-
1
-
-
84888352739
-
-
Department of Energy Computer Incident Advisory Capability (CIAC), UCRL-ID-136939, Rev. 1., Lawrence Livermore National Laboratory, February 14
-
P. J. Criscuolo, Distributed Denial of Service, Tribe Flood Network 2000, and Stacheldraht CIAC-2319, Department of Energy Computer Incident Advisory Capability (CIAC), UCRL-ID-136939, Rev. 1., Lawrence Livermore National Laboratory, February 14, 2000.
-
(2000)
Distributed Denial of Service, Tribe Flood Network 2000, and Stacheldraht CIAC-2319
-
-
Criscuolo, P.J.1
-
2
-
-
11144272176
-
A taxonomy of DDoS attack and DDoS defense mechanisms
-
April
-
J. Mirkovic and P. Reiher, A taxonomy of DDoS attack and DDoS defense mechanisms, ACM SIGCOMM Computer Communications Review, vol. 34, no. 2, pp. 39-53, April 2004.
-
(2004)
ACM SIGCOMM Computer Communications Review
, vol.34
, Issue.2
, pp. 39-53
-
-
Mirkovic, J.1
Reiher, P.2
-
3
-
-
33845591142
-
-
IEEE INFOCOM'06
-
S. Ranjan, R. Swaminathan, M. Uysal, and E. Knightly, DDoS-Resilient Scheduling to Counter Application Layer Attacks under Imperfect Detection, IEEE INFOCOM'06, 2006.
-
(2006)
DDoS-Resilient Scheduling to Counter Application Layer Attacks under Imperfect Detection
-
-
Ranjan, S.1
Swaminathan, R.2
Uysal, M.3
Knightly, E.4
-
4
-
-
0036804084
-
Defending against flooding-based distributed denial-of-service attacks: A tutorial
-
DOI 10.1109/MCOM.2002.1039856
-
R. K. C. Chang, Defending against flooding-based distributed denial of service attacks: A tutorial, Computer J. IEEE Commun. Magazine, Vol. 40, no. 10, pp. 42-51, 2002. (Pubitemid 35311945)
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.10
, pp. 42-51
-
-
Chang, R.K.C.1
-
5
-
-
24644463025
-
-
Aug. 08
-
R. Puri, Bots and Botnet-an overview, Aug. 08, 2003, [online] http://www.giac.org/practical/GSEC/Ramneek Puri GSEC.eps
-
(2003)
Bots and Botnet-An Overview
-
-
Puri, R.1
-
6
-
-
8344239868
-
-
Feb. 18
-
B. Todd, Distributed Denial of Service Attacks, Feb. 18, 2000, [online] http://www.linuxsecurity.com/resource files/intrusion detection/ddos-whitepaper. html
-
(2000)
Distributed Denial of Service Attacks
-
-
Todd, B.1
-
7
-
-
84888344992
-
-
CERT, Denial of Service Attacks, June 4
-
CERT, Denial of Service Attacks, June 4, 2001, [online] http://www.cert.org/tech tips/denial of service.html
-
(2001)
-
-
-
8
-
-
70449412215
-
Botnet: Classification, attacks, detection, tracing, and preventive measures
-
Article ID 692654
-
J. Liu, Y. Xiao, K. Ghaboosi, H. Deng, and J. Zhang, Botnet: Classification, Attacks, Detection, Tracing, and Preventive Measures, EURASIP J. Wireless Communications and Networking, vol. 2009, Article ID 692654, 11 pages, 2009.
-
(2009)
EURASIP J. Wireless Communications and Networking
, vol.2009
, pp. 11
-
-
Liu, J.1
Xiao, Y.2
Ghaboosi, K.3
Deng, H.4
Zhang, J.5
-
9
-
-
84888326668
-
-
Yahoo on Trail of Site Hackers, Wired.com, Feb. 8
-
Yahoo on Trail of Site Hackers, Wired.com, Feb. 8, 2000, [online] http://www.wired.com/news/business/0,1367,34221,00.html
-
(2000)
-
-
-
10
-
-
84888327858
-
-
Powerful Attack Cripples Internet, Oct. 23
-
Powerful Attack Cripples Internet, Oct. 23, 2002, [online] http://www.greenspun.com/bboard/q-and-a-fetch-msg.tcl?msg id=00A7G7
-
(2002)
-
-
-
11
-
-
84888333857
-
-
Mydoom lesson: Take proactive steps to prevent DDoS attacks, Feb. 6
-
Mydoom lesson: Take proactive steps to prevent DDoS attacks, Feb. 6, 2004, [online] http://www.computerworld.com/s/article/89932/Mydoom lesson Take proactive steps to prevent DDoS attacks?taxonomyId=017
-
(2004)
-
-
-
12
-
-
84888327455
-
-
Lazy Hacker and Little Worm Set Off Cyberwar Frenzy, July 8
-
Lazy Hacker and Little Worm Set Off Cyberwar Frenzy, July 8, 2009, [online] http://www.wired.com/threatlevel/2009/07/mydoom/
-
(2009)
-
-
-
13
-
-
84888352663
-
-
New "cyber attacks" hit S Korea, July 9
-
New "cyber attacks" hit S Korea, July 9, 2009, [online] http://news.bbc.co.uk/2/hi/asia-pacific/8142282.stm
-
(2009)
-
-
-
18
-
-
84888376408
-
-
Prolexic Technologies
-
Prolexic Technologies, [online] http://www.prolexic.com/index.php knowledge-center/frequently-asked-questions/index.html
-
-
-
-
19
-
-
0036605066
-
Defending wireless infrastructure against the challenge of DDoS attacks
-
DOI 10.1023/A:1014526713037, Mobile Commerce: Applications and Technologies
-
X. Geng, Y. Huang, and A. B. Whinston, Defending wireless infrastructure against the challenge of DDoS attacks, Mobile Networks and Applications, vol. 7, no. 3, pp. 213-223, 2002. (Pubitemid 34414752)
-
(2002)
Mobile Networks and Applications
, vol.7
, Issue.3
, pp. 213-223
-
-
Geng, X.1
Huang, Y.2
Whinston, A.B.3
-
21
-
-
84888313390
-
-
in Telecommunications Policy Research Conference, Arlington VA
-
S. T. Zargar, M. B. H. Weiss, C. E. Caicedo, and J. B. D. Joshi, Security in Dynamic Spectrum Access Systems: A Survey, in Telecommunications Policy Research Conference, Arlington VA, 2009.
