-
3
-
-
70350156792
-
A survey of attacks on web services
-
10.1007/s00450-009-0092-6
-
M. Jensen, N. Gruschka, and R. Herkenhner, "A survey of attacks on web services," Computer Science - Research and Development, vol. 24, pp. 185-197, 2009, 10.1007/s00450-009-0092-6.
-
(2009)
Computer Science - Research and Development
, vol.24
, pp. 185-197
-
-
Jensen, M.1
Gruschka, N.2
Herkenhner, R.3
-
4
-
-
38949108959
-
Preventing Service Oriented Denial of Service (PreSODoS): A proposed approach
-
DOI 10.1109/ICWS.2006.102, 4032071, Proceedings - ICWS 2006: 2006 IEEE International Conference on Web Services
-
S. Padmanabhuni, V. Singh, K. M. S. Kumar, and A. Chatterjee, "Preventing service oriented denial of service (Pre-SODoS): A proposed approach," in Proceedings of the IEEE International Conference on Web Services. Washington, DC, USA: IEEE Computer Society, 2006, pp. 577-584. (Pubitemid 351209897)
-
(2006)
Proceedings - ICWS 2006: 2006 IEEE International Conference on Web Services
, pp. 577-584
-
-
Padmanabhuni, S.1
Singh, V.2
Kumar, K.M.S.3
Chatterjee, A.4
-
5
-
-
78650317639
-
Validating denial of service vulnerabilities in web services
-
Network and System Security IEEE Computer Society
-
S. Suriadi, A. Clark, and D. Schmidt, "Validating denial of service vulnerabilities in web services," in Network and System Security, International Conference on Network and System Security. IEEE Computer Society, 2010, pp. 175-182.
-
(2010)
International Conference on Network and System Security
, pp. 175-182
-
-
Suriadi, S.1
Clark, A.2
Schmidt, D.3
-
9
-
-
85084161590
-
Political DDoS: Estonia and beyond
-
USENIX, July
-
J. Nazario, "Political DDoS: Estonia and beyond," in USENIX Security '08. USENIX, July 2008, http://streaming.linux-magazin.de/events/ usec08/tech/archive/jnazario/.
-
(2008)
USENIX Security '08
-
-
Nazario, J.1
-
12
-
-
84943235829
-
Pricing via processing or combatting junk mail
-
E. F. Brickell, Ed. Springer
-
C. Dwork and M. Naor, "Pricing via processing or combatting junk mail," in Advances in Cryptology - Proc. CRYPTO '92, ser. LNCS, E. F. Brickell, Ed., vol. 740. Springer, 1992, pp. 139-147.
-
(1992)
Advances in Cryptology - Proc. CRYPTO '92, Ser. LNCS
, vol.740
, pp. 139-147
-
-
Dwork, C.1
Naor, M.2
-
13
-
-
84861587712
-
Client puzzles: A cryptographic countermeasure against connection depletion attacks
-
Internet Society [Online]
-
A. Juels and J. Brainard, "Client puzzles: A cryptographic countermeasure against connection depletion attacks," in Proc. Internet Society Network and Distributed System Security Symposium (NDSS) 1999. Internet Society, 1999, pp. 151-165. [Online]. Available: http://www.isoc.org/isoc/ conferences/ndss/99/proceedings/
-
(1999)
Proc. Internet Society Network and Distributed System Security Symposium (NDSS) 1999
, pp. 151-165
-
-
Juels, A.1
Brainard, J.2
-
14
-
-
84949938425
-
DOS-resistant authentication with client puzzles
-
Security Protocols
-
T. Aura, P. Nikander, and J. Leiwo, "DOS-resistant authentication with client puzzles," in Security Protocols: 8th International Workshop, ser. LNCS, B. Christianson, B. Crispo, J. A. Malcolm, and M. Roe, Eds., vol. 2133. Springer, 2000, pp. 170-177. (Pubitemid 33347515)
