-
2
-
-
84858680986
-
Mitigating distributed denial of service attacks in multiparty applications in the presence of clock drifts
-
F. Zhang, M. Papatriantafilou, and P. Tsigas, "Mitigating distributed denial of service attacks in multiparty applications in the presence of clock drifts " IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 3, pp. 401-413, 2012.
-
(2012)
IEEE Transactions on Dependable and Secure Computing
, vol.9
, Issue.3
, pp. 401-413
-
-
Zhang, F.1
Papatriantafilou, M.2
Tsigas, P.3
-
3
-
-
0002000920
-
Denial-of-Service attacks rip the Internet
-
L. Garber, "Denial-of-Service attacks rip the Internet," IEEE Computer, vol. 33, no. 4, pp. 12-17, 2000.
-
(2000)
IEEE Computer
, vol.33
, Issue.4
, pp. 12-17
-
-
Garber, L.1
-
4
-
-
30344436961
-
Monitoring the macroscopic effect of DDoS flooding attacks
-
Y. Yuan, and K. Mills, "Monitoring the macroscopic effect of DDoS flooding attacks," IEEE Transactions on Dependable and Secure Computing, vol. 2, no. 4, pp. 324-335, 2005.
-
(2005)
IEEE Transactions on Dependable and Secure Computing
, vol.2
, Issue.4
, pp. 324-335
-
-
Yuan, Y.1
Mills, K.2
-
5
-
-
79960556813
-
On a New Type of Denial of Service Attack in Wireless Networks: The Distributed Jammer Network
-
H. Huang, N. Ahmed, and P. Karthik, "On a New Type of Denial of Service Attack in Wireless Networks: The Distributed Jammer Network," IEEE Transactions on Wireless Communications, vol. 10, no. 7, pp. 2316-2324, 2011.
-
(2011)
IEEE Transactions on Wireless Communications
, vol.10
, Issue.7
, pp. 2316-2324
-
-
Huang, H.1
Ahmed, N.2
Karthik, P.3
-
6
-
-
79953174973
-
Analysis of Coordinated Denial-of-Service Attacks in IEEE 802.22 Networks
-
Y. Tan, S. Sengupta, and K. P. Subbalakshmi, "Analysis of Coordinated Denial-of-Service Attacks in IEEE 802.22 Networks," IEEE Journal on Selected Areas in Communications, vol. 29, no. 4, pp. 890-902, 2011.
-
(2011)
IEEE Journal on Selected Areas in Communications
, vol.29
, Issue.4
, pp. 890-902
-
-
Tan, Y.1
Sengupta, S.2
Subbalakshmi, K.P.3
-
7
-
-
78649982369
-
Detection of multicast video flooding attack using the pattern of bandwidth provisioning efficiency
-
N. Kim, H. Lim, H. Park, and M. Kang, "Detection of multicast video flooding attack using the pattern of bandwidth provisioning efficiency," IEEE Communications Letters, vol. 14, no. 12, pp. 1170-1172, 2010.
-
(2010)
IEEE Communications Letters
, vol.14
, Issue.12
, pp. 1170-1172
-
-
Kim, N.1
Lim, H.2
Park, H.3
Kang, M.4
-
8
-
-
0035402112
-
Probabilistic techniques for intrusion detection based on computer audit data
-
N. Ye, X.-Y. Li, Q. Chen, S. M. Emran, and M.-M. Xu, "Probabilistic techniques for intrusion detection based on computer audit data " IEEE Transactions on System, Man, and Cybernetics, vol. 31, no. 4, pp. 266-274, 2001.
-
(2001)
IEEE Transactions on System, Man, and Cybernetics
, vol.31
, Issue.4
, pp. 266-274
-
-
Ye, N.1
Li, X.-Y.2
Chen, Q.3
Emran, S.M.4
Xu, M.-M.5
-
9
-
-
45749141660
-
Statistical techniques for detecting traffic anomalies through packet header data
-
S. S. Kim, and A. L. N. Reddy, "Statistical techniques for detecting traffic anomalies through packet header data," IEEE/ACM Transactions on Networking, vol. 16, no. 3, pp. 562-575, 2008.
