-
1
-
-
0004194675
-
-
Internet Draft
-
Bellovin, S.M., Leech, M. and Taylor, T. (2001) ICMP Traceback Messages, IETF, Internet Draft.
-
(2001)
ICMP Traceback Messages, IETF
-
-
Bellovin, S.M.1
Leech, M.2
Taylor, T.3
-
2
-
-
33847123551
-
Experience with deter: A testbed for security research
-
March
-
Benzel, T., Braden, R., Kim, D., Neuman, C., Joseph, A. and Sklower, K. (2006) 'Experience with DETER: a testbed for security research', Proceedings of the 2nd International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TRIDENTCOM'06), March.
-
(2006)
Proceedings of the 2nd International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TRIDENTCOM'06)
-
-
Benzel, T.1
Braden, R.2
Kim, D.3
Neuman, C.4
Joseph, A.5
Sklower, K.6
-
3
-
-
70349257240
-
Adaptive distributed mechanism against flooding network attacks based on machine learning
-
October
-
Berral, J.L., Poggi, N., Alonso, J., Gavaldá, R., Torres, J. and Parashar, M. (2008) 'Adaptive distributed mechanism against flooding network attacks based on machine learning', Proceedings of the 1st ACM Workshop on Workshop on AISec, October, pp.43-50.
-
(2008)
Proceedings of the 1st ACM Workshop on Workshop on AISec
, pp. 43-50
-
-
Berral, J.L.1
Poggi, N.2
Alonso, J.3
Gavaldá, R.4
Torres, J.5
Parashar, M.6
-
4
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
July
-
Bloom, B H. (1970) 'Space/time trade-offs in hash coding with allowable errors', Communications of the ACM, Vol. 13, No. 7, July, pp.422-426.
-
(1970)
Communications of the ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom B, H.1
-
7
-
-
0001829246
-
Introduction to grey system theory
-
November
-
Deng, J.L. (1989) 'Introduction to grey system theory', The Journal of Grey System, Vol. 1, No. 1, November, pp.1-24.
-
(1989)
The Journal of Grey System
, vol.1
, Issue.1
, pp. 1-24
-
-
Deng, J.L.1
-
8
-
-
57849143337
-
Sentinel: Hardware-accelerated mitigation of bot-based ddos attacks
-
August
-
Djalaliev, P., Jamshed, M., Farnan, N. and Brustoloni, J. (2008) 'Sentinel: hardware-accelerated mitigation of bot-based DDoS attacks', Proceedings of the 17th International Conference on Computer Communications and Networks, August, pp.633-640.
-
(2008)
Proceedings of the 17th International Conference on Computer Communications and Networks
, pp. 633-640
-
-
Djalaliev, P.1
Jamshed, M.2
Farnan, N.3
Brustoloni, J.4
-
9
-
-
1242321281
-
Ddos attacks and defense mechanisms: Classification and state-of-The-Art
-
April
-
Douligeris, C. and Mitrokotsa, A. (2004) 'DDoS attacks and defense mechanisms: classification and state-of-the-art', Computer Networks, Vol. 44, No. 5, April, pp.643-666.
-
(2004)
Computer Networks
, vol.44
, Issue.5
, pp. 643-666
-
-
Douligeris, C.1
Mitrokotsa, A.2
-
10
-
-
76949106169
-
A puzzle-based defense strategy against flooding attacks using game theory
-
January-March
-
Fallah, M.S. (2010) 'A puzzle-based defense strategy against flooding attacks using game theory', IEEE Transactions on Dependable and Secure Computing, Vol. 7, No. 1, January-March, pp.5-19.
-
(2010)
IEEE Transactions on Dependable and Secure Computing
, vol.7
, Issue.1
, pp. 5-19
-
-
Fallah, M.S.1
-
11
-
-
33947500326
-
Comments on data pre-processing for grey relational analysis
-
June
-
Hsia, K.H., Chen, M.Y. and Chang, M.C. (2004) 'Comments on data pre-processing for grey relational analysis', Journal of Grey System, Vol. 7, No. 1, June, pp.15-20.
-
(2004)
Journal of Grey System
, vol.7
, Issue.1
, pp. 15-20
-
-
Hsia, K.H.1
Chen, M.Y.2
Chang, M.C.3
-
12
-
-
52249109401
-
Accurate ICMP traceback model under DoS/DDoS attack
-
December
-
Izaddoost, A. Othman, M. and Rasid, M.F.A. (2007) 'Accurate ICMP traceback model under DoS/DDoS attack', Proceedings of the International Conference on Advanced Computing and Communications (ADCOM'07), December, pp.441-446.
