|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 538 occurrences of 244 keywords
|
|
|
Results
Found 2856 publication records. Showing 2856 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
122 | Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran, Jae-Kwang Lee |
Multi Layer Approach to Defend DDoS Attacks Caused by Spam. |
MUE |
2007 |
DBLP DOI BibTeX RDF |
|
112 | Tae Hwan Kim, Dong Seong Kim 0001, Sang Min Lee 0012, Jong Sou Park |
Detecting DDoS Attacks Using Dispersible Traffic Matrix and Weighted Moving Average. |
ISA |
2009 |
DBLP DOI BibTeX RDF |
Traffic visualization, Weighted moving average, Intrusion detection, Distributed Denial of Service attacks, Traffic matrix, IP spoofing |
102 | Xin Xu, Yongqiang Sun, Zunguo Huang |
Defending DDoS Attacks Using Hidden Markov Models and Cooperative Reinforcement Learning. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
|
93 | Usman Tariq, Manpyo Hong, Kyung-suk Lhee |
A Comprehensive Categorization of DDoS Attack and DDoS Defense Techniques. |
ADMA |
2006 |
DBLP DOI BibTeX RDF |
|
92 | Guoxing Zhang, Shengming Jiang, Gang Wei, Quansheng Guan |
A prediction-based detection algorithm against distributed denial-of-service attacks. |
IWCMC |
2009 |
DBLP DOI BibTeX RDF |
available service rate, prediction-based detection of DDoS and low-rate TCP attacks, distributed DoS (DDoS), denial-of-service attacks (DoS) |
92 | Hyundo Park, Peng Li 0059, Debin Gao, Heejo Lee, Robert H. Deng |
Distinguishing between FE and DDoS Using Randomness Check. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
Flash Event, Randomness Check, Network Security, Distributed Denial of Service |
86 | Jun (Jim) Xu, Wooyong Lee |
Sustaining Availability of Web Services under Distributed Denial of Service Attacks. |
IEEE Trans. Computers |
2003 |
DBLP DOI BibTeX RDF |
World-Wide Web, game theory, Availability, survivability, Distributed Denial of Service (DDoS) |
83 | Soon Hin Khor, Akihiro Nakao |
Overfort: Combating DDoS with peer-to-peer DDoS puzzle. |
IPDPS |
2008 |
DBLP DOI BibTeX RDF |
|
82 | Jieren Cheng, Jianping Yin, Yun Liu, Zhiping Cai, Min Li |
DDoS Attack Detection Algorithm Using IP Address Features. |
FAW |
2009 |
DBLP DOI BibTeX RDF |
IP address features value, support vector machine, network security, distributed denial of service attack |
82 | Christos Siaterlis, Vasilis Maglaris |
Detecting Incoming and Outgoing DDoS Attacks at the Edge Using a Single Set of Network Characteristics. |
ISCC |
2005 |
DBLP DOI BibTeX RDF |
|
82 | Jung-Taek Seo, Cheolho Lee, Taeshik Shon, Jongsub Moon |
SVM Approach with CTNT to Detect DDoS Attacks in Grid Computing. |
GCC |
2005 |
DBLP DOI BibTeX RDF |
|
80 | Seung-Won Shin, Kwang-ho Baik, Ki-Young Kim, Jong-Soo Jang |
QS-Ware: The Middleware for Providing QoS and Secure Ability to Web Server. |
ICCSA (1) |
2004 |
DBLP DOI BibTeX RDF |
|
78 | Chwan-Hwa John Wu, Tong Liu |
Simulation for intrusion-resilient, DDoS-resistant authentication system (IDAS). |
SpringSim |
2008 |
DBLP DOI BibTeX RDF |