-
(2008)
IEEE/ACM Transactions on Networking
, vol.16
, Issue.3
, pp. 562-575
-
-
Kim, S.S.1
Reddy, A.L.N.2
-
10
-
-
67649889403
-
Flexible deterministic Packet marking: An IP traceback system to find the real source of attacks
-
Y. Xiang, W.-L. Zhou, and M.-Y. Guo, "Flexible deterministic Packet marking: An IP traceback system to find the real source of attacks," IEEE Transaction on Parallel and Distributed Systems, vol. 20, no. 4, pp. 567-580, 2009.
-
(2009)
IEEE Transaction on Parallel and Distributed Systems
, vol.20
, Issue.4
, pp. 567-580
-
-
Xiang, Y.1
Zhou, W.-L.2
Guo, M.-Y.3
-
11
-
-
61449135082
-
Monitoring the application-layer DDoS attacks for popular websites
-
Y. Xie, and S.-Z. Yu, "Monitoring the application-layer DDoS attacks for popular websites," IEEE/ACM Transactions on Networking, vol. 17, no. 1, pp. 15-25, 2009.
-
(2009)
IEEE/ACM Transactions on Networking
, vol.17
, Issue.1
, pp. 15-25
-
-
Xie, Y.1
Yu, S.-Z.2
-
12
-
-
61449197774
-
A large-scale hidden semi-markov model for anomaly detection on user browsing behaviours
-
Y. Xie, and S.-Z. Yu, "A large-scale hidden semi-markov model for anomaly detection on user browsing behaviours," IEEE/ACM Transactions on Networking, vol. 17, no. 1, pp. 54-65, 2009.
-
(2009)
IEEE/ACM Transactions on Networking
, vol.17
, Issue.1
, pp. 54-65
-
-
Xie, Y.1
Yu, S.-Z.2
-
14
-
-
0038052872
-
Random flow network modelling and simulations for DDoS attack mitigation
-
J. Kong, M. Mirze, J. Shu, C. Yoedhana, M. Gerla, and S. Lu, "Random flow network modelling and simulations for DDoS attack mitigation," in International Conference on Communications, 2003, pp. 487-491.
-
International Conference on Communications, 2003
, pp. 487-491
-
-
Kong, J.1
Mirze, M.2
Shu, J.3
Yoedhana, C.4
Gerla, M.5
Lu, S.6
-
15
-
-
40949163757
-
Differentiating Malicious DDoS attack traffic from normal TCP flows by proactive tests
-
Z.-Q. Gao, and N. Ansari, "Differentiating Malicious DDoS attack traffic from normal TCP flows by proactive tests," IEEE Communications Letters, vol. 10, no. 11, pp. 793-795, 2006.
-
(2006)
IEEE Communications Letters
, vol.10
, Issue.11
, pp. 793-795
-
-
Gao, Z.-Q.1
Ansari, N.2
-
16
-
-
2442583303
-
The LoSS technique for detecting new Denial of Service attacks
-
W. H. Allen, and G. A. Marin, "The LoSS technique for detecting new Denial of Service attacks " in IEEE Southeast Conference, 2004, pp. 302-309.
-
IEEE Southeast Conference, 2004
, pp. 302-309
-
-
Allen, W.H.1
Marin, G.A.2
-
17
-
-
0028377540
-
On the self-similar nature of Ethernet traffic (extended version)
-
W. E. Leland, M. S. Taqqu, and W. Willinger, "On the self-similar nature of Ethernet traffic (extended version)," IEEE/ACM Transactions on Networking, vol. 2, no. 1, pp. 1-15, 1994.
-
(1994)
IEEE/ACM Transactions on Networking
, vol.2
, Issue.1
, pp. 1-15
-
-
Leland, W.E.1
Taqqu, M.S.2
Willinger, W.3
|