Defending network-based services against denial of service attacks

被引:0
|
作者
Department of Computer Science, University of Texas at Dallas, Richardson, TX 75080, United States [1 ]
机构
来源
Int. J. Netw. Secur. | 2009年 / 2卷 / 186-200期
关键词
17;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] Defending network-based services against denial of service attacks
    Kurian, Jinu
    Sarac, Kamil
    Almeroth, Kevin
    ICCCN 2006: 15TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, PROCEEDINGS, 2006, : 17 - +
  • [2] Defending networks against denial of service attacks
    Gelenbe, E
    Gellman, M
    Loukas, G
    UNMANNED/UNATTENDED SENSORS AND SENSOR NETWORKS, 2004, 5611 : 233 - 243
  • [3] Defending against denial of service attacks in scout
    Spatscheck, O
    Peterson, LL
    USENIX ASSOCIATION PROCEEDINGS OF THE THIRD SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION (OSDI '99), 1999, : 59 - 72
  • [4] Defending against denial-of-service attacks with puzzle auctions
    Wang, XF
    Reiter, MK
    2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, : 78 - 92
  • [5] Defending against Distributed Denial of Service Attacks: Issues and Challenges
    Gupta, B. B.
    Joshi, R. C.
    Misra, Manoj
    INFORMATION SECURITY JOURNAL, 2009, 18 (05): : 224 - 247
  • [6] Denial of service attacks on network-based control systems: Impact and mitigation
    Long, Men
    Wu, Chwan-Hwa
    Hung, John Y.
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2005, 1 (02) : 85 - 96
  • [7] Defending against flooding-based distributed denial-of-service attacks: A tutorial
    Chang, RKC
    IEEE COMMUNICATIONS MAGAZINE, 2002, 40 (10) : 42 - 51
  • [8] Defending against distributed denial of service attacks with bating puzzle auction
    Kim, S
    Wee, K
    Hong, M
    8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL III, PROCEEDINGS: COMMUNICATION AND NETWORK SYSTEMS, TECHNOLOGIES AND APPLICATIONS, 2004, : 361 - 366
  • [9] Network-based synchronous control of memristive neural networks with denial of service attacks
    Cai, Xinyu
    Zhang, Yijun
    Jiang, Zhcnpeng
    PROCEEDINGS OF THE 39TH CHINESE CONTROL CONFERENCE, 2020, : 7522 - 7527
  • [10] Defending Convolutional Neural Network-Based Object Detectors Against Adversarial Attacks
    Cheng, Jeffrey
    Hu, Victor
    2020 9TH IEEE INTEGRATED STEM EDUCATION CONFERENCE (ISEC 2020), 2020,