computer network defense, authentication, network security, discrete event simulation, DDoS, intrusion |
78 | Yu Chen 0002, Kai Hwang 0001, Wei-Shinn Ku |
Collaborative Detection of DDoS Attacks over Multiple Network Domains. |
IEEE Trans. Parallel Distributed Syst. |
2007 |
DBLP DOI BibTeX RDF |
Cyber defense, network security, DDoS attacks, Internet technology |
78 | Jian Yuan, Kevin L. Mills |
Monitoring the Macroscopic Effect of DDoS Flooding Attacks. |
IEEE Trans. Dependable Secur. Comput. |
2005 |
DBLP DOI BibTeX RDF |
attack dynamics, spatial-temporal pattern, monitoring, network traffic, DDoS attack |
72 | Mohit Mehta, Kanika Thapar, George C. Oikonomou, Jelena Mirkovic |
Combining Speak-Up with DefCOM for Improved DDoS Defense. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
72 | Yi Xie 0002, Shun-Zheng Yu |
A Novel Model for Detecting Application Layer DDoS Attacks. |
IMSCCS (2) |
2006 |
DBLP DOI BibTeX RDF |
|
72 | Zhongwen Li, Yang Xiang 0001, Dongsheng He |
Simulation and Analysis of DDoS in Active Defense Environment. |
CIS |
2006 |
DBLP DOI BibTeX RDF |
|
72 | Sanguk Noh, Cheolho Lee, Kyunghee Choi, Gihyun Jung |
Detecting Distributed Denial of Service (DDoS) Attacks through Inductive Learning. |
IDEAL |
2003 |
DBLP DOI BibTeX RDF |
|
68 | Yi Xie 0002, Shun-Zheng Yu |
Monitoring the application-layer DDoS attacks for popular websites. |
IEEE/ACM Trans. Netw. |
2009 |
DBLP DOI BibTeX RDF |
popular Website, distributed denial of service (DDoS), application-layer |
68 | Markus Goldstein, Christoph H. Lampert, Matthias Reif, Armin Stahl, Thomas M. Breuel |
Bayes Optimal DDoS Mitigation by Adaptive History-Based IP Filtering. |
ICN |
2008 |
DBLP DOI BibTeX RDF |
History-Based IP Filtering, DDoS, Bayes, Mitigation |
68 | Pan Shi, Yifeng Lian |
Game-Theoretical Effectiveness Evaluation of DDoS Defense. |
ICN |
2008 |
DBLP DOI BibTeX RDF |
effectiveness evaluation, Game Theory, congestion control, DDoS |
68 | Jun Yang, Ying Li 0002, Benxiong Huang, Jiuqiang Ming |
Preventing DDoS Attacks Based on Credit Model for P2P Streaming System. |
ATC |
2008 |
DBLP DOI BibTeX RDF |
Distributed Denial of Service (DDoS), peer-to-peer (P2P), Credit |
68 | Liying Li, Jianying Zhou 0001, Ning Xiao |
DDoS Attack Detection Algorithms Based on Entropy Computing. |
ICICS |
2007 |
DBLP DOI BibTeX RDF |
DDoS detection, entropy computing, network security |
68 | Igor V. Kotenko, Alexander Ulanov |
Simulation of Internet DDoS Attacks and Defense. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
Security modeling and architecture, Security models for ambient intelligence environments, Security simulation, DDoS, Infrastructure security |
68 | Minho Sung, Jun (Jim) Xu |
IP Traceback-Based Intelligent Packet Filtering: A Novel Technique for Defending against Internet DDoS Attacks. |
IEEE Trans. Parallel Distributed Syst. |
2003 |
DBLP DOI BibTeX RDF |
performance modeling and simulation, Distributed Denial of Service (DDoS), IP traceback |
66 | Xun Wang, Sriram Chellappan, Phillip Boyer, Dong Xuan |
