-
2
-
-
84891824843
-
Flowmonitor - A network monitoring framework for the network simulator 3 (ns-3)
-
Pisa, Italy, Oct. 19
-
G. Carneiro, P. Fortuna, and M. Ricardo. Flowmonitor - a network monitoring framework for the network simulator 3 (ns-3). In NSTOOLS, Pisa, Italy, Oct. 19 2009.
-
(2009)
NSTOOLS
-
-
Carneiro, G.1
Fortuna, P.2
Ricardo, M.3
-
5
-
-
84866554309
-
Cloud computing and cyber defense
-
March
-
B. Gourley. Cloud computing and cyber defense. Crucial Point LLC, March 2009.
-
(2009)
Crucial Point LLC
-
-
Gourley, B.1
-
6
-
-
0034497721
-
Distributed denial of service attacks
-
F. Lau, S. Rubin, M. Smith, and L. Trajkovic. Distributed denial of service attacks. In IEEE International Conference on Systems, Man, and Cybernetics, volume 3, 2000.
-
(2000)
IEEE International Conference on Systems, Man, and Cybernetics
, vol.3
-
-
Lau, F.1
Rubin, S.2
Smith, M.3
Trajkovic, L.4
-
7
-
-
21244463742
-
Rinse: The real-time immersive network simulation environment for network security exercises
-
M. Liljenstam, J. Liu, D. Nicol, Y. Yuan, G. Yan, and C. Grier. Rinse: the real-time immersive network simulation environment for network security exercises. In Workshop on Principles of Advanced and Distributed Simulation, pages 119-128, 2005.
-
(2005)
Workshop on Principles of Advanced and Distributed Simulation
, pp. 119-128
-
-
Liljenstam, M.1
Liu, J.2
Nicol, D.3
Yuan, Y.4
Yan, G.5
Grier, C.6
-
8
-
-
11144272176
-
A taxonomy of DDoS attack and DDoS defense mechanisms
-
J. Mirkovic. A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Computer Communication Review, 34(2):39-53, 2004.
-
(2004)
ACM SIGCOMM Computer Communication Review
, vol.34
, Issue.2
, pp. 39-53
-
-
Mirkovic, J.1
-
9
-
-
12344275676
-
Model-based evaluation: From dependability to security
-
D. Nicol, W. Sanders, and K. Trived. Model-based evaluation: From dependability to security. IEEE Transactions on Dependable and Secure Computing, 1(1):48-65, 2004.
-
(2004)
IEEE Transactions on Dependable and Secure Computing
, vol.1
, Issue.1
, pp. 48-65
-
-
Nicol, D.1
Sanders, W.2
Trived, K.3
-
10
-
-
77951729734
-
A survey of game theory as applied to network security
-
To appear
-
S. Roy, C. Ellis, S. Shiva, D. Dasgupta, V. Shandilya, and Q. Wu. A survey of game theory as applied to network security. To appear: The 43rd Hawaii International Conference on System Sciences, 2010.
-
(2010)
The 43rd Hawaii International Conference on System Sciences
-
-
Roy, S.1
Ellis, C.2
Shiva, S.3
Dasgupta, D.4
Shandilya, V.5
Wu, Q.6
-
15
-
-
70350700699
-
Monitoring security events using integrated correlation-based techniques
-
Q. Wu, D. Ferebee, Y. Lin, and D. Dasgupta. Monitoring security events using integrated correlation-based techniques. In Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies, page 47, 2009.
-
(2009)
Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies
, pp. 47
-
-
Wu, Q.1
Ferebee, D.2
Lin, Y.3
Dasgupta, D.4
-
16
-
-
0037328484
-
Sustaining availability of web services under distributed denial of service attacks
-
J. Xu and W. Lee. Sustaining availability of web services under distributed denial of service attacks. IEEE Transactions on Computers, pages 195-208, 2003.
-
(2003)
IEEE Transactions on Computers
, pp. 195-208
-
-
Xu, J.1
Lee, W.2
|