-
1
-
-
70449561018
-
Design of traceback methods for tracking DoS attacks
-
April
-
Priescu, I. , Nicolaescu, S. , and Bica, I. , "Design of Traceback Methods for Tracking DoS Attacks," IACSITSC '09, pp. 117-121, April 2009
-
(2009)
IACSITSC '09
, pp. 117-121
-
-
Priescu, I.1
Nicolaescu, S.2
Bica, I.3
-
2
-
-
31544436627
-
Denial-of-service attack-detection techniques
-
DOI 10.1109/MIC.2006.5
-
Carl, G. , Kesidis, G. , Brooks, R. R. , and Suresh R. , "Denial-of-service attack-detection techniques," Internet Computing, IEEE, vol. 10, no. 1, pp. 82-89, Jan.-Feb. 2006 (Pubitemid 43159617)
-
(2006)
IEEE Internet Computing
, vol.10
, Issue.1
, pp. 82-89
-
-
Carl, G.1
Kesidis, G.2
Brooks, R.R.3
Rai, S.4
-
3
-
-
78049333534
-
Impersonation attack on two identity-based authenticated key exchange protocols
-
14-15 Aug
-
Zhang, S. , Cheng, Q. , and Wang, X. , "Impersonation Attack on Two Identity-Based Authenticated Key Exchange Protocols," Information Engineering (ICIE), 2010 WASE International Conference on , vol. 2, pp. 113-116, 14-15 Aug. 2010
-
(2010)
Information Engineering (ICIE), 2010 WASE International Conference on
, vol.2
, pp. 113-116
-
-
Zhang, S.1
Cheng, Q.2
Wang, X.3
-
4
-
-
78649943792
-
Identity-based authenticated key exchange protocols
-
17-19 S
-
Xiaoyong, L. , Hui, Z. , "Identity-based authenticated key exchange protocols," Educational and Information Technology (ICEIT), 2010 International Conference on, vol. 3, pp. V3-85-V3-87, 17-19 S. 2010
-
(2010)
Educational and Information Technology (ICEIT), 2010 International Conference on
, vol.3
-
-
Xiaoyong, L.1
Hui, Z.2
-
5
-
-
4544249884
-
Packet filtering for congestion control under DoS attacks
-
8-9 April
-
Hu, Y. , Choi, H. , Choi, H. , "Packet filtering for congestion control under DoS attacks," Information Assurance Workshop, 2004. Proceedings. Second IEEE International, pp. 3- 18, 8-9 April 2004
-
(2004)
Information Assurance Workshop 2004. Proceedings. Second IEEE International
, pp. 3-18
-
-
Hu, Y.1
Choi, H.2
Choi, H.3
-
6
-
-
70349659341
-
Adaptive early packet filtering for defending firewalls against DoS attacks
-
19-25 April
-
El-Atawy, A. , Al-Shaer, E. , Tran, T. , Boutaba, R. , "Adaptive Early Packet Filtering for Defending Firewalls Against DoS Attacks," INFOCOM 2009, IEEE, pp. 2437-2445, 19-25 April 2009
-
(2009)
INFOCOM 2009, IEEE
, pp. 2437-2445
-
-
El-Atawy, A.1
Al-Shaer, E.2
Tran, T.3
Boutaba, R.4
-
7
-
-
33847055510
-
A security framework with trust management for sensor networks
-
5-9 Sept
-
Yao, Z. , Kim, D. , Le, I. , Kim, K. , Jang, J. , "A security framework with trust management for sensor networks," Security and Privacy for Emerging Areas in Communication Networks, 2005. Workshop of the 1st International Conference on, pp. 190-198, 5-9 Sept. 2005
-
(2005)
Security and Privacy for Emerging Areas in Communication Networks 2005. Workshop of the 1st International Conference on
, pp. 190-198
-
-
Yao, Z.1
Kim Le, D.I.2
Kim, K.3
Jang, J.4
-
8
-
-
85113133621
-
Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
-
Sep
-
Michiardi, P. , and Molva, R. , "Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks," Commun. Multimedia Security, pp. 107-121, Sep. 2002
-
(2002)
Commun. Multimedia Security
, pp. 107-121
-
-
Michiardi, P.1
Molva, R.2
-
9
-
-
33144465932
-
Information theoretic framework of trust modeling and evaluation for ad hoc networks