On the Effectiveness of Secure Overlay Forwarding Systems under Intelligent Distributed DoS Attacks. |
IEEE Trans. Parallel Distributed Syst. |
2006 |
DBLP DOI BibTeX RDF |
Secure overlay forwarding system, DDoS attacks |
63 | Supranamaya Ranjan, Ram Swaminathan, Mustafa Uysal, Antonio Nucci, Edward W. Knightly |
DDoS-shield: DDoS-resilient scheduling to counter application layer attacks. |
IEEE/ACM Trans. Netw. |
2009 |
DBLP DOI BibTeX RDF |
application layer attacks, site security monitoring, anomaly detection, information entropy, denial-of-service attacks |
62 | Huizhong Sun, Yan Zhaung, H. Jonathan Chao |
A Principal Components Analysis-Based Robust DDoS Defense System. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
62 | Sanjam Garg, Huzur Saran |
Anti-DDoS Virtualized Operating System. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
Performance, Virtualization, Malware, Distributed Denial of Service Attack |
62 | Wei Zhang, Shize Guo, Kangfeng Zheng, Yixian Yang |
A Defending Mechanism against DDoS Based on Registration and Authentication. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
62 | Zonglin Li, Guangmin Hu, Dan Yang |
Global abnormal correlation analysis for DDoS attack detection. |
ISCC |
2008 |
DBLP DOI BibTeX RDF |
|
62 | Keun Park, Dongwon Seo, Jaewon Yoo, Heejo Lee, Hyogon Kim |
Unified Rate Limiting in Broadband Access Networks for Defeating Internet Worms and DDoS Attacks. |
ISPEC |
2008 |
DBLP DOI BibTeX RDF |
|
62 | Xinyu Yang, Ting Ma |
A Link Signature Based DDoS Attacker Tracing Algorithm under IPv6. |
FGCN (1) |
2007 |
DBLP DOI BibTeX RDF |
|
62 | Mihui Kim, Jaewon Seo, Kijoon Chae |
Integrated Notification Architecture Based on Overlay Against DDoS Attacks on Convergence Network. |
SEUS |
2007 |
DBLP DOI BibTeX RDF |
|
62 | Yunhao Liu 0001, Xiaomei Liu, Chen Wang 0010, Li Xiao 0001 |
Defending P2Ps from Overlay Flooding-based DDoS. |
ICPP |
2007 |
DBLP DOI BibTeX RDF |
|
62 | Paulo E. Ayres, H. Sun, H. Jonathan Chao, Wing Cheong Lau |
ALPi: A DDoS Defense System for High-Speed Networks. |
IEEE J. Sel. Areas Commun. |
2006 |
DBLP DOI BibTeX RDF |
|
62 | Jian Kang 0001, Yuan Zhang, Jiu-bin Ju |
A Formalized Taxonomy of DDoS Attacks Based on Similarity. |
ISI |
2006 |
DBLP DOI BibTeX RDF |
|
62 | Yang Xiang 0001, Wanlei Zhou 0001 |
Intelligent DDoS Packet Filtering in High-Speed Networks. |
ISPA |
2005 |
DBLP DOI BibTeX RDF |
|
62 | Jung-Taek Seo, Cheolho Lee, Jongsub Moon |
Defending DDoS Attacks Using Network Traffic Analysis and Probabilistic Packet Drop. |
GCC Workshops |
2004 |
DBLP DOI BibTeX RDF |
|
62 | Bin Xiao 0001, Wei Chen 0006, Yanxiang He |
A Novel Technique for Detecting DDoS Attacks at Its Early Stage. |
ISPA |
2004 |
DBLP DOI BibTeX RDF |
|
62 | Lukas Ruf, Arno Wagner, Károly Farkas, Bernhard Plattner |
A Detection and Filter System for Use Against Large-Scale DDoS Attacks in the Internet Backbone. |
IWAN |
2004 |
DBLP DOI BibTeX RDF |
|
62 | Roshan K. Thomas, Brian L. Mark, Tommy Johnson, James Croall |
NetBouncer: Client-legitimacy-based High-performance DDoS Filtering. |