-
(2009)
Security in Dynamic Spectrum Access Systems: A Survey
-
-
Zargar, S.T.1
Weiss, M.B.H.2
Caicedo, C.E.3
Joshi, J.B.D.4
-
22
-
-
70350389209
-
Blue versus red: Towards a model of distributed security attacks
-
Roger Dingledine and Philippe Golle (Eds.). Lecture Notes in Computer Science, Springer-Verlag, Berlin, Heidelberg.
-
N. Fultz, and J. Grossklags, Blue versus Red: Towards a Model of Distributed Security Attacks, In Financial Cryptography and Data Security, Roger Dingledine and Philippe Golle (Eds.). Lecture Notes in Computer Science, vol. 5628, Springer-Verlag, pp. 167-183, 2009, Berlin, Heidelberg.
-
(2009)
Financial Cryptography and Data Security
, vol.5628
, pp. 167-183
-
-
Fultz, N.1
Grossklags, J.2
-
24
-
-
84888316221
-
-
[online] http://isc.sans.edu/diary.html?storyid=6622
-
-
-
-
25
-
-
84888367910
-
-
[online] http://techcrunch.com/2010/11/28/wikileaks-ddos-attack/
-
-
-
-
26
-
-
84888348782
-
-
[online] http://www.sbsun.com/ci 21392063/us-general-we-hacked-enemy- afghanistan
-
-
-
-
27
-
-
84888343743
-
-
[online] http://www.gideonrasmussen.com/article-14.html
-
-
-
-
28
-
-
84888340943
-
-
[online] http://online.wsj.com/article/SB123914805204099085.html
-
-
-
-
29
-
-
16644384919
-
Incentive-based modeling and inference of attacker intent, objectives, and strategies
-
DOI 10.1145/1053283.1053288
-
P. Liu, W. Zang, and M. Yu, Incentive-based modeling and inference of attacker intent, objectives, and strategies, ACM Trans. Inf. Syst. Secur. vol. 8, no. 1, pp. 78-118, February 2005. (Pubitemid 40479430)
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.1
, pp. 78-118
-
-
Liu, P.1
Zang, W.2
Yu, M.3
-
31
-
-
10644248262
-
Characterization of defense mechanisms against distributed denial of service attacks
-
December
-
L. C. Chen, T. A. Longstaff, and K. M. Carley, Characterization of defense mechanisms against distributed denial of service attacks, Computers & Security, vol. 23, no. 8, pp. 665-678, December 2004.
-
(2004)
Computers & Security
, vol.23
, Issue.8
, pp. 665-678
-
-
Chen, L.C.1
Longstaff, T.A.2
Carley, K.M.3
-
32
-
-
34147099073
-
Survey of network-based defense mechanisms countering the DoS and DDoS problems
-
Article 3, April
-
T. Peng, C. Leckie, and K. Ramamohanarao, Survey of network-based defense mechanisms countering the DoS and DDoS problems, ACM Comput. Surv. 39, 1, Article 3, April 2007.
-
(2007)
ACM Comput. Surv.
, vol.39
, Issue.1
-
-
Peng, T.1
Leckie, C.2
Ramamohanarao, K.3
-
33
-
-
33749377422
-
A comprehensive categorization of DDoS attack and DDoS defense techniques
-
Advanced Data Mining and Applications - Second International Conference, ADMA 2006, Proceedings
-
U. Tariq, M. Hong, and K. Lhee, A Comprehensive Categorization of DDoS Attack and DDoS Defense Techniques, ADMA LNAI 4093, pp. 1025-1036, 2006. (Pubitemid 44503248)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4093
, pp. 1025-1036
-
-
Tariq, U.1
Hong, M.2
Lhee, K.-S.3
-
34
-
-
85132972574
-
Distributed denial of service: Taxonomies of attacks
-
S. M. Specht, and R. B. Lee, Distributed Denial of Service: Taxonomies of Attacks, Tools and Countermeasures, in Proc. 17th International Conference on Parallel and Distributed Computing Systems, pp.543-550, 2004.
-
(2004)
Tools and Countermeasures, in Proc. 17th International Conference on Parallel and Distributed Computing Systems
, pp. 543-550
-
-
Specht, S.M.1
Lee, R.B.2
-
35
-
-
84888365849
-
-
RioRey, Inc. 2009-2012, RioRey Taxonomy of DDoS Attacks, RioReyTaxonomy Rev 2.3 2012, 2012
-
RioRey, Inc. 2009-2012, RioRey Taxonomy of DDoS Attacks, RioReyTaxonomy Rev 2.3 2012, 2012. [online] http://www.riorey.com/x-resources/2012/RioRey Taxonomy DDoS Attacks 2012.eps
-
-
-
-
36
-
-
1242321281
-
DDoS attacks and defense mechanisms: Classification and state-of-Tfhe-art
-
April
-
C. Douligeris, and A. Mitrokotsa, DDoS attacks and defense mechanisms: classification and state-of-the-art, Computer Networks, Vol. 44, No. 5, pp. 643-666, April 2004.
-
(2004)
Computer Networks
, vol.44
, Issue.5
, pp. 643-666
-
-
Douligeris, C.1
Mitrokotsa, A.2
-
37
-
-
61449207953
-
DDoS-shield: Ddos-resilient scheduling to counter application layer attacks
-
February
-
S. Ranjan, R. Swaminathan, M. Uysal, A. Nucci, and E. Knightly, DDoS-Shield: DDoS-Resilient Scheduling to Counter Application Layer attacks, IEEE/ACM Trans. Netw., Vol. 17, No. 1, pp. 2639, February 2009.
-
(2009)
IEEE/ACM Trans. Netw.
, vol.17
, Issue.1
, pp. 2639
-
-
Ranjan, S.1
Swaminathan, R.2
Uysal, M.3
Nucci, A.4
Knightly, E.5
-
38
-
-
84888332255
-
-
Arbor Application Brief: The Growing Threat of Application-Layer DDoS Attacks, Arbor Networks, Feb. 28
-
Arbor Application Brief: The Growing Threat of Application-Layer DDoS Attacks, Arbor Networks, Feb. 28, 2011, [online] http://www.arbornetworks.com/ component/docman/doc download/467-the-growing-threat-of-application-layer-ddos- attacks?Itemid=442.
