEEE Transactions on Parallel and Distributed Systems, vol. 17, no. 7, pp. 619-632, 2006.
-
(2006)
IEEE Transactions on Parallel and Distributed Systems
, vol.17
, Issue.7
, pp. 619-632
-
-
Wang, X.1
Chellappan, S.2
Boyer, P.3
Xuan, D.4
-
13
-
-
84942253601
-
Cossack: Coordinated suppression of simultaneous attacks
-
Washington DC, USA, Apr.
-
C. Papadopoulos, R. Lindell, J. Mehringer, A. Hussain, and R. Govindan, "Cossack: Coordinated suppression of simultaneous attacks," in IEEE Proc. of the DARPA Information Survivability Conference and Exposition( DISCEX 03), Washington DC, USA, Apr. 2003, pp. 2-13.
-
(2003)
IEEE Proc. of the DARPA Information Survivability Conference and Exposition( DISCEX 03)
, pp. 2-13
-
-
Papadopoulos, C.1
Lindell, R.2
Mehringer, J.3
Hussain, A.4
Govindan, R.5
-
14
-
-
34648867936
-
A framework for a collaborative ddos defense
-
Miami, Florida, USA, Dec.
-
G. Oikonomou, P. Reiher, M. Robinson, and J. Mirkovic, "A framework for a collaborative ddos defense," in Proc. of the 2006 Annual Computer Security Applications Conference, Miami, Florida, USA, Dec. 2006, pp.33-42.
-
(2006)
Proc. of the 2006 Annual Computer Security Applications Conference
, pp. 33-42
-
-
Oikonomou, G.1
Reiher, P.2
Robinson, M.3
Mirkovic, J.4
-
15
-
-
36348929372
-
Collaborative change detection of ddos attacks over multiple network domains
-
Y. Chen, K. Hwang, and W.-S. Ku, "Collaborative change detection of ddos attacks over multiple network domains," IEEE Transactions on Parallel and Distributed Systems, vol. 18, no. 12, pp. 1649-1662, 2007.
-
(2007)
IEEE Transactions on Parallel and Distributed Systems
, vol.18
, Issue.12
, pp. 1649-1662
-
-
Chen, Y.1
Hwang, K.2
Ku, W.-S.3
|