-
2
-
-
11144272176
-
A taxonomy of DDoS attack and DDoS defense mechanisms
-
J. Mirkovic and P. Reiher, "A taxonomy of DDoS attack and DDoS defense mechanisms," SIGCOMM Comput. Commun. Rev., vol. 34, no. 2, pp. 39-53, 2004.
-
(2004)
SIGCOMM Comput. Commun. Rev
, vol.34
, Issue.2
, pp. 39-53
-
-
Mirkovic, J.1
Reiher, P.2
-
5
-
-
84944738739
-
Collaborative intrusion detection system (CIDS): A framework for accurate and efficient IDS
-
Y. Wu, B. Foo, Y. Mei, and S. Bagchi, "Collaborative intrusion detection system (CIDS): a framework for accurate and efficient IDS," in Proc. 19th Annual Computer Security Applications Conference, 2003.
-
(2003)
Proc. 19th Annual Computer Security Applications Conference
-
-
Wu, Y.1
Foo, B.2
Mei, Y.3
Bagchi, S.4
-
7
-
-
51749108669
-
HIDS: Honesty-rate based collaborative intrusion detection system for mobile ad-hoc networks
-
P. Sen, N. Chaki, and R. Chaki, "HIDS: Honesty-rate based collaborative intrusion detection system for mobile ad-hoc networks," Computer Information Systems and Industrial Management Applications. CISIM'08., pp. 121-126, 2008.
-
(2008)
Computer Information Systems and Industrial Management Applications. CISIM'08
, pp. 121-126
-
-
Sen, P.1
Chaki, N.2
Chaki, R.3
-
8
-
-
70350552071
-
Trust management for host-based collaborative intrusion detection
-
C. Fung, O. Baysal, J. Zhang, I. Aib, and R. Boutaba, "Trust management for host-based collaborative intrusion detection," in 19th IFIP/IEEE International Workshop on Distributed Systems, 2008.
-
(2008)
19th IFIP/IEEE International Workshop on Distributed Systems
-
-
Fung, C.1
Baysal, O.2
Zhang, J.3
Aib, I.4
Boutaba, R.5
-
9
-
-
84890372682
-
A trust-aware, P2P-based overlay for intrusion detection
-
C. Duma, M. Karresand, N. Shahmehri, and G. Caronni, "A trust-aware, P2P-based overlay for intrusion detection," in DEXA Workshops, 2006.
-
(2006)
DEXA Workshops
-
-
Duma, C.1
Karresand, M.2
Shahmehri, N.3
Caronni, G.4
-
10
-
-
70449403415
-
Robust and scalable trust management for collaborative intrusion detection
-
C. Fung, J. Zhang, I. Aib, and R. Boutaba, "Robust and scalable trust management for collaborative intrusion detection," in 11th IFIP/IEEE International Symposium on Integrated Network Management (IM09), 2009.
-
(2009)
11th IFIP/IEEE International Symposium on Integrated Network Management (IM09
-
-
Fung, C.1
Zhang, J.2
Aib, I.3
Boutaba, R.4
-
11
-
-
0026260718
-
Optimal decentralized flow control of Markovian queueing networks with multiple controllers
-
M. Hsiao and A. Lazar, "Optimal decentralized flow control of Markovian queueing networks with multiple controllers," Performance Evaluation, vol. 13, no. 3, pp. 181-204, 1991.
-
(1991)
Performance Evaluation
, vol.13
, Issue.3
, pp. 181-204
-
-
Hsiao, M.1
Lazar, A.2
-
12
-
-
84976754886
-
On the existence of equilibria in noncooperative optimal flow control
-
Y. Korilis and A. Lazar, "On the existence of equilibria in noncooperative optimal flow control," J. ACM (JACM), vol. 42, no. 3, pp. 584-613, 1995.
-
(1995)
J. ACM JACM
, vol.42
, Issue.3
, pp. 584-613
-
-
Korilis, Y.1
Lazar, A.2
-
13
-
-
8344233542
-
A game theoretic approach to provide incentive and service differentiation in P2P networks
-
R. Ma, S. Lee, J. Lui, and D. Yau, "A game theoretic approach to provide incentive and service differentiation in P2P networks," in Sigmetrics/Performance, 2004.
-
(2004)
Sigmetrics/Performance
-
-
Ma, R.1
Lee, S.2
Lui, J.3
Yau, D.4
-
15
-
-
24644452689
-
Resource allocation in peer-to-peer networks - An excess-based economic model
-
C. Grothoff, "An excess-based economic model for resource allocation in peer-to-peer networks," Wirtschaftsinformatik, vol. 45, no. 3, pp. 285-292, 2003. (Pubitemid 41269919)
-
(2003)
Wirtschaftsinformatik
, vol.45
, Issue.3
, pp. 285-292
-
-
Grothoff, C.1
-
17
-
-
84870268904
-
Indices of power in optimal ids default configuration: Theory and examples
-
GameSec College Park, MD, USA., November 2011
-
, "Indices of power in optimal ids default configuration: theory and examples," in Proc. 2nd Conference on Decision and Game Theory for Security (GameSec 2011), College Park, MD, USA., November 2011.