-
(2011)
-
-
-
40
-
-
84888344007
-
-
ha.ckers.org, Slowloris HTTP DoS, Retrieved Oct. 19
-
ha.ckers.org, Slowloris HTTP DoS, Retrieved Oct. 19, 2012, [online] http://ha.ckers.org/slowloris/
-
(2012)
-
-
-
44
-
-
84872569785
-
Botnet-based distributed denial of service (ddos) attacks on web servers: Classification and art
-
Jul.
-
E. Alomari, S. Manickam, B. B. Gupta, S. Karuppayah, and R. Alfaris, Botnet-based Distributed Denial of Service (DDoS) Attacks on Web Servers: Classification and Art, International Journal of Computer Applications, Vol. 49, no. 7, pp. 24-32, Jul., 2012.
-
(2012)
International Journal of Computer Applications
, vol.49
, Issue.7
, pp. 24-32
-
-
Alomari, E.1
Manickam, S.2
Gupta, B.B.3
Karuppayah, S.4
Alfaris, R.5
-
45
-
-
84888309586
-
-
April
-
J. Lo et al., An IRC Tutorial, April, 2003, irchelp.com 1997, [online] http://www.irchelp.org/irchelp/irctutorial.html#part1.
-
(2003)
An IRC Tutorial
-
-
Lo, J.1
-
46
-
-
1242327641
-
Trinity v3, a DDoS tool, hits the streets
-
Nov.
-
B. Hancock, Trinity v3, a DDoS tool, hits the streets, Computers & Security, Vol. 19, no. 7, pp. 574-574, Nov., 2000.
-
(2000)
Computers & Security
, vol.19
, Issue.7
, pp. 574-574
-
-
Hancock, B.1
-
47
-
-
84888360917
-
-
Bysin, knight.c sourcecode
-
Bysin, knight.c sourcecode, 2001, [online] http://packetstormsecurity. org/distributed/knight.c.
-
(2001)
-
-
-
48
-
-
84888351498
-
-
team-cymru Inc., A Taste of HTTP Botnets, July
-
team-cymru Inc., A Taste of HTTP Botnets, July, 2008, [online] http://www.team-cymru.com/ReadingRoom/Whitepapers/2008/httpbotnets. eps
-
(2008)
-
-
-
49
-
-
51949113131
-
-
Arbor Networks
-
J. Nazario, BlackEnergy DDoS Bot Analysis, Arbor Networks, 2007, [online] http://atlas-public.ec2.arbor.net/docs/BlackEnergy+DDoS+Bot+ Analysis.eps
-
(2007)
BlackEnergy DDoS Bot Analysis
-
-
Nazario, J.1
-
50
-
-
84888370392
-
-
Praetox Technologies Low Orbit Ion Cannon
-
Praetox Technologies Low Orbit Ion Cannon, 2010, [online] https://github.com/NewEraCracker/LOIC/
-
(2010)
-
-
-
53
-
-
84888351985
-
-
[online] http://infosecisland.com/blogview/12395-DDoS-Attack-Utilizes- Self-Destructing-Botnet.html
-
-
-
-
54
-
-
84888319451
-
-
Cisco, IPS 7.0 Global Correlation
-
Cisco, IPS 7.0 Global Correlation, 2009, [online] http://www.cisco.com/ en/US/docs/security/ips/7.0/configuration /guide/ime/ime collaboration.html
-
(2009)
-
-
-
58
-
-
84904888755
-
Attacking ddos at the source
-
Washington DC, USA
-
J. Mirkovic, G. Prier, and P. Reiher, Attacking DDoS at the Source, in Proc. 10th IEEE International Conference on Network Protocols (ICNP '02), Washington DC, USA, 2002.
-
(2002)
Proc. 10th IEEE International Conference on Network Protocols (ICNP '02)
-
-
Mirkovic, J.1
Prier, G.2
Reiher, P.3
-
60
-
-
85084163167
-
MULTOPS: A data-structure for bandwidth attack detection
-
Washington, DC, August 13-17
-
T. M. Gil, and M. Poleto, MULTOPS: a data-structure for bandwidth attack detection, in Proc. 10th Usenix Security Symposium, Washington, DC, pp. 2338, August 13-17, 2001.
-
(2001)
Proc. 10th Usenix Security Symposium
, pp. 2338
-
-
Gil, T.M.1
Poleto, M.2
-
61
-
-
0842332412
-
An efficient filter for denial-of-service bandwidth attacks
-
S. Abdelsayed, D. Glimsholt, C. Leckie, S. Ryan, and S. Shami, An efficient filter for denial-of-service bandwidth attacks, in Proc. 46th IEEE Global Telecommunications Conference (GLOBECOM'03), pp. 13531357, 2003.
-
(2003)
Proc. 46th IEEE Global Telecommunications Conference (GLOBECOM'03)
, pp. 13531357
-
-
Abdelsayed, S.1
Glimsholt, D.2
Leckie, C.3
Ryan, S.4
Shami, S.5
-
62
-
-
84888327781
-
-
Mananet, Reverse Firewall
-
Mananet, Reverse Firewall, [online] http://www.cs3-inc.com/pubs/Reverse FireWall.eps
-
-
-
-
63
-
-
79953890196
-
DDoS: Survey of traceback methods
-
May
-
A. John, and T. Sivakumar, DDoS: Survey of Traceback Methods, International Journal of Recent Trends in Engineering ACEEE (Association of Computer Electronics & Electrical Engineers), vol. 1, no. 2, May 2009.
-
(2009)
International Journal of Recent Trends in Engineering ACEEE (Association of Computer Electronics & Electrical Engineers)
, vol.1
, Issue.2
-
-
John, A.1
Sivakumar, T.2
-
65
-
-
33645822113
-
Novel hybrid schemes employing packet marking and logging for ip traceback
-
May
-
B. Al-Duwairi, and G. Manimaran, Novel Hybrid Schemes Employing Packet Marking and Logging for IP Traceback, IEEE Trans. Parallel Distrib. Syst., vol. 17, no. 5, pp. 403-418, May 2006.
-
(2006)
IEEE Trans. Parallel Distrib. Syst.
, vol.17
, Issue.5
, pp. 403-418
-
-
Al-duwairi, B.1
Manimaran, G.2
-
66
-
-
0005076592
-
-
Technical report, Department of Computer Science and Engineering, University of Washington
-
S. Savage, D. Wetherall, A. Karlin, and T. Anderson, Practical Network Support for IP Traceback, Technical report, Department of Computer Science and Engineering, University of Washington, 2000.
