-
5
-
-
76949106169
-
A puzzle-based defence strategy against flooding attacks using game theory
-
Fallah M. A puzzle-based defence strategy against flooding attacks using game theory. IEEE Transactions on Dependable and Secure Computing 2010;7:5-19.
-
(2010)
IEEE Transactions on Dependable and Secure Computing
, vol.7
, pp. 5-19
-
-
Fallah, M.1
-
8
-
-
41149118889
-
Best practices for data centers: Lessons learned from benchmarking 22 data centers
-
In: CA. ACEEE, August 3
-
Greenberg S, Mills E, Tschudi B, Rumsey P, Myatt B. Best practices for data centers: lessons learned from benchmarking 22 data centers. In: Proceedings of the ACEEE Summer study on energy efficiency in buildings in Asilomar, CA. ACEEE, August 3 2006. p. 76-87.
-
(2006)
Proceedings of the ACEEE Summer Study on Energy Efficiency in Buildings in Asilomar
, pp. 76-87
-
-
Greenberg, S.1
Mills, E.2
Tschudi, B.3
Rumsey, P.4
Myatt, B.5
-
11
-
-
78049354490
-
An insider threat prediction model
-
In: of LNCS
-
Kandias M, Mylonas A, Virvilis N, Theoharidou M, Gritzalis D. An insider threat prediction model. In: 7th International conference on trust, privacy, and security in digital business (TrustBuse2010), vol. 6264 of LNCS. p. 26-37.
-
7th International Conference on Trust, Privacy, and Security in Digital Business (TrustBuse2010)
, vol.6264
, pp. 26-37
-
-
Kandias, M.1
Mylonas, A.2
Virvilis, N.3
Theoharidou, M.4
Gritzalis, D.5
-
13
-
-
72849128241
-
A game theoretic approach to decision and analysis in strategies of attack and defence
-
In: Washington, DC, USA: IEEE Computer Society
-
Lin JC, Chen JM, Chen CC, Chien YS. A game theoretic approach to decision and analysis in strategies of attack and defence. In: Proceedings of the 2009 third IEEE international conference on secure software integration and reliability improvement, SSIRI '09. Washington, DC, USA: IEEE Computer Society; 2009. p. 75-81.
-
(2009)
Proceedings of the 2009 Third IEEE International Conference on Secure Software Integration and Reliability Improvement, SSIRI '09
, pp. 75-81
-
-
Lin, J.C.1
Chen, J.M.2
Chen, C.C.3
Chien, Y.S.4
-
14
-
-
40949085740
-
Sip vulnerabilities and anti-spit mechanisms assessment
-
In: IEEE Press
-
Marias J, Dritsas S, Theoharidou M, Mallios J, Gritzalis D. Sip vulnerabilities and anti-spit mechanisms assessment. In: 16th IEEE international conference on computer communications and networks (IC3N '07). IEEE Press; 2007. p. 597-604.
-
(2007)
16th IEEE International Conference on Computer Communications and Networks (IC3N '07)
, pp. 597-604
-
-
Marias, J.1
Dritsas, S.2
Theoharidou, M.3
Mallios, J.4
Gritzalis, D.5
-
17
-
-
0036395373
-
A framework for understanding and predicting insider attacks
-
Schultz E. A framework for understanding and predicting insider attacks. Computers & Security 2002;21:526-31.
-
(2002)
Computers & Security
, vol.21
, pp. 526-531
-
-
Schultz, E.1
-
20
-
-
33750366503
-
DDoS defence by offence
-
In: New York, NY, USA: ACM
-
Walfish M, Vutukuru M, Balakrishnan H, Karger D, Shenker S. DDoS defence by offence. In: Proceedings of the 2006 conference on applications, technologies, architectures, and protocols for computer communications, SIGCOMM '06. New York, NY, USA: ACM; 2006. p. 303-14.
-
(2006)
Proceedings of the 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, SIGCOMM '06
, pp. 303-314
-
-
Walfish, M.1
Vutukuru, M.2
Balakrishnan, H.3
Karger, D.4
Shenker, S.5
-
21
-
-
78650626363
-
On modeling and simulation of game theory-based defence mechanisms against DoS and DDoS attacks
-
In: San Diego, CA, USA: Society for Computer Simulation International; 8
-
Wu Q, Shiva S, Roy S, Ellis C, Datla V. On modeling and simulation of game theory-based defence mechanisms against DoS and DDoS attacks. In: Proceedings of the 2010 spring simulation multiconference, Spring Sim'10. San Diego, CA, USA: Society for Computer Simulation International; 2010 159:1-159:8.
-
(2010)
Proceedings of the 2010 Spring Simulation Multiconference, Spring Sim'10
, vol.159
, pp. 1-159
-
-
Wu, Q.1
Shiva, S.2
Roy, S.3
Ellis, C.4
Datla, V.5
|