-
(2001)
Lecture Notes in Computer Science
, Issue.2133
, pp. 170-177
-
-
Aura, T.1
Nikander, P.2
Leiwo, J.3
-
15
-
-
84872811083
-
Modelling denial of service attacks on JFK with meadows's cost-based framework
-
R. Buyya, T. Ma, R. Safavi-Naini, C. Steketee, and W. Susilo, Eds. Australian Computer Society [Online]
-
J. Smith, J. González Nieto, and C. Boyd, "Modelling denial of service attacks on JFK with Meadows's cost-based framework," in Proc. 4th Australasian Information Security Workshop - Network Security (AISW-NetSec) 2006, ser. CRPIT, R. Buyya, T. Ma, R. Safavi-Naini, C. Steketee, and W. Susilo, Eds., vol. 54. Australian Computer Society, 2006, pp. 125-134. [Online]. Available: http://crpit.com/confpapers/CRPITV54Smith.pdf
-
(2006)
Proc. 4th Australasian Information Security Workshop - Network Security (AISW-NetSec) 2006, Ser. CRPIT
, vol.54
, pp. 125-134
-
-
Smith, J.1
González Nieto, J.2
Boyd, C.3
-
16
-
-
70350639691
-
Towards denial-of-service-resilient key agreement protocols
-
C. Boyd and J. González Nieto, Eds. Springer
-
D. Stebila and B. Ustaoglu, "Towards denial-of-service-resilient key agreement protocols," in Proc. 14th Australasian Conference on Information Security and Privacy (ACISP) 2009, ser. LNCS, C. Boyd and J. González Nieto, Eds., vol. 5594. Springer, 2009, pp. 389-406.
-
(2009)
Proc. 14th Australasian Conference on Information Security and Privacy (ACISP) 2009, Ser. LNCS
, vol.5594
, pp. 389-406
-
-
Stebila, D.1
Ustaoglu, B.2
-
17
-
-
79951789972
-
PTCP: A client puzzle protocol for defending against resource exhaustion denial of service attacks
-
Department of Electrical and Computer Engineering October [Online]
-
T. J. McNevin, J.-M. Park, and R. Marchany, "pTCP: A client puzzle protocol for defending against resource exhaustion denial of service attacks," Department of Electrical and Computer Engineering, Virginia Tech, Technical Report TR-ECE-04-10, October 2004. [Online]. Available: http://www.arias.ece.vt.edu/publications/TechReports/mcNevin-2004-1.pdf
-
(2004)
Virginia Tech, Technical Report TR-ECE-04-10
-
-
McNevin, T.J.1
Park, J.-M.2
Marchany, R.3
-
19
-
-
79955993934
-
An integrated approach to cryptographic mitigation of denial of service attacks
-
ACM
-
J. Rangasamy, D. Stebila, C. Boyd, and J. González Nieto, "An integrated approach to cryptographic mitigation of denial of service attacks," in 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS) 2011. ACM, 2011, pp. 114-123.
-
(2011)
6th ACM Symposium on Information, Computer and Communications Security (ASIACCS) 2011
, pp. 114-123
-
-
Rangasamy, J.1
Stebila, D.2
Boyd, C.3
González Nieto, J.4
-
20
-
-
79951798566
-
Stronger difficulty notions for client puzzles and denial-of-service- resistant protocols
-
A. Kiayias, Ed. Springer
-
D. Stebila, L. Kuppusamy, J. Rangasamy, C. Boyd, and J. Gonzalez Nieto, "Stronger difficulty notions for client puzzles and denial-of-service- resistant protocols," in Progress in Cryptography - CT-RSA 2011: The Cryptographers' Track at RSA Conference 2011, ser. LNCS, A. Kiayias, Ed., vol. 6558. Springer, 2011, pp. 284-301.