-
(2000)
Practical Network Support for IP Traceback
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
67
-
-
85011016678
-
Tracing anonymous packets to their approximate source
-
New Orleans, USA, Decemeber
-
H. Burch, and B. Cheswick, Tracing anonymous packets to their approximate source, in Proc. USENIX Large Installation Systems Administration Conference, pages 319-327, New Orleans, USA, Decemeber 2000.
-
(2000)
Proc. USENIX Large Installation Systems Administration Conference
, pp. 319-327
-
-
Burch, H.1
Cheswick, B.2
-
68
-
-
0004606473
-
-
in Wired TechnologyNews
-
J. Glave, Smurfing cripples ISPs, in Wired TechnologyNews, 1998, [online] http://www.wired.com/news /news/technology/story/9506.html
-
(1998)
Smurfing Cripples ISPs
-
-
Glave, J.1
-
69
-
-
79952585972
-
DDoS detection and traceback with decision tree and grey relational analysis
-
Y. C. Wu, H. R. Tseng, W. Yang, and R. H. Jan, DDoS detection and traceback with decision tree and grey relational analysis, Int. J. Ad Hoc Ubiquitous Comput., vol. 7, no. 2, pp. 121-136, 2011.
-
(2011)
Int. J. Ad Hoc Ubiquitous Comput.
, vol.7
, Issue.2
, pp. 121-136
-
-
Wu, Y.C.1
Tseng, H.R.2
Yang, W.3
Jan, R.H.4
-
70
-
-
51149105210
-
Proactive detection of distributed denial of service attacks using mib traffic variables - A feasibility study
-
B. Joao, D. Cabrera, and et al., Proactive Detection of Distributed Denial of Service Attacks Using MIB Traffic Variables - A Feasibility Study, Integrated Network Management Proceedings, pp. 609-622, 2001.
-
(2001)
Integrated Network Management Proceedings
, pp. 609-622
-
-
Joao, B.1
Cabrera, D.2
-
71
-
-
24644453625
-
-
ISPEC, Springer-Verlag Berlin Heidelberg
-
R. Jalili, F. ImaniMehr, Detection of Distributed Denial of Service Attacks Using Statistical Pre-Prossesor and Unsupervised Neural Network, ISPEC, Springer-Verlag Berlin Heidelberg, pp.192-203, 2005.
-
(2005)
Detection of Distributed Denial of Service Attacks Using Statistical Pre-Prossesor and Unsupervised Neural Network
, pp. 192-203
-
-
Jalili, R.1
Imanimehr, F.2
-
72
-
-
13944272291
-
-
PDCAT, Springer-Verlag Berlin Heidelberg
-
M. Li, J. Liu, and D. Long, Probability Principle of Reliable Approach to detect signs of DDOS Flood Attacks, PDCAT, Springer-Verlag Berlin Heidelberg, pp.596-599, 2004.
-
(2004)
Probability Principle of Reliable Approach to Detect Signs of DDOS Flood Attacks
, pp. 596-599
-
-
Li, M.1
Liu, J.2
Long, D.3
-
73
-
-
0038729330
-
Protection from distributed denial of service attacks using history-based IP filtering
-
May
-
T. Peng, C. Leckie, and K. Ramamohanarao, Protection from distributed denial of service attacks using history-based IP filtering, ICC '03. May , Vol.1, pp: 482-486, 2003.
-
(2003)
ICC '03
, vol.1
, pp. 482-486
-
-
Peng, T.1
Leckie, C.2
Ramamohanarao, K.3
-
74
-
-
33947503628
-
Defense against spoofed IP traffic using hop-count filtering
-
DOI 10.1109/TNET.2006.890133
-
H. Wang, C. Jin, and K. G. Shin, Defense Against Spoofed IP Traffic Using Hop-Count Filtering, IEEE/ACM Trans. Netw., vol. 15, no. 1, pp.40-53, February 2007. (Pubitemid 46464416)
-
(2007)
IEEE/ACM Transactions on Networking
, vol.15
, Issue.1
, pp. 40-53
-
-
Wang, H.1
Jin, C.2
Shin, K.G.3
-
75
-
-
84875537965
-
-
University of Pittsburgh, Department of Computer Science, Technical Report. TR-11-178, March
-
M. Abliz, Internet Denial of Service Attacks and Defense Mechanisms, University of Pittsburgh, Department of Computer Science, Technical Report. TR-11-178, March 2011.
-
(2011)
Internet Denial of Service Attacks and Defense Mechanisms
-
-
Abliz, M.1
-
76
-
-
0037810705
-
Pi: A path identification mechanism to defend against ddos attacks
-
A. Yaar, A. Perrig, and D. Song, Pi: A Path Identification Mechanism to Defend against DDoS Attacks, in IEEE Symposium on Security and Privacy, pp. 93, 2003.
-
(2003)
IEEE Symposium on Security and Privacy
, pp. 93
-
-
Yaar, A.1
Perrig, A.2
Song, D.3
-
77
-
-
33646742035
-
PacketScore: A statistics-based packet filtering scheme against distributed denial-of-service attacks
-
Y. Kim, W. C. Lau, M. C. Chuah, and H. J. Chao, PacketScore: A Statistics-Based Packet Filtering Scheme against Distributed Denial-of-Service Attacks, IEEE Trans. Dependable Secure Computing, vol. 3, no. 2, pp. 141-155, 2006.
-
(2006)
IEEE Trans. Dependable Secure Computing
, vol.3
, Issue.2
, pp. 141-155
-
-
Kim, Y.1
Lau, W.C.2
Chuah, M.C.3
Chao, H.J.4
-
78
-
-
33749851980
-
Intrusion detection routers: Design, implementation and evaluation using an experimental testbed
-
E. Y. K. Chan et al., Intrusion Detection Routers: Design, Implementation and Evaluation Using an Experimental Testbed, IEEE J. Sel. Areas Commun., vol. 24, no. 10, pp. 1889-1900, 2006.
-
(2006)
IEEE J. Sel. Areas Commun.
, vol.24
, Issue.10
, pp. 1889-1900
-
-
Chan, E.Y.K.1
-
79
-
-
0035010963
-
On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack
-
K. Park, and H. Lee, On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack, in Proc. IEEE INFOCOM 2001, pp. 338347.
-
(2001)
Proc. IEEE INFOCOM
, pp. 338347
-
-
Park, K.1
Lee, H.2
-
80
-
-
0001083965
-
On the effectiveness of route-based packet filtering for distributed dos attack prevention in power-law internets
-
August
-
K. Park, and H. Lee, On the Effectiveness of Route-Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets, in Proc. ACM SIGCOMM, August 2001.
