-
2
-
-
1242321281
-
DDoS attacks and defense mechanisms: Classification and state-of-the-art
-
(April 5, )
-
Douligeris, Christos, and Aikaterini Mitrokotsa. "DDoS Attacks and Defense Mechanisms: Classification and State-of-the-Art." Computer Networks 44, no. 5 (April 5, 2004): 643-66. doi:10.1016/j.comnet.2003.10.003.
-
(2004)
Computer Networks
, vol.44
, Issue.5
, pp. 643-666
-
-
Douligeris, C.1
Mitrokotsa, A.2
-
4
-
-
34547423275
-
Protothreads: Simplifying event-driven programming of memory-constrained embedded systems
-
New York, NY, USA: ACM
-
Dunkels, Adam, Oliver Schmidt, Thiemo Voigt, and Muneeb Ali. "Protothreads: Simplifying Event-Driven Programming of Memory-Constrained Embedded Systems." In Proceedings of the 4th International Conference on Embedded Networked Sensor Systems, 29-42. SenSys '06. New York, NY, USA: ACM, 2006. doi.10.1145/1182807.1182811.
-
(2006)
Proceedings of the 4th International Conference on Embedded Networked Sensor Systems SenSys '06
, pp. 29-42
-
-
Dunkels, A.1
Schmidt, O.2
Voigt, T.3
Ali, M.4
-
5
-
-
20544456753
-
Contiki - A lightweight and flexible operating system for tiny networked sensors
-
Dunkels, A, B. Gronvall, and T. Voigt. "Contiki - A Lightweight and Flexible Operating System for Tiny Networked Sensors." In 29th Annual IEEE International Conference on Local Computer Networks, 2004, 455-62, 2004. doi:10.1109/LCN.2004.38.
-
(2004)
29th Annual IEEE International Conference on Local Computer Networks, 2004
, pp. 455-462
-
-
Dunkels, A.1
Gronvall, B.2
Voigt, T.3
-
6
-
-
84875214013
-
A cross-layer communication module for the internet of things
-
(February 26)
-
Han, Chong, Josep Miquel Jornet, Etimad Fadel, and Ian F. Akyildiz. "A Cross-Layer Communication Module for the Internet of Things." Computer Networks 57, no. 3 (February 26, 2013): 622-33. doi: 10.1016/j .comnet.2012.10.003.
-
(2013)
Computer Networks
, vol.57
, Issue.3
, pp. 622-633
-
-
Han, C.1
Jornet, J.M.2
Fadel, E.3
Akyildiz, I.F.4
-
8
-
-
77953077374
-
Flash crowds and denial of service attacks: Characterization and Implications for CDNs and Web Sites
-
New York, NY, USA: ACM
-
Jung, Jaeyeon, Balachander Krishnamurthy, and Michael Rabinovich. "Flash Crowds and Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites." In Proceedings of the 11th International Conference on World Wide Web, 293- 304. WWW '02. New York, NY, USA: ACM, 2002. doi:10.1145/51144511485.
-
(2002)
Proceedings of the 11th International Conference on World Wide Web WWW '02
, pp. 293-304
-
-
Jung, J.1
Krishnamurthy, B.2
Rabinovich, M.3
-
9
-
-
0034497721
-
Distributed denial of service attacks
-
Lau, F, S.H. Rubin, M.H. Smith, and L. Trajkovic. "Distributed Denial of Service Attacks." In 2000 IEEE International Conference on Systems, Man, and Cybernetics, 3:2275-80 vol.3, 2000. doi:10.1109/ICSMC.2000.886455.
-
(2000)
2000 IEEE International Conference on Systems, Man, and Cybernetics, 3
, vol.3
, pp. 2275-2280
-
-
Lau, F.1
Rubin, S.H.2
Smith, M.H.3
Trajkovic, L.4
-
11
-
-
11144272176
-
A taxonomy of DDoS attack and DDoS defense mechanisms
-
(April)
-
Mirkovic, Jelena, and Peter Reiher. "A Taxonomy of DDoS Attack and DDoS Defense Mechanisms." SIGCOMM Comput. Commun. Rev. 34, no. 2 (April 2004): 39-53. doi: 10.1145/997150.997156.