-
(2011)
Progress in Cryptography - CT-RSA 2011: The Cryptographers' Track at RSA Conference 2011, Ser. LNCS
, vol.6558
, pp. 284-301
-
-
Stebila, D.1
Kuppusamy, L.2
Rangasamy, J.3
Boyd, C.4
Gonzalez Nieto, J.5
-
21
-
-
33845531695
-
Protecting web services from DoS attacks by SOAP message validation
-
DOI 10.1007/0-387-33406-8-15, Security and Privacy in Dynamic Environments: Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden
-
N. Gruschka and N. Luttenberger, "Protecting web services from DoS attacks by SOAP message validation," in Security and Privacy in Dynamic Environments, ser. IFIP International Federation for Information Processing, S. Fischer-Hbner, K. Rannenberg, L. Yngstrm, and S. Lindskog, Eds. Springer Boston, 2006, vol. 201, pp. 171-182, 10.1007/0-387-334068-15. (Pubitemid 44920652)
-
(2006)
IFIP International Federation for Information Processing
, vol.201
, pp. 171-182
-
-
Gruschka, N.1
Luttenberger, N.2
-
22
-
-
33749074058
-
Nedgty: Web services firewall
-
DOI 10.1109/ICWS.2005.84, 1530851, Proceedings - 2005 IEEE International Conference on Web Services, ICWS 2005
-
R. Bebawy, H. Sabry, S. El-Kassas, Y. Hanna, and Y. Youssef, "Nedgty: Web services firewall," in IEEE International Conference on Web Services. Los Alamitos, CA, USA: IEEE Computer Society, 2005, pp. 597-601. (Pubitemid 44460253)
-
(2005)
Proceedings - 2005 IEEE International Conference on Web Services, ICWS 2005
, vol.2005
, pp. 597-601
-
-
Bebawy, R.1
Sabry, H.2
El-Kassas, S.3
Hanna, Y.4
Youssef, Y.5
-
23
-
-
38949087920
-
Design and implementation of an XML firewall
-
DOI 10.1109/ICCIAS.2006.295443, 4076139, 2006 International Conference on Computational Intelligence and Security, ICCIAS 2006
-
Y.-S. Loh, W.-C. Yau, C.-T. Wong, and W.-C. Ho, "Design and implementation of an XML firewall," in 2006 International Conference on Computational Intelligence and Security, vol. 2, November 2006, pp. 1147-1150. (Pubitemid 351222214)
-
(2007)
2006 International Conference on Computational Intelligence and Security, ICCIAS 2006
, vol.2
, pp. 1147-1150
-
-
Loh, Y.-S.1
Yau, W.-C.2
Wong, C.-T.3
Ho, W.-C.4
-
24
-
-
77955035143
-
A multiagent solution to adaptively classify SOAP message and protect against DoS attack
-
P. Meseguer, L. Mandow, and R. Gasca, Eds. Springer Berlin / Heidelberg 10.1007/978-3-642-142642-19
-
C. Pinzón, J. De Paz, J. Bajo, and J. Corchado, "A multiagent solution to adaptively classify SOAP message and protect against DoS attack," in Current Topics in Artificial Intelligence, ser. Lecture Notes in Computer Science, P. Meseguer, L. Mandow, and R. Gasca, Eds. Springer Berlin / Heidelberg, 2010, vol. 5988, pp. 181-190, 10.1007/978-3-642-142642-19.
-
(2010)
Current Topics in Artificial Intelligence, Ser. Lecture Notes in Computer Science
, vol.5988
, pp. 181-190
-
-
Pinzón, C.1
De Paz, J.2
Bajo, J.3
Corchado, J.4
-
25
-
-
49049101669
-
An adaptive intrusion detection and prevention (ID/IP) framework for web services
-
Washington, DC, USA: IEEE Computer Society
-
C. G. Yee, W. H. Shin, and G. S. V. R. K. Rao, "An adaptive intrusion detection and prevention (ID/IP) framework for web services," in Proceedings of the 2007 International Conference on Convergence Information Technology, ser. ICCIT '07. Washington, DC, USA: IEEE Computer Society, 2007, pp. 528-534.
-
(2007)
Proceedings of the 2007 International Conference on Convergence Information Technology, Ser. ICCIT '07
, pp. 528-534
-
-
Yee, C.G.1
Shin, W.H.2
Rao, G.S.V.R.K.3
-
26
-
-
63149089944
-
Countering DDoS and XDoS attacks against web services
-
Los Alamitos, CA, USA: IEEE Computer Society
-
X. Ye, "Countering DDoS and XDoS attacks against web services," in IEEE/IFIP International Conference on Embedded and Ubiquitous Computing. Los Alamitos, CA, USA: IEEE Computer Society, 2008, pp. 346-352.
-
(2008)
IEEE/IFIP International Conference on Embedded and Ubiquitous Computing
, pp. 346-352
-
-
Ye, X.1
|