-
(2007)
Proceedings of the International Conference on Advanced Computing and Communications (ADCOM'07)
, pp. 441-446
-
-
Izaddoost, A.1
Othman, M.2
Rasid, M.F.A.3
-
13
-
-
33749518564
-
SWAT: Small world-based attacker traceback in ad-hoc networks
-
DOI 10.1109/MOBIQUITOUS.2005.56, 1540990, MobiQuitous 2005: Second Annual International Conference on Mobile and Ubiquitous Systems -Networking and Services
-
Kim, Y. and Helmy, A. (2005) 'SWAT: small world-based attacker traceback in ad-hoc networks', Proceedings of the 2nd International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous'05), July, pp.85-96. (Pubitemid 44523267)
-
(2005)
MobiQuitous 2005: Second Annual International Conference on Mobile and Ubiquitous Systems -Networking and Services
, pp. 85-96
-
-
Kim, Y.1
Helmy, A.2
-
14
-
-
38549174025
-
Applying a machine intelligence algorithm for prediction
-
November
-
Li, X. and Chan, C.W. (2006) 'Applying a machine intelligence algorithm for prediction', Proceedings of the International Conference on Computational Intelligence and Security, Vol. 1, November, pp.793-796.
-
(2006)
Proceedings of the International Conference on Computational Intelligence and Security
, vol.1
, pp. 793-796
-
-
Li, X.1
Chan, C.W.2
-
15
-
-
33646799500
-
Statistical-based SYN-flooding detection using programmable network processor
-
1489006, Proceedings - 3rd International Conference on Information Technology and Applications, ICITA 2005
-
Lim B. and Uddin, M.S. (2005) 'Statistical-based SYN-flooding detection using programmable network processor', Proceedings of the 3rd International Conference on Information Technology and Applications (ICITA'05), Vol. 2, July, pp.465-470. (Pubitemid 43763242)
-
(2005)
Proceedings - 3rd International Conference on Information Technology and Applications, ICITA 2005
, vol.II
, pp. 465-470
-
-
Lim, B.1
Uddin, M.S.2
-
16
-
-
15744385979
-
A historical introduction to grey systems theory
-
2004 IEEE International Conference on Systems, Man and Cybernetics, SMC 2004
-
Lin, Y. and Liu, S. (2004) 'A historical introduction to grey systems theory', Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, Vol. 3, October, pp.2403-2408. (Pubitemid 40408523)
-
(2004)
Conference Proceedings - IEEE International Conference on Systems, Man and Cybernetics
, vol.3
, pp. 2403-2408
-
-
Lin, Y.1
Liu, S.2
-
17
-
-
0034300783
-
Towards trapping wily intruders in the large
-
October
-
Mansfield, G., Ohta, K., Takei, Y., Kato, N. and Nemoto, Y. (2000) 'Towards trapping wily intruders in the large', Computer Networks, Vol. 34, No. 4, October, pp.659-670.
-
(2000)
Computer Networks
, vol.34
, Issue.4
, pp. 659-670
-
-
Mansfield, G.1
Ohta, K.2
Takei, Y.3
Kato, N.4
Nemoto, Y.5
-
18
-
-
27644518127
-
D-WARD: A source-end defense against flooding denial-of-service attacks
-
DOI 10.1109/TDSC.2005.35
-
Mirkovic J. and Reiher, P. (2005) 'D-WARD: a sourceend defense against flooding denial-of-service attacks', IEEE Transactions on Dependable and Secure Computing, Vol. 2, No. 3, July-September, pp.216-232. (Pubitemid 41560432)
-
(2005)
IEEE Transactions on Dependable and Secure Computing
, vol.2
, Issue.3
, pp. 216-232
-
-
Mirkovic, J.1
Reiher, P.2
-
19
-
-
11144272176
-
A taxonomy of DDoS attack and DDoS defense mechanisms
-
April
-
Mirkovic, J. and Reiher, P. (2004) 'A taxonomy of DDoS attack and DDoS defense mechanisms', ACM SIGCOMM Computer Communications Review, Vol. 34, No. 2, April, pp.39-54.
-
(2004)
ACM SIGCOMM Computer Communications Review
, vol.34
, Issue.2
, pp. 39-54
-
-
Mirkovic, J.1
Reiher, P.2
-
20
-
-
72849120951
-
Source-end ddos defense', Proceedings of the 2nd
-
April
-
Mirkovic, J., Prier, G. and Reiher, P. (2003) 'Source-end DDoS defense', Proceedings of the 2nd IEEE International Symposium on Network Computing and Applications (NCA'03), April, pp.171-178.
