-
2
-
-
18144411533
-
Preventing internet denial-of-service with capabilities
-
T. Anderson, T. Roscoe, and D. Wetherall. Preventing internet denial-of-service with capabilities. SIGCOMM Comput. Commun. Rev., 34(1):39-44, 2004.
-
(2004)
SIGCOMM Comput. Commun. Rev.
, vol.34
, Issue.1
, pp. 39-44
-
-
Anderson, T.1
Roscoe, T.2
Wetherall, D.3
-
5
-
-
0142061214
-
Rate adaptation, congestion control and fairness: A tutorial
-
December
-
J.-Y. L. Boudec. Rate adaptation, congestion control and fairness: A tutorial, EPFL, December 2000.
-
(2000)
EPFL
-
-
Boudec, J.-Y.L.1
-
6
-
-
36348929372
-
Collaborative detection of DDoS attacks over multiple network domains
-
Y. Chen, K. Hwang, and W.-S. Ku. Collaborative detection of DDoS attacks over multiple network domains. IEEE Trans. Parallel Distrib. Syst., 18(12):1649-1662, 2007.
-
(2007)
IEEE Trans. Parallel Distrib. Syst.
, vol.18
, Issue.12
, pp. 1649-1662
-
-
Chen, Y.1
Hwang, K.2
Ku, W.-S.3
-
7
-
-
0242466860
-
The average distances in random graphs with given expected degrees
-
F. Chung and L. Lu. The average distances in random graphs with given expected degrees. Internet Mathematics, 1:15879-15882, 2002.
-
(2002)
Internet Mathematics
, vol.1
, pp. 15879-15882
-
-
Chung, F.1
Lu, L.2
-
8
-
-
0024665231
-
Visa protocols for controlling interorganizational datagram flow. Selected Areas in Communications
-
May
-
D. Estrin, J. Mogul, and G. Tsudik. Visa protocols for controlling interorganizational datagram flow. Selected Areas in Communications, IEEE Journal on, 7(4):486-498, May 1989.
-
(1989)
IEEE Journal on
, vol.7
, Issue.4
, pp. 486-498
-
-
Estrin, D.1
Mogul, J.2
Tsudik, G.3
-
9
-
-
0033204106
-
On power-law relationships of the internet topology
-
ACM
-
M. Faloutsos, P. Faloutsos, and C. Faloutsos. On power-law relationships of the internet topology. In SIGCOMM '99, pages 251-262. ACM, 1999.
-
(1999)
SIGCOMM '99
, pp. 251-262
-
-
Faloutsos, M.1
Faloutsos, P.2
Faloutsos, C.3
-
10
-
-
58149092182
-
Mitigating distributed denial of service attacks in multiparty applications in the presence of clock drifts
-
IEEE Computer Society
-
Z. Fu, M. Papatriantafilou, and P. Tsigas. Mitigating distributed denial of service attacks in multiparty applications in the presence of clock drifts. In Proceedings of IEEE SRDS, pages 63-72. IEEE Computer Society, 2008.
-
(2008)
Proceedings of IEEE SRDS
, pp. 63-72
-
-
Fu, Z.1
Papatriantafilou, M.2
Tsigas, P.3
-
12
-
-
77954694546
-
Mitigating denial of capability attacks using sink tree based quota allocation
-
ACM
-
Z. Fu, M. Papatriantafilou, P. Tsigas, and W. Wei. Mitigating denial of capability attacks using sink tree based quota allocation. In Proceedings of SAC 2010, pages 713-718. ACM, 2010.
-
(2010)
Proceedings of SAC 2010
, pp. 713-718
-
-
Fu, Z.1
Papatriantafilou, M.2
Tsigas, P.3
Wei, W.4
-
13
-
-
21844463097
-
Spv: Secure path vector routing for securing bgp
-
ACM
-
Y.-C. Hu, A. Perrig, and M. Sirbu. Spv: secure path vector routing for securing bgp. In SIGCOMM '04, pages 179-192. ACM, 2004.
-
(2004)
SIGCOMM '04
, pp. 179-192
-
-
Hu, Y.-C.1
Perrig, A.2
Sirbu, M.3
-
14
-
-
33744945767
-
SOS: Secure overlay services
-
A. D. Keromytis, V. Misra, and D. Rubenstein. SOS: secure overlay services. SIGCOMM Comput. Commun. Rev., 32(4):61-72, 2002.
-
(2002)
SIGCOMM Comput. Commun. Rev.