-
Sun, Y. , Yu, W. , Han, Z. , Liu, K. , "Information theoretic framework of trust modeling and evaluation for ad hoc networks," Selected Areas in Communications, IEEE Journal on, vol. 24, no. 2, pp. 305-317,. 2006
-
(2006)
Selected Areas in Communications, IEEE Journal on
, vol.24
, Issue.2
, pp. 305-317
-
-
Sun, Y.1
Yu, W.2
Han, Z.3
Liu, K.4
-
10
-
-
33144465377
-
On trust models and trust evaluation metrics for ad hoc networks
-
DOI 10.1109/JSAC.2005.861390
-
Theodorakopoulos, G. , Baras, J. S. , "On trust models and trust evaluation metrics for ad hoc networks," Selected Areas in Communications, IEEE Journal on, vol. 24, no. 2, pp. 318-328, Feb. 2006 (Pubitemid 43269752)
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 318-328
-
-
Theodorakopoulos, G.1
Baras, J.S.2
-
11
-
-
34250782069
-
A Bayesian network based trust model for improving collaboration in mobile ad hoc networks
-
DOI 10.1109/RIVF.2007.369149, 4223066, 2007 IEEE International Conference on Research, Innovation and Vision for the Future, RIVF 2007
-
Nguyen, C. , Camp, O. , Loiseau, S. , "A Bayesian network based trust model for improving collaboration in mobile ad hoc networks," Research, Innovation and Vision for the Future, 2007 IEEE International Conference on, pp. 144-151, 5-9 March 2007 (Pubitemid 46950598)
-
(2007)
2007 IEEE International Conference on Research, Innovation and Vision for the Future, RIVF 2007
, pp. 144-151
-
-
Nguyen, C.T.1
Camp, O.2
Loiseau, S.3
-
12
-
-
36348961451
-
Quantifying trust metrics of recommendation systems in Ad-Hoc networks
-
11-15 March
-
Huafei, Z. , Feng, B. , "Quantifying Trust Metrics of Recommendation Systems in Ad-Hoc Networks," Wireless Communications and Networking Conference, 2007. WCNC 2007. IEEE, pp. 2904-2908, 11-15 March 2007
-
(2007)
Wireless Communications and Networking Conference 2007. WCNC 2007. IEEE
, pp. 2904-2908
-
-
Huafei, Z.1
Feng, B.2
-
13
-
-
84946651784
-
Attitudes and cognitive organization
-
Heider, F. , Attitudes and cognitive organization. Journal of Psychology, 21: 107-112, 1946.
-
(1946)
Journal of Psychology
, vol.21
, pp. 107-112
-
-
Heider, F.1
-
14
-
-
78649304570
-
Trust formation based on subjective logic and PGP web-of-trust for information sharing in mobile ad hoc networks
-
IEEE Second International Conference on, 20-22 Aug
-
Bakar, A. , Ahmad, A. , Ismail, R. , Manan, J. , "Trust Formation Based on Subjective Logic and PGP Web-of-Trust for Information Sharing in Mobile Ad Hoc Networks," Social Computing (SocialCom), 2010 IEEE Second International Conference on, pp. 1004-1009, 20-22 Aug. 2010
-
(2010)
Social Computing (SocialCom), 2010
, pp. 1004-1009
-
-
Bakar, A.1
Ahmad, A.2
Ismail, R.3
Manan, J.4
-
15
-
-
77958147616
-
InFilter: Predictive ingress filtering to detect spoofed IP traffic
-
6-10 June
-
Ghosh, A. , Wong, L. , Di Crescenzo, G. , Talpade, R. , "InFilter: predictive ingress filtering to detect spoofed IP traffic," Distributed Computing Systems Workshops, 2005. 25th IEEE International Conference on, pp. 99- 106, 6-10 June 2005
-
(2005)
Distributed Computing Systems Workshops, 2005. 25th IEEE International Conference on
, pp. 99-106
-
-
Ghosh, A.1
Wong, L.2
Di Crescenzo, G.3
Talpade, R.4
-
16
-
-
73849100225
-
Detecting and Preventing IPspoofed DDoS Attacks by Encrypted Marking Based Detection and Filtering (EMDAF)
-
27-28 Oct.