-
(2003)
IEEE International Symposium on Network Computing and Applications (NCA'03)
, pp. 171-178
-
-
Mirkovic, J.1
Prier, G.2
Reiher, P.3
-
21
-
-
35048886560
-
Detecting Distributed Denial of Service (DDoS) Attacks through Inductive Learning
-
Intelligent Data Engineering and Automated Learning
-
Noh, S., Lee, C., Choi, K. and Jung, G. (2003) 'Detecting distributed denial of service (DDoS) attacks through inductive learning', Proceedings of the 4th International Conference on Intelligent Data Engineering and Automated Learning (IDEAL'03), March, pp.286-295. (Pubitemid 36996100)
-
(2003)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.2690
, pp. 286-295
-
-
Noh, S.1
Lee, C.2
Choi, K.3
Jung, G.4
-
22
-
-
35648969617
-
A denial of service detector based on maximum likelihood detection and the random neural network
-
DOI 10.1093/comjnl/bxm066
-
Öke, G. and Loukas, G. (2007) 'A denial of service detector based on maximum likelihood detection and the random neural network', The Computer Journal, Vol. 50, No. 6, September, pp.717-727. (Pubitemid 350031419)
-
(2007)
Computer Journal
, vol.50
, Issue.6
, pp. 717-727
-
-
Oke, G.1
Loukas, G.2
-
23
-
-
34147099073
-
Survey of network-based defense mechanisms countering the DoS and DDoS problems
-
Peng, T., Leckie, C. and Ramamohanarao, K. (2007) 'Survey of network-based defense mechanisms countering the DoS and DDoS problems', ACM Computing Surveys, Vol. 39, No. 1, pp.1-45.
-
(2007)
ACM Computing Surveys
, vol.39
, Issue.1
, pp. 1-45
-
-
Peng, T.1
Leckie, C.2
Ramamohanarao, K.3
-
24
-
-
26844457947
-
A Packet Marking scheme for IP traceback
-
Networking - ICN 2005 - 4th International Conference on Networking, Proceedings
-
Qu, H., Su, P., Lin, D. and Feng, D. (2005) 'A packet marking scheme for IP traceback', Proceedings of the International Conference on Networking, April, pp.964-971. (Pubitemid 41452203)
-
(2005)
Lecture Notes in Computer Science
, vol.3421
, Issue.II
, pp. 964-971
-
-
Qu, H.1
Su, P.2
Lin, D.3
Feng, D.4
-
25
-
-
33744584654
-
Induction of decision trees
-
Quinlan, J.R. (1986) 'Induction of decision trees', Machine Learning, Vol. 1, No. 1, pp.81-106.
-
(1986)
Machine Learning
, vol.1
, Issue.1
, pp. 81-106
-
-
Quinlan, J.R.1
-
27
-
-
27844467756
-
Top-down induction of decision trees classifiers - A survey
-
DOI 10.1109/TSMCC.2004.843247
-
Rokach, L. and Maimon, O. (2005) 'Top-down induction of decision trees classifier - a survey', IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, Vol. 35, No. 4, November, pp.476-487. (Pubitemid 41638167)
-
(2005)
IEEE Transactions on Systems, Man and Cybernetics Part C: Applications and Reviews
, vol.35
, Issue.4
, pp. 476-487
-
-
Rokach, L.1
Maimon, O.2
-
28
-
-
0033650584
-
Practical network support for IP traceback
-
August
-
Savage, S., Wetherall, D., Karlin, A. and Anderson, T. (2000) 'Practical network support for IP traceback', ACM SIGCOMM Computer Communications Review, Vol. 30, No. 4, August, pp.295-306.
-
(2000)
ACM SIGCOMM Computer Communications Review
, vol.30
, Issue.4
, pp. 295-306
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
29
-
-
85050993301
-
Seer: A security experimentation environment for deter
-
August
-
Schwab, S., Wilson, B., Ko, C. and Hussain, A. (2007) 'SEER: a security experimentation environment for DETER', Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test, August.
-
(2007)
Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test
-
-
Schwab, S.1
Wilson, B.2
Ko, C.3
Hussain, A.4
-
30
-
-
8344239770
-
Harpoon: A flow-level traffic generator for router and network tests
-
June
-
Sommers, J., Kim, H. and Barford, P. (2004) 'Harpoon: a flow-level traffic generator for router and network tests', Proceedings of the Joint International Conference on Measurement and Modeling of Computer Systems, June, pp.392-393.
-
(2004)
Proceedings of the Joint International Conference on Measurement and Modeling of Computer Systems
, pp. 392-393
-
-
Sommers, J.1
Kim, H.2
Barford, P.3
-
32
-
-
0024123493
-
Routing of multipoint connections
-
December
-
Waxman, B.M. (1988) 'Routing of multipoint connections', IEEE Journal on Selected Areas in Communications, Vol. 6, No. 9, December, pp.1617-1622.
-
(1988)
IEEE Journal on Selected Areas in Communications
, vol.6
, Issue.9
, pp. 1617-1622
-
-
Waxman, B.M.1
|