, vol.32
, Issue.4
, pp. 61-72
-
-
Keromytis, A.D.1
Misra, V.2
Rubenstein, D.3
-
15
-
-
65249149520
-
To filter or to authorize: Network-layer DoS defense against multimillion-node botnets
-
ACM
-
X. Liu, X. Yang, and Y. Lu. To filter or to authorize: network-layer DoS defense against multimillion-node botnets. In SIGCOMM '08, pages 195-206. ACM, 2008.
-
(2008)
SIGCOMM '08
, pp. 195-206
-
-
Liu, X.1
Yang, X.2
Lu, Y.3
-
16
-
-
4544272175
-
Controlling high bandwidth aggregates in the network
-
R. Mahajan, S. M. Bellovin, S. Floyd, J. Ioannidis, V. Paxson, and S. Shenker. Controlling high bandwidth aggregates in the network. SIGCOMM Comput. Commun. Rev., 32(3):62-73, 2002.
-
(2002)
SIGCOMM Comput. Commun. Rev.
, vol.32
, Issue.3
, pp. 62-73
-
-
Mahajan, R.1
Bellovin, S.M.2
Floyd, S.3
Ioannidis, J.4
Paxson, V.5
Shenker, S.6
-
17
-
-
33644905483
-
Network applications of bloom filters: A survey
-
A. B. I. M. Mitzenmacher. Network applications of bloom filters: A survey. In Internet Mathematics, pages 636-646, 2002.
-
(2002)
Internet Mathematics
, pp. 636-646
-
-
Mitzenmacher, A.B.I.M.1
-
18
-
-
36949036429
-
Portcullis: Protecting connection setup from denial-of-capability attacks
-
ACM
-
B. Parno, D. Wendlandt, E. Shi, A. Perrig, B. Maggs, and Y.-C. Hu. Portcullis: protecting connection setup from denial-of-capability attacks. In SIGCOMM '07, pages 289-300. ACM, 2007.
-
(2007)
SIGCOMM '07
, pp. 289-300
-
-
Parno, B.1
Wendlandt, D.2
Shi, E.3
Perrig, A.4
Maggs, B.5
Hu, Y.-C.6
-
19
-
-
21844450913
-
A system for authenticated policy-compliant routing
-
B. Raghavan and A. C. Snoeren. A system for authenticated policy-compliant routing. SIGCOMM Comput. Commun. Rev., 34(4):167-178, 2004.
-
(2004)
SIGCOMM Comput. Commun. Rev.
, vol.34
, Issue.4
, pp. 167-178
-
-
Raghavan, B.1
Snoeren, A.C.2
-
20
-
-
0033650584
-
Practical network support for ip traceback
-
S. Savage, D. Wetherall, A. Karlin, and T. Anderson. Practical network support for ip traceback. SIGCOMM Comput. Commun. Rev., 30(4):295-306, 2000.
-
(2000)
SIGCOMM Comput. Commun. Rev.
, vol.30
, Issue.4
, pp. 295-306
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
21
-
-
0034997397
-
Advanced and authenticated marking schemes for ip traceback
-
vol.2
-
D. X. Song and A. Perrig. Advanced and authenticated marking schemes for ip traceback. In IEEE INFOCOM 2001., volume 2, pages 878-886 vol.2, 2001.
-
(2001)
IEEE INFOCOM 2001
, vol.2
, pp. 878-886
-
-
Song, D.X.1
Perrig, A.2
-
22
-
-
33745781163
-
Countering dos attacks with stateless multipath overlays
-
New York, NY, USA, ACM
-
A. Stavrou and A. D. Keromytis. Countering dos attacks with stateless multipath overlays. In Proceedings of ACM CCS, pages 249-259, New York, NY, USA, 2005. ACM.
-
(2005)
Proceedings of ACM CCS
, pp. 249-259
-
-
Stavrou, A.1
Keromytis, A.D.2
-
23
-
-
3543097593
-
SIFF: A stateless internet flow filter to mitigate DDoS ooding attacks
-
A. Yaar, A. Perrig, and D. Song. SIFF: A stateless internet flow filter to mitigate DDoS ooding attacks. IEEE Security and Privacy Symposium, page 130, 2004.
-
(2004)
IEEE Security and Privacy Symposium
, pp. 130
-
-
Yaar, A.1
Perrig, A.2
Song, D.3
-
24
-
-
33750308365
-
A DoS-limiting network architecture
-
ACM
-
X. Yang, D. Wetherall, and T. Anderson. A DoS-limiting network architecture. In SIGCOMM '05, pages 241-252. ACM, 2005.
-
(2005)
SIGCOMM '05
, pp. 241-252
-
-
Yang, X.1
Wetherall, D.2
Anderson, T.3
|