-
(2004)
SIGCOMM Comput. Commun. Rev
, vol.34
, Issue.2
, pp. 39-53
-
-
Mirkovic, J.1
Reiher, P.2
-
12
-
-
84857524525
-
A learning automata based solution for preventing distributed denial of service in internet of things
-
IEEE
-
Misra, Sudip, P. Venkata Krishna, Harshit Agarwal, Antriksh Saxena, and Mohammad S. Obaidat. "A Learning Automata Based Solution for Preventing Distributed Denial of Service in Internet of Things." In International Conferences on Internet of Things, and Cyber, Physical and Social Computing, 114-22. IEEE, 2011.
-
(2011)
International Conferences on Internet of Things, and Cyber, Physical and Social Computing
, pp. 114-122
-
-
Misra, S.1
Krishna, P.V.2
Agarwal, H.3
Saxena, A.4
Obaidat, M.S.5
-
13
-
-
77955715403
-
An adaptive learning routing protocol for the prevention of distributed denial of service attacks in wireless mesh networks
-
(July)
-
Misra, Sudip, P. Venkata Krishna, Kiran Isaac Abraham, Navin Sasikumar, and S. Fredun. "An Adaptive Learning Routing Protocol for the Prevention of Distributed Denial of Service Attacks in Wireless Mesh Networks." Computers & Mathematics with Applications 60, no. 2 (July 2010): 294-306. doi: 10.1016/j.camwa.2009.12.035.
-
(2010)
Computers & Mathematics with Applications
, vol.60
, Issue.2
, pp. 294-306
-
-
Misra, S.1
Krishna, P.V.2
Abraham, K.I.3
Sasikumar, N.4
Fredun, S.5
-
14
-
-
70350755889
-
Internet of things and privacy preserving technologies
-
Wireless VITAE 2009
-
Oleshchuk, V. "Internet of Things and Privacy Preserving Technologies." In 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace Electronic Systems Technology, 2009. Wireless VITAE 2009, 336-40, 2009. doi: 10.1109/WIRELESSVITAE.2009.5172470.
-
(2009)
1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace Electronic Systems Technology, 2009
, pp. 336-340
-
-
Oleshchuk, V.1
-
15
-
-
46149087550
-
Cross-level sensor network simulation with COOJA
-
Osterlind, F, A. Dunkels, J. Eriksson, N. Finne, and T. Voigt. "Cross-Level Sensor Network Simulation with COOJA." In Proceedings 2006 31st IEEE Conference on Local Computer Networks, 641-48, 2006. doi: 10.1109/LCN.2006.322172.
-
(2006)
Proceedings 2006 31st IEEE Conference on Local Computer Networks
, pp. 641-648
-
-
Osterlind, F.1
Dunkels, A.2
Eriksson, J.3
Finne, N.4
Voigt, T.5
-
16
-
-
34147099073
-
Survey of network-based defense mechanisms countering the DoS and DDoS Problemsr
-
(April)
-
Peng, Tao, Christopher Leckie, and Kotagiri Ramamohanarao. "Survey of Network-Based Defense Mechanisms Countering the DoS and DDoS Problemsr ACM Comput. Surv. 39, no. 1 (April 2007). doi:10.1145/1216370.1216373.
-
(2007)
ACM Comput. Surv.
, vol.39
, Issue.1
-
-
Peng, T.1
Leckie, C.2
Ramamohanarao, K.3
-
17
-
-
84894668409
-
Context aware computing for the internet of things: A survey
-
(First )
-
Perera, C, A. Zaslavsky, P. Christen, and D. Georgakopoulos. "Context Aware Computing for The Internet of Things: A Survey." IEEE Communications Surveys Tutorials 16, no. 1 (First 2014): 414-54. doi:10.1109/SURV.2013.042313.00197.
-
(2014)
IEEE Communications Surveys Tutorials
, vol.16
, Issue.1
, pp. 414-454
-
-
Perera, C.1
Zaslavsky, A.2
Christen, P.3
Georgakopoulos, D.4
-
18
-
-
84937802116
-
Contiki programming course: Hands-on session notes
-
Science, Swedish Institute of Computer, and Oct, Accessed May 2, 2014
-
Science, Swedish Institute of Computer, and Oct 2008. "Contiki Programming Course: Hands-On Session Notes." TechRepublic. Accessed May 2, 2014. http://www.techrepublic.com/resource-library/whitepapers/contiki-programming-course-hands-on-session-notes/.