DISCEX (1) |
2003 |
DBLP DOI BibTeX RDF |
|
62 | Jelena Mirkovic, Max Robinson, Peter L. Reiher |
Alliance formation for DDoS defense. |
NSPW |
2003 |
DBLP DOI BibTeX RDF |
|
60 | Rasool Jalili, Fatemeh Imani-Mehr, Morteza Amini, Hamid Reza Shahriari |
Detection of Distributed Denial of Service Attacks Using Statistical Pre-processor and Unsupervised Neural Networks. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
|
60 | Hyung-Woo Lee |
Advanced Packet Marking Mechanism with Pushback for IP Traceback. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
|
58 | Anjali Sardana, Ramesh Chandra Joshi |
Dual-level defense for networks under DDoS attacks. |
SAC |
2010 |
DBLP DOI BibTeX RDF |
entropy, detection, DDoS, Honeypots, characterization |
58 | Ke Li, Wanlei Zhou 0001, Shui Yu 0001, Bo Dai 0006 |
Effective DDoS Attacks Detection Using Generalized Entropy Metric. |
ICA3PP |
2009 |
DBLP DOI BibTeX RDF |
generalized entropy, DDoS, attacks detection |
58 | George S. Oreku, Jianzhong Li 0001, Tamara Pazynyuk |
An application-driven perspective on wireless devises security: the case of distributed denial-of-service (ddos). |
PM2HW2N |
2007 |
DBLP DOI BibTeX RDF |
handheld devices, distributed denial of service attacks (DDoS), wireless sensor nodes |
58 | Bin Xiao 0001, Wei Chen 0006, Yanxiang He |
A novel approach to detecting DDoS Attacks at an Early Stage. |
J. Supercomput. |
2006 |
DBLP DOI BibTeX RDF |
Cooperative Detection, Bloom Filter, DDoS Attack |
58 | Junfeng Tian, Min Peng, Yuling Liu |
A New Active DDoS Defense System Based on Automatic Learning. |
ASIAN |
2005 |
DBLP DOI BibTeX RDF |
active defense, neural network, statistical analysis, DDoS, traffic monitoring |
58 | Hyung-Woo Lee, Taekyoung Kwon 0002, Hyung-Jong Kim 0002 |
NS-2 Based IP Traceback Simulation Against Reflector Based DDoS Attack. |
AIS |
2004 |
DBLP DOI BibTeX RDF |
Reflector Attack, Simulation, DDoS, NS-2, IP Traceback |
58 | Haining Wang, Kang G. Shin |
Transport-Aware IP Routers: A Built-In Protection Mechanism to Counter DDoS Attacks. |
IEEE Trans. Parallel Distributed Syst. |
2003 |
DBLP DOI BibTeX RDF |
Distributed Denial of Service (DDoS) attacks, layer-4 differentiation, resource isolation, packet classification |
56 | Dongqi Wang, Guiran Chang, Xiaoshuo Feng, Rui Guo |
Research on the Detection of Distributed Denial of Service Attacks Based on the Characteristics of IP Flow. |
NPC |
2008 |
DBLP DOI BibTeX RDF |
Neural Network, Detection, DDoS, IP Flow |
56 | Chwan-Hwa John Wu, Chun-Ching Andy Huang, J. David Irwin |
Using Identity-Based Privacy-Protected Access Control Filter (IPACF) to against denial of service attacks and protect user privacy. |
SpringSim (3) |
2007 |
DBLP BibTeX RDF |
privacy, network security, DDoS, wireless security |
56 | Udaya Kiran Tupakula, Vijay Varadharajan |
Analysis of traceback techniques. |
ACSW |
2006 |
DBLP BibTeX RDF |
DoS, denial of service, DDoS, traceback |
52 | Mun Choon Chan, Ee-Chien Chang, Liming Lu, Peng Song Ngiam |
Effect of Malicious Synchronization. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
