-
2
-
-
15944370066
-
A game based analysis of the client puzzle approach to defend against DoS attacks
-
B. Bencsath, I. Vajda, and L. Buttyan. A game based analysis of the client puzzle approach to defend against DoS attacks. In Proceedings of the 2003 International Conference on Software, Telecommunications and Computer Networks, pages 763-767, 2003.
-
(2003)
Proceedings of the 2003 International Conference on Software, Telecommunications and Computer Networks
, pp. 763-767
-
-
Bencsath, B.1
Vajda, I.2
Buttyan, L.3
-
4
-
-
84857094491
-
It's all about the Benjamins: An empirical study on incentivizing users to ignore security advice
-
Saint Lucia, February
-
N. Christin, S. Egelman, T. Vidas, and J. Grossklags. It's all about the Benjamins: An empirical study on incentivizing users to ignore security advice. In Proceedings of IFCA Financial Cryptography'11, pages 16-30, Saint Lucia, February 2011.
-
(2011)
Proceedings of IFCA Financial Cryptography'11
, pp. 16-30
-
-
Christin, N.1
Egelman, S.2
Vidas, T.3
Grossklags, J.4
-
5
-
-
84870641116
-
-
http://edition.cnn.com/2008/TECH/04/18/cnn.websites/.
-
-
-
-
6
-
-
76949106169
-
A puzzle-based defense strategy against ooding attacks using game theory
-
January
-
M. Fallah. A puzzle-based defense strategy against ooding attacks using game theory. IEEE Transactions on Dependable And Secure Computing, 7:5-19, January 2010.
-
(2010)
IEEE Transactions on Dependable and Secure Computing
, vol.7
, pp. 5-19
-
-
Fallah, M.1
-
10
-
-
84885609375
-
Game theoretic modeling of pilot behavior during mid-air encounters
-
Springer
-
R. Lee and D. Wolpert. Game theoretic modeling of pilot behavior during mid-air encounters. In Decision Making with Imperfect Decision Makers, pages 75-111. Springer, 2012.
-
(2012)
Decision Making with Imperfect Decision Makers
, pp. 75-111
-
-
Lee, R.1
Wolpert, D.2
-
12
-
-
4544272175
-
Controlling high bandwidth aggregates in the network
-
July
-
R. Mahajan, S. M. Bellovin, S. Floyd, J. Ioannidis, V. Paxson, and S. Shenker. Controlling high bandwidth aggregates in the network. ACM SIGCOMM Computer Communication Review, 32:62-73, July 2002.
-
(2002)
ACM SIGCOMM Computer Communication Review
, vol.32
, pp. 62-73
-
-
Mahajan, R.1
Bellovin, S.M.2
Floyd, S.3
Ioannidis, J.4
Paxson, V.5
Shenker, S.6
-
13
-
-
84869475501
-
Game theory meets network security
-
Submitted to
-
M. H. Manshaei, Q. Zhu, T. Alpcan, T. Basar, and J.-P. Hubaux. Game theory meets network security, 2010. Submitted to ACM Survey.
-
(2010)
ACM Survey
-
-
Manshaei, M.H.1
Zhu, Q.2
Alpcan, T.3
Basar, T.4
Hubaux, J.-P.5
-
15
-
-
84869463698
-
DDoS benchmarks and experimenter's workbench for the deter testbed
-
May
-
J. Mirkovic, S. Wei, A. Hussain, B. Wilson, R. Thomas, S. Schwab, S. Fahmy, R. Chertov, and P. Reiner. DDoS benchmarks and experimenter's workbench for the deter testbed. In Proceedings of the 3rd International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TridentCom'07), pages 1-7, May 2007.
-
(2007)
Proceedings of the 3rd International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TridentCom'07)
, pp. 1-7
-
-
Mirkovic, J.1
Wei, S.2
Hussain, A.3
Wilson, B.4
Thomas, R.5
Schwab, S.6
Fahmy, S.7
Chertov, R.8
Reiner, P.9
-
16
-
-
0001527412
-
Unraveling in guessing games: An experimental study
-
December
-
R. Nagel. Unraveling in guessing games: An experimental study. American Economic Review, 85(5):1313-26, December 1995.
-
(1995)
American Economic Review
, vol.85
, Issue.5
, pp. 1313-1326
-
-
Nagel, R.1
-
17
-
-
34147099073
-
Survey of network-based defense mechanisms countering the DoS and DDoS problems
-
April
-
T. Peng, C. Leckie, and K. Ramamohanarao. Survey of network-based defense mechanisms countering the DoS and DDoS problems. ACM Computing Surveys, 39, April 2007.