-
(2008)
TechRepublic
-
-
-
19
-
-
84883665974
-
Authorization framework for the internet- of-things
-
Los Alamitos, CA, USA: IEEE Computer Society
-
Seitz, Ludwig, Goran Selander, and Christian Gehrmann. "Authorization Framework for the Internet- of-Things." In 2013 IEEE 14th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM), 1-6. Los Alamitos, CA, USA: IEEE Computer Society, 2013. doi: 10.1109/W oWMoM.2013.6583465.
-
(2013)
2013 IEEE 14th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM)
, pp. 1-6
-
-
Seitz, L.1
Selander, G.2
Gehrmann, C.3
-
20
-
-
84893461294
-
DDoS Attack Detection at Local Area Networks Using Information Theoretical Metrics
-
Los Alamitos, CA, USA: IEEE Computer Society
-
Tao, Yuan, and Shui Yu. "DDoS Attack Detection at Local Area Networks Using Information Theoretical Metrics." In 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 233-40. Los Alamitos, CA, USA: IEEE Computer Society, 2013. doi: 10.1109/TrustCom.2013.32.
-
(2013)
2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
, pp. 233-240
-
-
Tao, Y.1
Yu, S.2
-
21
-
-
33749377422
-
A comprehensive categorization of DDoS attack and DDoS defense techniques
-
Tariq, Usman, ManPyo Hong, and Kyung-suk Lhee. "A Comprehensive Categorization of DDoS Attack and DDoS Defense Techniques." Advanced Data Mining and Applications 4093 (n.d.): 1025-36.
-
Advanced Data Mining and Applications
, vol.4093
, pp. 1025-1036
-
-
Tariq, U.1
Hong, M.2
Lhee, K.-S.3
-
22
-
-
74949143896
-
Internet of Things - New Security and Privacy Challenges
-
(January)
-
Weber, Rolf H. "Internet of Things - New Security and Privacy Challenges." Computer Law & Security Review 26, no. 1 (January 2010): 23-30. doi: 10.1016/j .clsr.2009.11.008.
-
(2010)
Computer Law Security Review
, vol.26
, Issue.1
, pp. 23-30
-
-
Weber, R.H.1
-
23
-
-
80051640150
-
Searching in internet of things: Vision and challenges
-
Los Alamitos, CA, USA: IEEE Computer Society
-
Zhang, Daqiang, Laurence T. Yang, and Hongyu Huang. "Searching in Internet of Things: Vision and Challenges." In International Symposium on Parallel and Distributed Processing with Applications, 201- 6. Los Alamitos, CA, USA: IEEE Computer Society, 2011. doi:10.1109/ISPA.2011.53.
-
(2011)
International Symposium on Parallel and Distributed Processing with Applications
, pp. 201-206
-
-
Zhang, D.1
Yang, L.T.2
Huang, H.3
-
24
-
-
84880777977
-
Research on redundant channel model based on spatial correlation in IOT
-
edited by Yuyu Yuan, Xu Wu, and Yueming Lu Communications in Computer and Information Science 320. Springer Berlin Heidelberg, Springer Berlin Heidelberg
-
Zhang, Fangjiao, Wei Guo, Jincui Yang, Fangfang Yuan, and Lidong Zhai. "Research on Redundant Channel Model Based on Spatial Correlation in IOT." In Trustworthy Computing and Services, edited by Yuyu Yuan, Xu Wu, and Yueming Lu, 666-72. Communications in Computer and Information Science 320. Springer Berlin Heidelberg, 2013. http://0-link.springer.com.maurice.bgsu.edu/chapter/10.1007/978-3-642-35795-4-84.
-
(2013)
Trustworthy Computing and Services
, pp. 666-672
-
-
Zhang, F.1
Guo, W.2
Yang, J.3
Yuan, F.4
Zhai, L.5
-
25
-
-
79951801836
-
IOT Gateway: Bridging wireless sensor networks into internet of things
-
Zhu, Qian, Ruicong Wang, Qi Chen, Yan Liu, and Weijun Qin. "IOT Gateway: BridgingWireless Sensor Networks into Internet of Things." In 2010IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing (EUC), 347-52, 2010. doi:10.1109/EUC.2010.58.
-
(2010)
2010IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing (EUC)
, pp. 347-352
-
-
Zhu, Q.1
Wang, R.2
Chen, Q.3
Liu, Y.4
Qin, W.5
|