Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
Controlling high bandwidth aggregates in the network
ACM SIGCOMM Computer Communication Review
Query-flood DoS attacks in gnutella
Proceedings of the 9th ACM conference on Computer and communications security
Does Open Source Improve System Security?
IEEE Software
Sustaining Availability of Web Services under Distributed Denial of Service Attacks
IEEE Transactions on Computers
Open Problems in Data-Sharing Peer-to-Peer Systems
ICDT '03 Proceedings of the 9th International Conference on Database Theory
Design and Implementation of FPGA Circuits for High Speed Network Monitors
FPL '02 Proceedings of the Reconfigurable Computing Is Going Mainstream, 12th International Conference on Field-Programmable Logic and Applications
A Model for Mobile Code Using Interacting Automata
IEEE Transactions on Mobile Computing
The effectiveness of request redirection on CDN robustness
ACM SIGOPS Operating Systems Review - OSDI '02: Proceedings of the 5th symposium on Operating systems design and implementation
A public-key based authentication and key establishment protocol coupled with a client puzzle
Journal of the American Society for Information Science and Technology
Hop-count filtering: an effective defense against spoofed DDoS traffic
Proceedings of the 10th ACM conference on Computer and communications security
Defending Against Flash Crowds and Malicious Traffic Attacks with An Auction-Based Method
WI '04 Proceedings of the 2004 IEEE/WIC/ACM International Conference on Web Intelligence
Change-Point Monitoring for the Detection of DoS Attacks
IEEE Transactions on Dependable and Secure Computing
The effectiveness of request redirection on CDN robustness
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
IEEE Transactions on Dependable and Secure Computing
Mitigating denial of service attacks: a tutorial
Journal of Computer Security
Survey of network-based defense mechanisms countering the DoS and DDoS problems
ACM Computing Surveys (CSUR)
Dynamic probabilistic packet marking for efficient IP traceback
Computer Networks: The International Journal of Computer and Telecommunications Networking
Information sharing for distributed intrusion detection systems
Journal of Network and Computer Applications
FEADS: a framework for exploring the application design space on network processors
International Journal of Parallel Programming
Protecting information infrastructure from DDoS attacks by MADF
International Journal of High Performance Computing and Networking
Single packet IP traceback in AS-level partial deployment scenario
International Journal of Security and Networks
A general model of probabilistic packet marking for IP traceback
Proceedings of the 2008 ACM symposium on Information, computer and communications security
On Modeling Counteraction against TCP SYN Flooding
Information Networking. Towards Ubiquitous Networking and Services
IEEE/ACM Transactions on Networking (TON)
P2P Networking and Applications
P2P Networking and Applications
INFORMS Journal on Computing
Load-balanced agent activation for value-added network services
Computer Communications
A backpressure technique for filtering spoofed traffic at upstream routers
International Journal of Security and Networks
A table-driven approach for IP traceback based on network statistic analysis
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 3
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
An attack classification mechanism based on multiple support vector machines
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
Traceback in wireless sensor networks with packet marking and logging
Frontiers of Computer Science in China
Review: A survey on content-centric technologies for the current Internet: CDN and P2P solutions
Computer Communications
Intelligent DDoS packet filtering in high-speed networks
ISPA'05 Proceedings of the Third international conference on Parallel and Distributed Processing and Applications
Probabilistic packet filtering model to protect web server from DDoS attacks
NPC'05 Proceedings of the 2005 IFIP international conference on Network and Parallel Computing
AAIM'06 Proceedings of the Second international conference on Algorithmic Aspects in Information and Management
Probability principle of a reliable approach to detect signs of DDOS flood attacks
PDCAT'04 Proceedings of the 5th international conference on Parallel and Distributed Computing: applications and Technologies
A real-time and reliable approach to detecting traffic variations at abnormally high and low rates
ATC'06 Proceedings of the Third international conference on Autonomic and Trusted Computing
An extensible and flexible system for network anomaly detection
AN'06 Proceedings of the First IFIP TC6 international conference on Autonomic Networking
SVM approach with CTNT to detect DDoS attacks in grid computing
GCC'05 Proceedings of the 4th international conference on Grid and Cooperative Computing
A new DDoS detection model using multiple SVMs and TRA
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
PPF model with CTNT to defend web server from DDoS attack
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
NS-2 based IP traceback simulation against reflector based DDoS attack
AIS'04 Proceedings of the 13th international conference on AI, Simulation, and Planning in High Autonomy Systems
A distributed network architecture for robust internet voting systems
EGOV'05 Proceedings of the 4th international conference on Electronic Government
SVM based packet marking technique for traceback on malicious DDoS traffic
ICOIN'06 Proceedings of the 2006 international conference on Information Networking: advances in Data Communications and Wireless Networks
RCS: a distributed mechanism against link flooding DDoS attacks
ICOIN'06 Proceedings of the 2006 international conference on Information Networking: advances in Data Communications and Wireless Networks
Authenticated IPv6 packet traceback against reflector based packet flooding attack
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part I
Botnet tracking: exploring a root-cause methodology to prevent distributed denial-of-service attacks
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
Review: Analyzing well-known countermeasures against distributed denial of service attacks
Computer Communications
Proceedings of the 3rd international ACM SIGSOFT symposium on Architecting Critical Systems
Performance analysis of modified secure link state routing protocol
International Journal of Networking and Virtual Organisations
Ensemble-based DDoS detection and mitigation model
Proceedings of the Fifth International Conference on Security of Information and Networks
Hi-index | 4.10 |
First Page of the Article