Distributed Denial of Service (DDoS) attacks, low rate DDoS attack, herding, synchronization, Network security, periodicity |
52 | Anna T. Lawniczak, Hao Wu 0002, Bruno N. Di Stefano |
Entropy Based Detection of DDoS Attacks in Packet Switching Network Models. |
Complex (2) |
2009 |
DBLP DOI BibTeX RDF |
entropy, packet switching network, distributed denial of service attack |
52 | Ashley Chonka, Wanlei Zhou 0001, Jaipal Singh, Yang Xiang 0001 |
Detecting and Tracing DDoS Attacks by Intelligent Decision Prototype. |
PerCom |
2008 |
DBLP DOI BibTeX RDF |
Intelligent Decision Prototype, Machine Learning, Decision trees, Distributed Denial of Service, IP Traceback |
52 | Shui Yu 0001, Wanlei Zhou 0001 |
Entropy-Based Collaborative Detection of DDOS Attacks on Community Networks. |
PerCom |
2008 |
DBLP DOI BibTeX RDF |
|
52 | Brij B. Gupta, Manoj Misra, Ramesh Chandra Joshi |
FVBA: A combined statistical approach for low rate degrading and high bandwidth disruptive DDoS attacks detection in ISP domain. |
ICON |
2008 |
DBLP DOI BibTeX RDF |
|
52 | Yun Huang 0001, Xianjun Geng, Andrew B. Whinston |
Defeating DDoS attacks by fixing the incentive chain. |
ACM Trans. Internet Techn. |
2007 |
DBLP DOI BibTeX RDF |
security, Denial-of-service, incentive, pricing |
52 | Yi Shi, Xinyu Yang, Huijun Zhu |
A Flooding-Based DoS/DDoS Detecting Algorithm Based on Traffic Measurement and Prediction. |
IWSEC |
2006 |
DBLP DOI BibTeX RDF |
|
52 | Yong Cui 0001, Lingjian Song, Ke Xu 0002 |
RCS: A Distributed Mechanism Against Link Flooding DDoS Attacks. |
ICOIN |
2006 |
DBLP DOI BibTeX RDF |
|
52 | Hyung-Woo Lee |
SVM Based Packet Marking Technique for Traceback on Malicious DDoS Traffic. |
ICOIN |
2006 |
DBLP DOI BibTeX RDF |
|
52 | Naoum Naoumov, Keith W. Ross |
Exploiting P2P systems for DDoS attacks. |
Infoscale |
2006 |
DBLP DOI BibTeX RDF |
|
52 | George C. Oikonomou, Jelena Mirkovic, Peter L. Reiher, Max Robinson |
A Framework for a Collaborative DDoS Defense. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
52 | Shigang Chen, Qingguo Song |
Perimeter-Based Defense against High Bandwidth DDoS Attacks. |
IEEE Trans. Parallel Distributed Syst. |
2005 |
DBLP DOI BibTeX RDF |
Network-level security and protection |
52 | Lan Li, Gyungho Lee |
DDoS Attack Detection and Wavelets. |
Telecommun. Syst. |
2005 |
DBLP DOI BibTeX RDF |
energy distribution, distributed denial of service, wavelet analysis, traffic characterization, attack detection |
52 | Jung-Taek Seo, Cheolho Lee, Jungtae Kim, Taeshik Shon, Jongsub Moon |
Probabilistic Packet Filtering Model to Protect Web Server from DDoS Attacks. |
NPC |
2005 |
DBLP DOI BibTeX RDF |
|
52 | Jun Zheng, Ming-Zeng Hu |
Intrusion Detection of DoS/DDoS and Probing Attacks for Web Services. |
WAIM |
2005 |
DBLP DOI BibTeX RDF |
|
52 | Jung-Taek Seo, Cheolho Lee, Jungtae Kim, Taeshik Shon, Jongsub Moon |
PPF Model with CTNT to Defend Web Server from DDoS Attack. |
EUC Workshops |
2005 |
DBLP DOI BibTeX RDF |
|