-
(2011)
Proc. 2nd Conference on Decision and Game Theory for Security
-
-
-
18
-
-
70349998576
-
A Bayesian game approach for intrusion detection in wireless ad hoc networks
-
October
-
H. M. Y. Liu, C. Comaniciu, "A Bayesian game approach for intrusion detection in wireless ad hoc networks," Valuetools, October 2006.
-
(2006)
Valuetools
-
-
Liu, H.M.Y.1
Comaniciu, C.2
-
19
-
-
70349977426
-
A game-theoretical approach to incentive design in collaborative intrusion detection networks
-
Q. Zhu, C. Fung, R. Boutaba, and T. Başar, "A game-theoretical approach to incentive design in collaborative intrusion detection networks," in International Conference on Game Theory for Networks (GameNets 09), 2009.
-
(2009)
International Conference on Game Theory for Networks (Game Nets 09)
-
-
Zhu, Q.1
Fung, C.2
Boutaba, R.3
Başar, T.4
-
20
-
-
79958778609
-
Dirichlet-based trust management for effective collaborative intrusion detection networks
-
C. Fung, J. Zhang, I. Aib, and R. Boutaba, "Dirichlet-based trust management for effective collaborative intrusion detection networks," IEEE Trans. Network Service Management (TNSM), vol. 8, no. 2, pp. 79-91, 2011.
-
(2011)
IEEE Trans. Network Service Management (TNSM
, vol.8
, Issue.2
, pp. 79-91
-
-
Fung, C.1
Zhang, J.2
Aib, I.3
Boutaba, R.4
-
22
-
-
0034297878
-
Fair end-to-end window-based congestion control
-
DOI 10.1109/90.879343
-
J. Mo and J. Walrand, "Fair end-to-end window-based congestion control," IEEE/ACM Trans. Netw. (ToN), vol. 8, no. 5, pp. 556-567, 2000. (Pubitemid 32017921)
-
(2000)
IEEE/ACM Transactions on Networking
, vol.8
, Issue.5
, pp. 556-567
-
-
Mo, J.1
Walrand, J.2
-
24
-
-
56849108998
-
End-to-end DWDM optical link powercontrol via a Stackelberg revenue-maximizing model
-
Nov [Online]. Available
-
Q. Zhu and L. Pavel, "End-to-end DWDM optical link powercontrol via a Stackelberg revenue-maximizing model," Int. J. Netw. Manag., vol. 18, no. 6, pp. 505-520, Nov. 2008. [Online]. Available: http://dx.doi.org/10.1002/nem. 705
-
(2008)
Int. J. Netw. Manag
, vol.18
, Issue.6
, pp. 505-520
-
-
Zhu, Q.1
Pavel, L.2
-
25
-
-
70350407186
-
Enabling osnr service differentiation using generalized model in optical networks
-
September
-
, "Enabling osnr service differentiation using generalized model in optical networks," IEEE Transactions on Communications, vol. 57, no. 9, pp. 2570-2575, September 2009.
-
(2009)
IEEE Transactions on Communications
, vol.57
, Issue.9
, pp. 2570-2575
-
-
-
27
-
-
0343270138
-
Network optimization: Continuous and discrete models
-
D. Bertsekas, Network Optimization: Continuous and Discrete Models. Athena Scientific, 1998.
-
(1998)
Athena Scientific
-
-
Bertsekas, D.1
-
30
-
-
0003239419
-
Nonnegative matrices in mathematical sciences
-
A. Berman and R. Plemmons, Nonnegative Matrices in Mathematical Sciences. SIAM, 1994.
-
(1994)
SIAM
-
-
Berman, A.1
Plemmons, R.2
-
31
-
-
33646405444
-
Free-riding and whitewashing in peer-to-peer systems
-
M. Feldman, C. Papadimitriou, J. Chuang, and I. Stoica, "Free-riding and whitewashing in peer-to-peer systems," IEEE J. Sel. Areas Commun., vol. 24, no. 5, pp. 1010-1019, 2006.
-
(2006)
IEEE J. Sel. Areas Commun
, vol.24
, Issue.5
, pp. 1010-1019
-
-
Feldman, M.1
Papadimitriou, C.2
Chuang, J.3
Stoica, I.4
-
32
-
-
0002886905
-
Takeover bids, the free-rider problem, and the theory of the corporation
-
S. Grossman and O. Hart, "Takeover bids, the free-rider problem, and the theory of the corporation," The Bell Journal of Economics, pp. 42-64, 1980.
-
(1980)
The Bell Journal of Economics
, pp. 42-64
-
-
Grossman, S.1
Hart, O.2
-
33
-
-
33745205813
-
Inferring internet denial-of-service activity
-
D. Moore, C. Shannon, D. Brown, G. Voelker, and S. Savage, "Inferring internet denial-of-service activity," ACM Trans. Computer Systems (TOCS), vol. 24, no. 2, pp. 115-139, 2006.
-
(2006)
ACM Trans. Computer Systems (TOCS)
, vol.24
, Issue.2
, pp. 115-139
-
-
Moore, D.1
Shannon, C.2
Brown, D.3
Voelker, G.4
Savage, S.5
|