-
1
-
-
47149091843
-
DDoS attack evolution
-
J. Nazario, "DDoS attack evolution, " Network Security, vol. 2008, no. 7, pp. 7-10, 2008.
-
(2008)
Network Security
, vol.2008
, Issue.7
, pp. 7-10
-
-
Nazario, J.1
-
2
-
-
84966591863
-
Inside Risks: Denial-of-service attacks
-
Apr
-
P. G. Neumann, "Inside Risks: denial-of-service attacks, " Commun. ACM, vol. 43, no. 4, p. 136, Apr. 2000.
-
(2000)
Commun. ACM
, vol.43
, Issue.4
, pp. 136
-
-
Neumann, P.G.1
-
4
-
-
84901195333
-
Survey on taxonomy of ddos attacks with impact and mitigation techniques
-
C. M. Patel and V. H. Borisagar, "Survey On Taxonomy Of Ddos Attacks With Impact And Mitigation Techniques, " International Journal of Engineering Research &Technology (IJERT), vol. I, no. 9, pp. 1-8, 2012.
-
(2012)
International Journal of Engineering Research &Technology (IJERT)
, vol.1
, Issue.9
, pp. 1-8
-
-
Patel, C.M.1
Borisagar, V.H.2
-
5
-
-
33947503628
-
Defense against spoofed ip traffic using hop-count filtering
-
Feb
-
H. Wang, C. Jin, and K. G. Shin, "Defense Against Spoofed IP Traffic Using Hop-Count Filtering, " IEEE/ACM Transactions on Networking, vol. 1 5, no. I, pp. 40-53, Feb. 2007.
-
(2007)
IEEE/ACM Transactions on Networking
, vol.15
, Issue.1
, pp. 40-53
-
-
Wang, H.1
Jin, C.2
Shin, K.G.3
-
6
-
-
80052081335
-
A trust-based approach against IP-spoofing attacks
-
Jul
-
J. M. Gonzalez, M. Anwar, and J. B. D. Joshi, "A trust-based approach against IP-spoofing attacks, " 2011 Ninth Annual International Conference on Privacy, Security and Trust, pp. 63-70, Jul. 2011.
-
(2011)
2011 Ninth Annual International Conference on Privacy, Security and Trust
, pp. 63-70
-
-
Gonzalez, J.M.1
Anwar, M.2
Joshi, J.B.D.3
-
7
-
-
84897707303
-
An analysis of tcp syn flooding attack and defense mechanism
-
M. Kumar, A. Panwar, and A. Jain, "An Analysis of TCP SYN Flooding Attack and Defense Mechanism, " International Journal of Engineering Research &Technology (lJERT), vol. I, no. 5, pp. 1-6, 2012.
-
(2012)
International Journal of Engineering Research &Technology (LJERT)
, vol.1
, Issue.5
, pp. 1-6
-
-
Kumar, M.1
Panwar, A.2
Jain, A.3
-
9
-
-
0030715989
-
Analysis of a denial of service attack on tcp
-
C. L. Schuba, I. V. Krsul, M. G. Kuhn, E. H. Spafford, A. Sundaram, and D. Zamboni, "Analysis of a denial of service attack on TCP, " Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097), pp. 208-223, 1997.
-
(1997)
Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097)
, pp. 208-223
-
-
Schuba, C.L.1
Krsul, I.V.2
Kuhn, M.G.3
Spafford, E.H.4
Sundaram, A.5
Zamboni, D.6
-
11
-
-
80052728495
-
Why do we need personality diversity in software engineering?
-
Mar
-
L. F. Capretz and F. Ahmed, "Why do we need personality diversity in software engineering?, " ACM SIGSOFT Software Engineering Notes, vol. 35, no. 2, pp. I-II, Mar. 2010.
-
(2010)
ACM SIGSOFT Software Engineering Notes
, vol.35
, Issue.2
-
-
Capretz, L.F.1
Ahmed, F.2
-
12
-
-
77951521442
-
Ddos defense mechanisms: A new taxonomy
-
J. Garcia-Alfaro, G. NavarroArribas, N. Cuppens-Boulahia, and Y. Roudier, Eds. Springer Berlin Heidelberg
-
A. Keshariya and N. Foukia, "DDoS Defense Mechanisms: A New Taxonomy, " in Data Privacy Management and Autonomous Spontaneous Security SE-17, vol. 5939, J. Garcia-Alfaro, G. NavarroArribas, N. Cuppens-Boulahia, and Y. Roudier, Eds. Springer Berlin Heidelberg, 2010, pp. 222-236.
-
(2010)
Data Privacy Management and Autonomous Spontaneous Security SE-17
, vol.5939
, pp. 222-236
-
-
Keshariya, A.1
Foukia, N.2
-
13
-
-
85132972574
-
Distributed denial of service taxonomies of attacks, tools, and countermeasures
-
S. M. Specht and R. B. Lee, "Distributed denial of service Taxonomies of attacks, tools, and countermeasures, " in Proceedings of the 17th International Conference on Parallel and Distributed Computing Systems, 2004, pp. 543-550.
-
(2004)
Proceedings of the 17th International Conference on Parallel and Distributed Computing Systems
, pp. 543-550
-
-
Specht, S.M.1
Lee, R.B.2
|