-
(2001)
Proc. ACM SIGCOMM
-
-
Park, K.1
Lee, H.2
-
81
-
-
41949118967
-
Detecting compromised routers via packet forwarding behavior
-
DOI 10.1109/MNET.2008.4476069, Internet Scalability: Properties and Evolution
-
A. T. Mizrak, S. Savage, and K. Marzullo, Detecting compromised routers via packet forwarding behavior, IEEE Network, pp.34-39, 2008. (Pubitemid 351514029)
-
(2008)
IEEE Network
, vol.22
, Issue.2
, pp. 34-39
-
-
Mizrak, A.T.1
Savage, S.2
Marzullo, K.3
-
82
-
-
0031703272
-
Detecting disruptive routers: A distributed network monitoring approach
-
May
-
K. A. Bradley, S. Cheung, N. Puketza, B. Mukherjee, and R. A. Olsson, Detecting Disruptive Routers: A Distributed Network Monitoring Approach, in Proc. 1998 IEEE Symposium on Security and Privacy, May 1998.
-
(1998)
Proc. 1998 IEEE Symposium on Security and Privacy
-
-
Bradley, K.A.1
Cheung, S.2
Puketza, N.3
Mukherjee, B.4
Olsson, R.A.5
-
84
-
-
80052081335
-
A trust-based approach against IP-spoofing attacks
-
J. M. Gonzalez, M. Anwar, and J. B. D. Joshi, A trust-based approach against IP-spoofing attacks, in Proc. IEEE PST, pp. 63-70, 2011.
-
(2011)
Proc. IEEE PST
, pp. 63-70
-
-
Gonzalez, J.M.1
Anwar, M.2
Joshi, J.B.D.3
-
85
-
-
84888352759
-
STor: Social network based anonymous communication in tor
-
P. Zhou, X. Luo, A. Chen, and R. K. C. Chang, STor: Social Network based Anonymous Communication in Tor, in The Computing Research Repository (CoRR), 2011.
-
(2011)
The Computing Research Repository (CoRR)
-
-
Zhou, P.1
Luo, X.2
Chen, A.3
Chang, R.K.C.4
-
86
-
-
84888333160
-
-
the 6th Int'l Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010), Chicago, IL, October 9-12
-
S. T. Zargar, and J. B. D. Joshi, A Collaborative Approach to Facilitate Intrusion Detection and Response against DDoS Attacks, the 6th Int'l Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010), Chicago, IL, October 9-12, 2010.
-
(2010)
A Collaborative Approach to Facilitate Intrusion Detection and Response Against DDoS Attacks
-
-
Zargar, S.T.1
Joshi, J.B.D.2
-
87
-
-
24344506095
-
Scalable coordination techniques for distributed network monitoring
-
Passive and Active Network Measurement - 6th International Workshop, PAM 2005, Proceedings
-
M. R. Sharma, and J. W. Byers, Scalable Coordination Techniques for Distributed Network Monitoring, in Proc. PAM, pp. 349-352, 2005. (Pubitemid 41252763)
-
(2005)
Lecture Notes in Computer Science
, vol.3431
, pp. 349-352
-
-
Sharma, M.R.1
Byers, J.W.2
-
89
-
-
4544272175
-
Controlling high bandwidth aggregates in the network
-
R. Mahajan, S. M. Bellovin, S. Floyd, J. Ioannidis, V. Paxson, and S. Shenker, Controlling high bandwidth aggregates in the network, presented at Computer Communication Review, pp.62-73, 2002.
-
(2002)
Computer Communication Review
, pp. 62-73
-
-
Mahajan, R.1
Bellovin, S.M.2
Floyd, S.3
Ioannidis, J.4
Paxson, V.5
Shenker, S.6
-
90
-
-
0038404196
-
Defending against distributed denial of service attacks using max-min fair server centric router throttles
-
D. Yau, J. C. S. Lui, and F. Liang, Defending against distributed denial of service attacks using max-min fair server centric router throttles, IEEE international conference on Quality of Service. 2002.
-
(2002)
IEEE International Conference on Quality of Service
-
-
Yau, D.1
Lui, J.C.S.2
Liang, F.3
-
92
-
-
84858087616
-
-
Technical Report TR-ECE-06-02, Dept. of Electrical and Computer Engineering, Virginia Tech, Feb.
-
R. Chen, J. M. Park, and R. Marchany, TRACK: A novel approach for defending against distributed denial-of-service attacks, Technical Report TR-ECE-06-02, Dept. of Electrical and Computer Engineering, Virginia Tech, Feb. 2006.
-
(2006)
TRACK: A Novel Approach for Defending Against Distributed Denial-of-service Attacks
-
-
Chen, R.1
Park, J.M.2
Marchany, R.3
-
93
-
-
33745470948
-
Forming alliance for ddos defense
-
Centro Stefano Francini, Ascona, Switzerland
-
J. Mirkovic, P. Reiher, and M. Robinson, Forming Alliance for DDoS Defense, in Proc. New Security Paradigms Workshop, Centro Stefano Francini, Ascona, Switzerland, 2003.
-
(2003)
Proc. New Security Paradigms Workshop
-
-
Mirkovic, J.1
Reiher, P.2
Robinson, M.3
-
94
-
-
84942253601
-
Cossack: Coordinated suppression of simultaneous attacks
-
Apr.
-
C. Papadopoulos, R. Lindell, J. Mehringer, A. Hussain, and R. Govindan, Cossack: Coordinated Suppression of Simultaneous Attacks, in Proc. DARPA Information Survivability Conference and Exposition, Vol. 1, pp. 2 13, Apr. 2003.
-
(2003)
Proc. DARPA Information Survivability Conference and Exposition
, vol.1
, pp. 213
-
-
Papadopoulos, C.1
Lindell, R.2
Mehringer, J.3
Hussain, A.4
Govindan, R.5
-
95
-
-
18144411533
-
Preventing internet denial-of-service with capabilities
-
T. Anderson, T. Roscoe, and D. Wetherall, Preventing Internet denial-of-service with capabilities, SIGCOMM Comput. Commun. Rev., vol. 34, no. 1, pp. 39-44, 2004.
