-
1
-
-
33845591142
-
DDoS-Resilient Scheduling to Counter Application Layer Attacks under Imperfect Detection
-
Ranjan, S., Swaminathan, R., Uysal, M., Knightly, E.: DDoS-Resilient Scheduling to Counter Application Layer Attacks under Imperfect Detection. In: INFOCOM 2006 (2006)
-
(2006)
INFOCOM 2006
-
-
Ranjan, S.1
Swaminathan, R.2
Uysal, M.3
Knightly, E.4
-
2
-
-
51349125816
-
Live Baiting for Service-level DoS Attackers
-
Khattab, S., Gobriel, S., Melhem, R., Mossäe, D.: Live Baiting for Service-level DoS Attackers. In: Proceedings of INFOCOM (2008)
-
Proceedings of INFOCOM (2008)
-
-
Khattab, S.1
Gobriel, S.2
Melhem, R.3
Mossäe, D.4
-
3
-
-
47149094655
-
A Detection and Offense Mechanism to Defend Against Application Layer DDoS Attacks
-
Yu, J., Li, Z., Chen, H., Chen, X.: A Detection and Offense Mechanism to Defend Against Application Layer DDoS Attacks. In: Proceedings of ICNS 2007 (2007)
-
(2007)
Proceedings of ICNS 2007
-
-
Yu, J.1
Li, Z.2
Chen, H.3
Chen, X.4
-
4
-
-
47249148481
-
Mitigating application-level denial of service attacks on Web servers: A client-transparent approach
-
Srivatsa, M., Iyengar, A., Yin, J., Liu, L.: Mitigating application-level denial of service attacks on Web servers: A client-transparent approach. ACM Transactions on the Web (2008)
-
(2008)
ACM Transactions on the Web
-
-
Srivatsa, M.1
Iyengar, A.2
Yin, J.3
Liu, L.4
-
5
-
-
61449135082
-
Monitoring the Application-Layer DDoS Attacks for Popular Websites
-
Xie, Y., Yu, S.: Monitoring the Application-Layer DDoS Attacks for Popular Websites. IEEE/ACM Transactions on Networking (2009)
-
(2009)
IEEE/ACM Transactions on Networking
-
-
Xie, Y.1
Yu, S.2
-
6
-
-
61449197774
-
A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors
-
Xie, Y., Yu, S.: A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors. IEEE/ACM Transactions on Networking (2009)
-
(2009)
IEEE/ACM Transactions on Networking
-
-
Xie, Y.1
Yu, S.2
-
7
-
-
84924375780
-
Botz-4-Sale: Surviving Organized DDoS Attacks That Mimic Flash Crowds
-
Kandula, S., Katabi, D., Jacob, M., Berger, A.W.: Botz-4-Sale: Surviving Organized DDoS Attacks That Mimic Flash Crowds. In: 2nd Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA (May 2005)
-
2nd Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA (May 2005)
-
-
Kandula, S.1
Katabi, D.2
Jacob, M.3
Berger, A.W.4
-
8
-
-
0041431049
-
Recognising objects in adversarial clutter: Breaking a visual CAPTCHA
-
IEEE Computer Society, Los Alamitos
-
Mori, G., Malik, J.: Recognising objects in adversarial clutter: breaking a visual CAPTCHA. In: IEEE Conference on Computer Vision & Pattern Recognition (CVPR), June 18-20, vol. 1, pp. I-134-I-141. IEEE Computer Society, Los Alamitos (2003)
-
(2003)
IEEE Conference on Computer Vision & Pattern Recognition (CVPR), June 18-20
, vol.1
-
-
Mori, G.1
Malik, J.2
-
9
-
-
47149094655
-
A Detection and Offense Mechanism to Defend Against Application Layer DDoS Attacks
-
Yu, J., Li, Z., Chen, H., Chen, X.: A Detection and Offense Mechanism to Defend Against Application Layer DDoS Attacks. In: Proceedings of ICNS 2007 (2007)
-
(2007)
Proceedings of ICNS 2007
-
-
Yu, J.1
Li, Z.2
Chen, H.3
Chen, X.4
-
11
-
-
8344272005
-
Stochastic models for generating synthetic http source traffic
-
March
-
Cao, J., Cleveland, W., Gao, Y., Jeffay, K., Smith, F., Weigle, M.: Stochastic models for generating synthetic http source traffic. In: IEEE Infocom 2004, vol. 3, pp. 1546-1557 (March 2004)
-
(2004)
IEEE Infocom 2004
, vol.3
, pp. 1546-1557
-
-
Cao, J.1
Cleveland, W.2
Gao, Y.3
Jeffay, K.4
Smith, F.5
Weigle, M.6
|