52 | Yanxiang He, Wei Chen 0006, Wenling Peng, Min Yang 0001 |
Efficient and Beneficial Defense Against DDoS Direct Attack and Reflector Attack. |
ISPA |
2005 |
DBLP DOI BibTeX RDF |
|
52 | Yang Xiang 0001, Wanlei Zhou 0001 |
Safeguard Information Infrastructure Against DDoS Attacks: Experiments and Modeling. |
CANS |
2005 |
DBLP DOI BibTeX RDF |
|
52 | Eric Y. Chen, Akinori Yonezawa |
Practical techniques for defending against DDoS attacks. |
AICCSA |
2005 |
DBLP DOI BibTeX RDF |
|
52 | Sleiman Itani, Najwa Aaraj, Darine Abdelahad, Ayman I. Kayssi |
Neighbor stranger discrimination: a new defense mechanism against Internet DDOS attacks. |
AICCSA |
2005 |
DBLP DOI BibTeX RDF |
|
52 | Yi Shi, Xinyu Yang |
A Novel Architecture for Detecting and Defending Against Flooding-Based DDoS Attacks. |
CIS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
52 | Guoyin Zhang, Jian Li, Guo-Chang Gu |
Research on defending DDoS attack - an expert system approach. |
SMC (4) |
2004 |
DBLP DOI BibTeX RDF |
|
52 | Xinyu Yang, Yong Liu, Ming Zeng, Yi Shi |
A Novel DDoS Attack Detecting Algorithm Based on the Continuous Wavelet Transform. |
AWCC |
2004 |
DBLP DOI BibTeX RDF |
|
52 | Eric Y. K. Chan, H. W. Chan, K. M. Chan, Vivien P. S. Chan, Samuel T. Chanson, Matthew M. H. Cheung, C. F. Chong, Kam-Pui Chow, Albert K. T. Hui, Lucas Chi Kwong Hui, Luke C. K. Lam, W. C. Lau, Kevin K. H. Pun, Anthony Y. F. Tsang, Wai Wan Tsang, Sam C. W. Tso, Dit-Yan Yeung, Kwun Yin Yu |
IDR: An Intrusion Detection Router for Defending against Distributed Denial-of-Service (DDoS) Attacks. |
ISPAN |
2004 |
DBLP DOI BibTeX RDF |
|
52 | Abraham Yaar, Adrian Perrig, Dawn Xiaodong Song |
Pi: A Path Identification Mechanism to Defend against DDoS Attack. |
S&P |
2003 |
DBLP DOI BibTeX RDF |
|
52 | Minho Sung, Jun (Jim) Xu |
IP Traceback-Based Intelligent Packet Filtering: A Novel Technique for Defending against Internet DDoS Attacks. |
ICNP |
2002 |
DBLP DOI BibTeX RDF |
|
50 | Yuh-Min Tseng |
Efficient authenticated key agreement protocols resistant to a denial-of-service attack. |
Int. J. Netw. Manag. |
2005 |
DBLP DOI BibTeX RDF |
|
48 | Jie Yu 0008, Chengfang Fang, Liming Lu, Zhoujun Li 0001 |
A Lightweight Mechanism to Mitigate Application Layer DDoS Attacks. |
Infoscale |
2009 |
DBLP DOI BibTeX RDF |
Trust, DDoS Attacks, Lightweight, Application layer |
48 | Do-Yoon Ha, Hwan-Kuk Kim, KyoungHee Ko, Chang-Yong Lee, JeongWook Kim, Hyun-Cheol Jeong |
Design and implementation of SIP-aware DDoS attack detection system. |
ICIS |
2009 |
DBLP DOI BibTeX RDF |
IP telephony security, session initiation protocol, DDoS |
48 | Rui Guo, Guiran Chang, Yuhai Qin, Baojing Sun, An Liu, Bencheng Zhang, Dan Peng |
DG-Based Active Defense Strategy to Defend against DDoS. |
MUE |
2008 |
DBLP DOI BibTeX RDF |
Active defense, Nash Equilibrium, DDoS, Differential Games |
48 | Yi-Tung F. Chan, Charles A. Shoniregun, Galyna A. Akmayeva |
A novel approach in securing DDoS attack. |
CSTST |
2008 |
DBLP DOI BibTeX RDF |
bypass guardian system (BGS), distributed denial of service (DDoS) attack, overload protection, congestion, router |