-
(2004)
SIGCOMM Comput. Commun. Rev.
, vol.34
, Issue.1
, pp. 39-44
-
-
Anderson, T.1
Roscoe, T.2
Wetherall, D.3
-
96
-
-
84876255635
-
Portcullis: Protecting connection setup from denial-of-capability attacks
-
DOI 10.1145/1282380.1282413, ACM SIGCOMM 2007: Conference on Computer Communications
-
B. Parno et al., Portcullis: protecting connection setup from denial-of-capability attacks, SIGCOMM Comput. Commun. Rev., vol. 37, no. 4, pp. 289-300, 2007. (Pubitemid 350239792)
-
(2007)
ACM SIGCOMM 2007: Conference on Computer Communications
, pp. 289-300
-
-
Parno, B.1
Wendlandt, D.2
Shi, E.3
Perrig, A.4
Maggs, B.5
Hu, Y.-C.6
-
97
-
-
57949103947
-
TVA: A DoS-limiting network architecture
-
X. Yang, D. Wetherall, and T. Anderson, TVA: a DoS-limiting network architecture, IEEE/ACM Trans. Netw., vol. 16, no. 6, pp. 1267-1280, 2008.
-
(2008)
IEEE/ACM Trans. Netw.
, vol.16
, Issue.6
, pp. 1267-1280
-
-
Yang, X.1
Wetherall, D.2
Anderson, T.3
-
98
-
-
84888343483
-
-
ACM SIGCOMM, Philadelphia, PA, USA, August
-
X. Yang, D. Wetherall, and T. Anderson, A DoS-limiting Architecture, in ACM SIGCOMM, Philadelphia, PA, USA, August 2005.
-
(2005)
A DoS-limiting Architecture
-
-
Yang, X.1
Wetherall, D.2
Anderson, T.3
-
99
-
-
3543097593
-
SIFF: A stateless internet flow filter to mitigate ddos flooding attacks
-
May
-
A. Yaar, A. Perrig, and D. Song, SIFF: a Stateless Internet Flow Filter to Mitigate DDoS Flooding Attacks, in Proc. 2004 IEEE Symposium on Security and Privacy, pp. 130-143, May 2004.
-
(2004)
Proc. 2004 IEEE Symposium on Security and Privacy
, pp. 130-143
-
-
Yaar, A.1
Perrig, A.2
Song, D.3
-
100
-
-
85083279650
-
Passport: Secure and adoptable source authentication
-
San Francisco, CA, USA
-
X. Liu, A. Li, X. Yang, and D. Wetherall, Passport: secure and adoptable source authentication, in Proc. 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI'08), San Francisco, CA, USA, pp. 365-378, 2008.
-
(2008)
Proc. 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI'08)
, pp. 365-378
-
-
Liu, X.1
Li, A.2
Yang, X.3
Wetherall, D.4
-
101
-
-
65249149520
-
To filter or to authorize: Network-layer DoS defense against multimillion-node botnets
-
X. Liu, X. Yang, and Y. Lu, To filter or to authorize: network-layer DoS defense against multimillion-node botnets, in Proc. ACM SIGCOMM conference on Data communication (SIGCOMM '08), NY, USA, pp. 195-206, 2008.
-
(2008)
Proc. ACM SIGCOMM Conference on Data Communication (SIGCOMM '08), NY, USA
, pp. 195-206
-
-
Liu, X.1
Yang, X.2
Lu, Y.3
-
103
-
-
69249233518
-
Scalable network-layer defense against internet bandwidth-flooding attacks
-
August
-
K. Argyraki, and D. R. Cheriton, Scalable network-layer defense against internet bandwidth-flooding attacks, in IEEE/ACM Trans. Netw., 17(4), pp. 1284-1297, August 2009.
-
(2009)
IEEE/ACM Trans. Netw.
, vol.17
, Issue.4
, pp. 1284-1297
-
-
Argyraki, K.1
Cheriton, D.R.2
-
104
-
-
84888361537
-
-
Ph.D. dissertation, Department of Computer Science, University College London, December
-
F. Huici, Deployable Filtering Architectures Against Large Denial-of-Service Attacks, Ph.D. dissertation, Department of Computer Science, University College London, December, 2009.
-
(2009)
Deployable Filtering Architectures Against Large Denial-of-Service Attacks
-
-
Huici, F.1
-
106
-
-
77953700140
-
Detecting dns amplification attacks
-
G. Kambourakis, T. Moschos, D. Geneiatakis, and S. Gritzalis, Detecting DNS Amplification Attacks, in Critical Information Infrastructures Security Lecture Notes in Computer Science, Vol. 5141, pp. 185-196, 2008.
-
(2008)
Critical Information Infrastructures Security Lecture Notes in Computer Science
, vol.5141
, pp. 185-196
-
-
Kambourakis, G.1
Moschos, T.2
Geneiatakis, D.3
Gritzalis, S.4
-
107
-
-
84888357473
-
-
IPTraf tool, An IP Network Monitor
-
IPTraf tool, An IP Network Monitor, [online] http://iptraf.seul.org/
-
-
-
-
108
-
-
84888313877
-
Detection of intruders and flooding in voip using ids
-
July-Aug.
-
A. Rahul, S. K. Prashanth, B. S. kumarand , and G. Arun, Detection of Intruders and Flooding In Voip Using IDS, Jacobson Fast And Hellinger Distance Algorithms, IOSR Journal of Computer Engineering (IOSRJCE), Vol. 2, no. 2, pp. 30-36, July-Aug. 2012.
-
(2012)
Jacobson Fast and Hellinger Distance Algorithms, IOSR Journal of Computer Engineering (IOSRJCE)
, vol.2
, Issue.2
, pp. 30-36
-
-
Rahul, A.1
Prashanth, S.K.2
Kumarand, B.S.3
Arun, G.4
-
109
-
-
61449207953
-
DDoS-shield: DDoS-resilient scheduling to counter application layer attacks
-
February
-
S. Ranjan, R. Swaminathan, M. Uysal, A. Nucci, and E. Knightly, DDoS-shield: DDoS-resilient scheduling to counter application layer attacks, IEEE/ACM Trans. Netw., Vol. 17, no. 1, pp. 26-39, February 2009.
-
(2009)
IEEE/ACM Trans. Netw.