-
(2007)
ACM Computing Surveys
, vol.39
-
-
Peng, T.1
Leckie, C.2
Ramamohanarao, K.3
-
18
-
-
77951729734
-
A survey of game theory as applied to network security
-
S. Roy, C. Ellis, S. Shiva, D. Dasgupta, V. Shandilya, and Q. Wu. A survey of game theory as applied to network security. In Proceedings of the 2010 43rd Hawaii International Conference on System Sciences, pages 1-10, 2010.
-
(2010)
Proceedings of the 2010 43rd Hawaii International Conference on System Sciences
, pp. 1-10
-
-
Roy, S.1
Ellis, C.2
Shiva, S.3
Dasgupta, D.4
Shandilya, V.5
Wu, Q.6
-
19
-
-
85016512262
-
A distributed denial of service testbed
-
Jacques Berleur, Magda Hercheui, and Lorenz Hilty, editors, volume 328 of IFIP Advances in Information and Communication Technology. Springer Boston
-
D. Schmidt, S. Suriadi, A. Tickle, A. Clark, G. Mohay, E. Ahmed, and J. Mackie. A distributed denial of service testbed. In Jacques Berleur, Magda Hercheui, and Lorenz Hilty, editors, What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience, volume 328 of IFIP Advances in Information and Communication Technology. Springer Boston, 2010.
-
(2010)
What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience
-
-
Schmidt, D.1
Suriadi, S.2
Tickle, A.3
Clark, A.4
Mohay, G.5
Ahmed, E.6
MacKie, J.7
-
21
-
-
58149433367
-
Rational choice and the structure of the environment
-
H. A. Simon. Rational choice and the structure of the environment. Psychological Review, 63(2):129-138, 1956.
-
(1956)
Psychological Review
, vol.63
, Issue.2
, pp. 129-138
-
-
Simon, H.A.1
-
23
-
-
84870637270
-
-
http://www.sans.org/security-resources/malwarefaq/stacheldraht.php.
-
-
-
-
24
-
-
0032182533
-
Latency-rate servers: A general model for analysis of traffic scheduling algorithms
-
October
-
D. Stiliadis and A. Varma. Latency-rate servers: a general model for analysis of traffic scheduling algorithms. IEEE/ACM Transactions on Networking, 6(5):611-624, October 1998.
-
(1998)
IEEE/ACM Transactions on Networking
, vol.6
, Issue.5
, pp. 611-624
-
-
Stiliadis, D.1
Varma, A.2
-
25
-
-
84870650284
-
-
http://www.internetnews.com/security/article.php/3933046/ How+Much+Does+a+DDoS+Attack+Cost.htm.
-
-
-
-
26
-
-
84870649107
-
-
http://www.pcmag.com/article2/0,2817,2374063,00.asp.
-
-
-
-
27
-
-
78650626363
-
On modeling and simulation of game theory-based defense mechanisms against DoS and DDoS attacks
-
ACM
-
Q. Wu, S. Shiva, S. Roy, C. Ellis, and V. Datla. On modeling and simulation of game theory-based defense mechanisms against DoS and DDoS attacks. In Proceedings of the 2010 Spring Simulation Multiconference, SpringSim '10, pages 159:1-159:8. ACM, 2010.
-
(2010)
Proceedings of the 2010 Spring Simulation Multiconference, SpringSim '10
, pp. 1591-1598
-
-
Wu, Q.1
Shiva, S.2
Roy, S.3
Ellis, C.4
Datla, V.5
-
28
-
-
0037328484
-
Sustaining availability of web services under distributed denial of service attacks
-
feb
-
J. Xu and W. Lee. Sustaining availability of web services under distributed denial of service attacks. IEEE Transactions on Computers, 52(2):195-208, feb. 2003.
-
(2003)
IEEE Transactions on Computers
, vol.52
, Issue.2
, pp. 195-208
-
-
Xu, J.1
Lee, W.2
-
29
-
-
84870639079
-
-
http://news.cnet.com/2100-1023-236621.html.
-
-
-
-
31
-
-
84869471527
-
How resilient is the Internet against DDoS attacks? - A game theoretic analysis of signature-based rate limiting
-
December
-
W. Zang, P. Liu, and M. Yu. How resilient is the Internet against DDoS attacks? - a game theoretic analysis of signature-based rate limiting. International Journal of Intelligent Control and Systems, 12(4):307-316, December 2007.
-
(2007)
International Journal of Intelligent Control and Systems
, vol.12
, Issue.4
, pp. 307-316
-
-
Zang, W.1
Liu, P.2
Yu, M.3
|