48 | Zhijun Wu 0001, Dong Zhang |
Scheme of Defending Against DDoS Attacks in Large-Scale ISP Networks. |
NPC |
2007 |
DBLP DOI BibTeX RDF |
Distribution-based Secure Overlay Nodes (DSON), China Education & Research Network (CERNET), Large-scale ISP Network, Router, Distributed Denial of Service (DDoS) |
48 | Yu Chen 0002, Kai Hwang 0001, Yu-Kwong Kwok |
Filtering of Shrew DDoS Attacks in Frequency Domain. |
LCN |
2005 |
DBLP DOI BibTeX RDF |
reduction of quality (RoQ), Internet traffic analysis, Network security, digital signal processing (DSP), distributed denial of service (DDoS) |
48 | Ming Li 0002, Jingao Liu, Dongyang Long |
Probability Principle of a Reliable Approach to Detect Signs of DDOS Flood Attacks. |
PDCAT |
2004 |
DBLP DOI BibTeX RDF |
Anomaly intrusion detection, DDOS, statistical detection, reliability, probability, intrusion prevention |
46 | Chu-Hsing Lin, Fuu-Cheng Jiang, Wei-Shen Lai, Wei-Yuah Lee, Wei-Cheng Hsu |
Counteract SYN flooding using second chance packet filtering. |
ICUIMC |
2009 |
DBLP DOI BibTeX RDF |
second chance packet filter, security, wireless LAN, DDoS, SYN flooding |
46 | Yongjin Kim, Ahmed Helmy |
Attacker traceback with cross-layer monitoring in wireless multi-hop networks. |
SASN |
2006 |
DBLP DOI BibTeX RDF |
DoS/DDoS attack, attacker traceback, cross-layer monitoring, wireless multi-hop networks |
46 | Marcus Tylutki, Karl N. Levitt |
Mitigating Distributed Denial of Service Attacks Using a Proportional-Integral-Derivative Controller. |
RAID |
2003 |
DBLP DOI BibTeX RDF |
PID control law, Automated Response, Denial of Service, DoS, Distributed Denial of Service, DDoS, Control Theory, Distributed Attacks |
43 | Jelena Mirkovic, Peter L. Reiher |
A taxonomy of DDoS attack and DDoS defense mechanisms. |
Comput. Commun. Rev. |
2004 |
DBLP DOI BibTeX RDF |
|
42 | Hamza Rahmani, Nabil Sahli, Farouk Kamoun |
Joint Entropy Analysis Model for DDoS Attack Detection. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
42 | Jelena Mirkovic, Peter L. Reiher, Christos Papadopoulos, Alefiya Hussain, Marla Shepard, Michael Berg, Robert Jung |
Testing a Collaborative DDoS Defense In a Red Team/Blue Team Exercise. |
IEEE Trans. Computers |
2008 |
DBLP DOI BibTeX RDF |
|
42 | Guanhua Yan, Stephan J. Eidenbenz |
DDoS Mitigation in Non-cooperative Environments. |
Networking |
2008 |
DBLP DOI BibTeX RDF |
|
42 | Yonghua You, Mohammad Zulkernine, Anwar Haque |
A Distributed Defense Framework for Flooding-Based DDoS Attacks. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
Unwanted Traffic, Intrusion Detection, Distributed Denial of Service |
42 | Kai Bu, Zhixin Sun |
A Method Based on AMHI for DDoS Attacks Detection and Defense. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
42 | Xiaolin Chen, Hui Deng, Feng Wang 0039, Mu Mu 0001, Sanglu Lu |
A Deployable Architecture against Application-level DDoS Attacks. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 2856 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|