, vol.17
, Issue.1
, pp. 26-39
-
-
Ranjan, S.1
Swaminathan, R.2
Uysal, M.3
Nucci, A.4
Knightly, E.5
-
110
-
-
61449197774
-
A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors
-
February
-
Y. Xie, and S. Z. Yu, A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors, IEEE/ACM Trans. Netw. (TON), Vol. 17, no. 1, pp. 54-65, February 2009.
-
(2009)
IEEE/ACM Trans. Netw. (TON)
, vol.17
, Issue.1
, pp. 54-65
-
-
Xie, Y.1
Yu, S.Z.2
-
111
-
-
84255175605
-
Defending systems Against Tilt DDoS attacks
-
October 20-21
-
H. I. Liu, and K. C. Chang, Defending systems Against Tilt DDoS attacks, Telecommunication Systems, Services, and Applications (TSSA), pp. 22-27, October 20-21, 2011.
-
(2011)
Telecommunication Systems, Services, and Applications (TSSA)
, pp. 22-27
-
-
Liu, H.I.1
Chang, K.C.2
-
112
-
-
33750366503
-
DDoS defense by offense
-
DOI 10.1145/1151659.1159948
-
M. Walfish, M. Vutukuru, H. Balakrishnan, D. Karger, and S. Shenker, DDoS defense by offense, SIGCOMM Computer Communications Review, Vol. 36, no. 4, pp. 303-314, August 2006. (Pubitemid 44623736)
-
(2006)
Computer Communication Review
, vol.36
, Issue.4
, pp. 303-314
-
-
Walfish, M.1
Vutukuru, M.2
Balakrishnan, H.3
Karger, D.4
Shenker, S.5
-
113
-
-
47149094655
-
A detection and offense mechanism to defend against application layer ddos attacks
-
June 19-25
-
J. Yu, Z. Li, H. Chen, and X. Chen, A Detection and Offense Mechanism to Defend Against Application Layer DDoS Attacks, the third International Conference on Networking and Services (ICNS'07), pp. 54, June 19-25, 2007.
-
(2007)
The Third International Conference on Networking and Services (ICNS'07)
, pp. 54
-
-
Yu, J.1
Li, Z.2
Chen, H.3
Chen, X.4
-
114
-
-
84924375780
-
Botz-4-sale: Surviving organized ddos attacks that mimic flash crowds
-
Boston, May
-
S. Kandula, D. Katabi, M. Jacob, and A. W. BergerBotz-4-sale: Surviving organized ddos attacks that mimic flash crowds, in Proc. Symposium on Networked Systems Design and Implementation (NSDI), Boston, May 2005.
-
(2005)
Proc. Symposium on Networked Systems Design and Implementation (NSDI)
-
-
Kandula, S.1
Katabi, D.2
Jacob, M.3
Berger, A.W.4
-
116
-
-
35248831179
-
CAPTCHA: Using hard AI problems for security
-
Eli Biham (Ed.). Springer-Verlag, Berlin, Heidelberg
-
L. V. Ahn, M. Blum, N. J. Hopper, and J. Langford, CAPTCHA: using hard AI problems for security, in Proc. 22nd international conference on Theory and applications of cryptographic techniques (EUROCRYPT'03), Eli Biham (Ed.). Springer-Verlag, Berlin, Heidelberg, 294-311. 2003.
-
(2003)
Proc. 22nd International Conference on Theory and Applications of Cryptographic Techniques (EUROCRYPT'03)
, pp. 294-311
-
-
Ahn, L.V.1
Blum, M.2
Hopper, N.J.3
Langford, J.4
-
117
-
-
47249148481
-
Mitigating application-level denial of service attacks on Web servers: A client-transparent approach
-
July
-
M. Srivatsa, A. Iyengar, J. Yin, and L. Liu, Mitigating application-level denial of service attacks on Web servers: A client-transparent approach, ACM Trans. Web (TWEB), Vol. 2, no. 3, July 2008.
-
(2008)
ACM Trans. Web (TWEB)
, vol.2
, Issue.3
-
-
Srivatsa, M.1
Iyengar, A.2
Yin, J.3
Liu, L.4
-
118
-
-
84868307433
-
A lightweight mechanism to mitigate application layer ddos attacks
-
J. Yu, C. Fang, L. Lu, and Z. Li, A Lightweight Mechanism to Mitigate Application Layer DDoS Attacks, in Proc. Infoscale 2009, LNICST 18, pp. 175191, 2009.
-
(2009)
Proc. Infoscale 2009, LNICST 18
, pp. 175191
-
-
Yu, J.1
Fang, C.2
Lu, L.3
Li, Z.4
-
119
-
-
84881568318
-
A hybrid approach to counter application layer DDoS attacks
-
June
-
S. R. Devi, and P. Yogesh, A hybrid approach to counter application layer DDoS attacks, International J. Cryptography and Information Security(IJCIS), Vol. 2, no.2, June 2012.
-
(2012)
International J. Cryptography and Information Security(IJCIS)
, vol.2
, Issue.2
-
-
Devi, S.R.1
Yogesh, P.2
-
120
-
-
0034229418
-
Defeating distributed denial of service attacks
-
X. Geng, and A. B. Whinston, Defeating Distributed Denial of Service attacks, IEEE IT Professional, 2(4), pp. 36-42, 2002.
-
(2002)
IEEE IT Professional
, vol.2
, Issue.4
, pp. 36-42
-
-
Geng, X.1
Whinston, A.B.2
-
121
-
-
84888345243
-
-
Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks, Retrieved Oct. 19
-
Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks, Retrieved Oct. 19, 2012, [online] http://www.cisco.com/en/US/tech/tk59/ technologies/white paper09186a 0080174a5b.shtml
-
(2012)
-
-
-
124
-
-
0008922435
-
The xenoservice-A distributed defeat for distributed denial of service
-
October
-
J. Yan, S. Early, and R. Anderson, The XenoService-A Distributed Defeat for Distributed Denial of Service, in Proc. ISW 2000, October 2000.
-
(2000)
Proc. ISW 2000
-
-
Yan, J.1
Early, S.2
Anderson, R.3
-
125
-
-
84888326398
-
-
ICANN Report, DNS Distributed Denial of Service (DDoS) Attacks, Security and Stability Advisory Committee (SSAC), March 2006
-
ICANN Report, DNS Distributed Denial of Service (DDoS) Attacks, Security and Stability Advisory Committee (SSAC), March 2006.
-
-
-
-
128
-
-
50949130514
-
Wavelet-based detection of dos attacks
-
A. Dainotti, A. Pescape, and G. Ventre, Wavelet-based detection of dos attacks, in IEEE Global Telecommunications Conference, GLOBECOM, 2006.