-
Nagaratna, M. , Prasad, V. , Kumar, S. T. , "Detecting and Preventing IPspoofed DDoS Attacks by Encrypted Marking Based Detection and Filtering (EMDAF)," Advances in Recent Technologies in Communication and Computing, 2009. ARTCom '09. International Conference on, pp. 753-755, 27-28 Oct. 2009
-
(2009)
Advances in Recent Technologies in Communication and Computing 2009. ARTCom '09. International Conference on
, pp. 753-755
-
-
Nagaratna, M.1
Prasad, V.2
Kumar, S.T.3
-
17
-
-
63649095793
-
Detection and defense against DDoS attack with IP spoofing
-
18-20 Dec
-
Mopari, I. , Pukale, S. , Dhore, M. L. , "Detection and defense against DDoS attack with IP spoofing," Computing, Communication and Networking, 2008. ICCCn 2008. International Conference on, pp. 1-5, 18-20 Dec. 2008
-
(2008)
Computing, Communication and Networking, 2008. ICCCn 2008. International Conference on
, pp. 1-5
-
-
Mopari, I.1
Pukale, S.2
Dhore, M.L.3
-
18
-
-
33947503628
-
Defense against spoofed IP traffic using hop-count filtering
-
DOI 10.1109/TNET.2006.890133
-
Wang, H. , Jin, C. , Shin, K. , "Defense Against Spoofed IP Traffic Using Hop-Count Filtering," Networking, IEEE/ACM Transactions on , vol. 15, no. 1, pp. 40-53, Feb. 2007 (Pubitemid 46464416)
-
(2007)
IEEE/ACM Transactions on Networking
, vol.15
, Issue.1
, pp. 40-53
-
-
Wang, H.1
Jin, C.2
Shin, K.G.3
-
19
-
-
79952931132
-
Static trust: A practical framework for trusted networked devices
-
4-7 Jan
-
Harris, J. , Hill, R. , "Static Trust: A Practical Framework for Trusted Networked Devices," System Sciences (HICSS), 2011 44th Hawaii International Conference on, pp. 1-10, 4-7 Jan. 2011
-
(2011)
System Sciences (HICSS), 2011 44th Hawaii International Conference
, pp. 1-10
-
-
Harris, J.1
Hill, R.2
-
20
-
-
78649252818
-
Threat-adaptive architectures for trusted platform modules in secure computing systems
-
20-22 May
-
Anand, V. , Saniie, J. , Oruklu, E. , "Threat-adaptive architectures for trusted platform modules in secure computing systems," Electro/Information Technology (EIT), 2010 IEEE International Conference on, pp. 1-6, 20-22 May 2010
-
(2010)
Electro/Information Technology (EIT), 2010 IEEE International Conference on
, pp. 1-6
-
-
Anand, V.1
Saniie, J.2
Oruklu, E.3
-
23
-
-
0033715573
-
Web traffic modeling exploiting TCP connections' temporal clustering through HTML-REDUCE
-
May/Jun
-
Molina, M. , Castelli, P. , Foddis, G. , "Web traffic modeling exploiting TCP connections' temporal clustering through HTML-REDUCE," Network, IEEE, vol. 14, no. 3, pp. 46-55, May/Jun 2000
-
(2000)
Network, IEEE
, vol.14
, Issue.3
, pp. 46-55
-
-
Molina, M.1
Castelli, P.2
Foddis, G.3
-
24
-
-
33845579903
-
A packet-level characterization of network traffic
-
DOI 10.1109/CAMAD.2006.1649716, 1649716, 2006 11th International Workshop on Computer-Aided Modeling, Analysis and Design of Communication Links and Networks
-
Dainotti, A. , Pescape, A. , Ventre, G. , "A packet-level characterization of network traffic" Computer-Aided Modeling, Analysis and Design of Communication Links and Networks, 2006 11th International Workshop on, pp. 38-45, 2006 (Pubitemid 44931722)
-
(2006)
2006 11th International Workshop on Computer-Aided Modeling, Analysis and Design of Communication Links and Networks
, vol.2006
, pp. 38-45
-
-
Dainotti, A.1
Pescape, A.2
Ventre, G.3
|