-
(2006)
IEEE Global Telecommunications Conference, GLOBECOM
-
-
Dainotti, A.1
Pescape, A.2
Ventre, G.3
-
129
-
-
4544268957
-
A flow-based method for abnormal network traffic detection
-
April
-
M. Kim, H. Kang, S. Hong, S. Chung, and J. W. Hong, A flow-based method for abnormal network traffic detection, in Network Operations and Management Symposium, vol. 1, pp. 599-612, April 2004.
-
(2004)
Network Operations and Management Symposium
, vol.1
, pp. 599-612
-
-
Kim, M.1
Kang, H.2
Hong, S.3
Chung, S.4
Hong, J.W.5
-
130
-
-
84856180872
-
An integrated victim-based approach against ip packet flooding denial of service
-
October
-
R. M. Mutebi, and I. A. Rai, An Integrated Victim-based Approach against IP Packet Flooding Denial of Service, International J. Computing and ICT Research, Special Issue Vol. 4, No. 1, pp. 70-80, October 2010.
-
(2010)
International J. Computing and ICT Research, Special Issue
, vol.4
, Issue.1
, pp. 70-80
-
-
Mutebi, R.M.1
Rai, I.A.2
-
131
-
-
18144385431
-
Application of anomaly detection algorithms for detecting syn flooding attacks
-
V. A. Siris, and F. Papaglou, Application of anomaly detection algorithms for detecting syn flooding attacks, in Proc. IEEE GLOBECOM, 2004.
-
(2004)
Proc. IEEE GLOBECOM
-
-
Siris, V.A.1
Papaglou, F.2
-
132
-
-
29244465140
-
Mitigating denial of service attacks: A tutorial
-
J. Mls, Mitigating denial of service attacks: A tutorial, J. Computer Security, Vol. 13, No. 6, pp. 807-837, 2005.
-
(2005)
J. Computer Security
, vol.13
, Issue.6
, pp. 807-837
-
-
Mls, J.1
-
133
-
-
0031255580
-
Selecting and interpreting measures of thematic classification accuracy
-
DOI 10.1016/S0034-4257(97)00083-7, PII S0034425797000837
-
S. V. Stehman, "Selecting and interpreting measures of thematic classification accuracy". Remote Sensing of Environment, Vol. 62, No. 1, pp. 77-89, 1997. (Pubitemid 28052020)
-
(1997)
Remote Sensing of Environment
, vol.62
, Issue.1
, pp. 77-89
-
-
Stehman, S.V.1
-
137
-
-
84947990836
-
Endorsments, licensing, and insurance for distributed systems services
-
Fairfax, VA, November
-
C. Lai, G. Medvinsky, and C. Neuman, Endorsments, licensing, and insurance for distributed systems services, in Proc. 2nd ACM Conf. Computer and Comm. Security (CCS), Fairfax, VA, November 1994.
-
(1994)
Proc. 2nd ACM Conf. Computer and Comm. Security (CCS)
-
-
Lai, C.1
Medvinsky, G.2
Neuman, C.3
-
138
-
-
34250009730
-
Cyberinsurance in IT security management
-
DOI 10.1109/MSP.2007.57
-
W. S. Baer, and A. Parkinson, Cyberinsurance in IT Security Management, IEEE Security & Privacy, Vol. 5, No. 3, pp. 50-56, May-June 2007. (Pubitemid 46883434)
-
(2007)
IEEE Security and Privacy
, vol.5
, Issue.3
, pp. 50-56
-
-
Baer, W.S.1
Parkinson, A.2
-
139
-
-
84888315472
-
The economic viability of cyber insurance: Seeking financial certainty in it security
-
Harvard, MA, June
-
T. Bosco, The Economic Viability of Cyber Insurance: Seeking Financial Certainty in IT Security, in Proc. WEIS'05, Harvard, MA, June 2005.
-
(2005)
Proc. WEIS'05
-
-
Bosco, T.1
-
140
-
-
36549054759
-
An early application of the Bell Labs security framework to analyze vulnerabilities in the internet telephony domain
-
DOI 10.1002/bltj.20246
-
V. J. Gurbani, and A. R. McGee, An early application of the Bell Labs Security framework to analyze vulnerabilities in the Internet telephony domain, Bell Labs Technical Journal-Information Technology/Network Security, Vol. 12, No. 3, pp. 7-19, September 2007. (Pubitemid 350189033)
-
(2007)
Bell Labs Technical Journal
, vol.12
, Issue.3
, pp. 7-19
-
-
Gurbani, V.K.1
McGee, A.R.2
-
144
-
-
84888380813
-
-
Neustar Insights: DDoS Survey Q1
-
DDoS Survey: Q1 2012 When Businesses Go Dark, Neustar Insights: DDoS Survey Q1 2012, [online] http://hello.neustar.biz/rs/neustarinc/images/neustar- insights-ddos-attack-survey-q1-2012.eps
-
(2012)
DDoS Survey: Q1 2012 When Businesses Go Dark
-
-
-
145
-
-
84888351653
-
-
Service Provider Security, Cisco systems
-
Service Provider Infrastructure Security Techniques, Service Provider Security, Cisco systems, [online] http://www.cisco.com/web/about/security/ intelligence/sp infrastruct scty.html
-
Service Provider Infrastructure Security Techniques
-
-
-
146
-
-
84857574309
-
-
the 7th Intl Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2011), October 15-18, Orlando, FL.
-
S. T. Zargar, H. Takabi, and J. B. D. Joshi, DCDIDP: A Distributed, Collaborative, and Data-driven Intrusion Detection and Prevention Framework for Cloud Computing Environments, the 7th Intl Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2011), October 15-18, 2011, Orlando, FL.
-
(2011)
DCDIDP: A Distributed, Collaborative, and Data-driven Intrusion Detection and Prevention Framework for Cloud Computing Environments
-
-
Zargar, S.T.1
Takabi, H.2
Joshi, J.B.D.3
-
149
-
-
78650562912
-
-
McKinsey Quarterly, March
-
M. Chui, M. Lffler, and R. Roberts, The Internet of Things, McKinsey Quarterly, March 2010, [online] http://www.mckinseyquarterly.com/The Internet of Things 2538
-
(2010)
The Internet of Things
-
-
Chui, M.1
Lffler, M.2
Roberts, R.3
|