Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Denial of service")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 647

  • Page / 26
Export

Selection :

  • and

Security analysis of DoS vulnerability in stream authentication schemes using hash chainingKANG, Namhi; RULAND, Christoph.IEICE transactions on communications. 2005, Vol 88, Num 3, pp 1264-1265, issn 0916-8516, 2 p.Article

Hi3 : An efficient and secure networking architecture for mobile hostsGURTOV, Andrei; KORZUN, Dmitry; LUKYANENKO, Andrey et al.Computer communications. 2008, Vol 31, Num 10, pp 2457-2467, issn 0140-3664, 11 p.Article

Authentication schemes with no verification tableCHANG, Ya-Fen; CHANG, Chin-Chen.Applied mathematics and computation. 2005, Vol 167, Num 2, pp 820-832, issn 0096-3003, 13 p.Article

DDoSniffer: Detecting DDoS attack at the source agentsLAURENS, Vicky; MIEGE, Alexandre; EI SADDIK, Abdulmotaleb et al.International journal of advanced media and communication. 2009, Vol 3, Num 3, pp 290-311, issn 1462-4613, 22 p.Article

A backpressure technique for filtering spoofed traffic at upstream routersMALLIGA, S; TAMILARASI, A.International journal of security and networks (Print). 2010, Vol 5, Num 1, pp 3-14, issn 1747-8405, 12 p.Article

Weaknesses of two SAS-like password authentication schemesCHIANG, Min-Hung; KU, Wei-Chi.IEICE transactions on communications. 2006, Vol 89, Num 2, pp 594-597, issn 0916-8516, 4 p.Article

How to Make Content Centric Network (CCN) More Robust against DoS/DDoS AttackKIM, Daeyoub; LEE, Jihoon.IEICE transactions on communications. 2013, Vol 96, Num 1, pp 313-316, issn 0916-8516, 4 p.Article

Inferring internet denial-of-service activityMOORE, David; SHANNON, Colleen; BROWN, Douglas J et al.ACM transactions on computer systems. 2006, Vol 24, Num 2, pp 115-139, issn 0734-2071, 25 p.Article

Detecting DRDoS attacks by a simple response packet confirmation mechanismTSUNODA, Hiroshi; OHTA, Kohei; YAMAMOTO, Atsunori et al.Computer communications. 2008, Vol 31, Num 14, pp 3299-3306, issn 0140-3664, 8 p.Article

Prévention des dénis de service dans les réseaux publics = Service denial prevention in the public networksPAUL, Olivier.Techniques de l'ingénieur. Informatique. 2003, Vol HB4, Num H5810, pp H5810.1-H5810.12, issn 0245-9612Article

Extended deterministic edge router markingSAURABH, Samant; ROY, Sangita; ASHOK SINGH SAIRAM et al.International journal of communication networks and distributed systems (Print). 2014, Vol 13, Num 2, pp 169-186, issn 1754-3916, 18 p.Article

Cooperative routers against DoS attacksHA YOON SONG; KIM, Han-Gyoo.Lecture notes in computer science. 2003, pp 204-213, issn 0302-9743, isbn 3-540-40515-1, 10 p.Conference Paper

Keeping up with the jammers: Observe-and-adapt algorithms for studying mutually adaptive opponents : Data Security and Privacy in Wireless NetworksDEBRUHL, Bruce; TAGUE, Patrick.Pervasive and mobile computing (Print). 2014, Vol 12, pp 244-257, issn 1574-1192, 14 p.Article

Dynamic probabilistic packet marking for efficient IP tracebackLIU, Jenshiuh; LEE, Zhi-Jian; CHUNG, Yeh-Ching et al.Computer networks (1999). 2007, Vol 51, Num 3, pp 866-882, issn 1389-1286, 17 p.Article

Exact and heuristic algorithms for solving the generalized minimum filter placement problemCHISONGE MOFYA, E; COLE SMITH, J.Journal of combinatorial optimization. 2006, Vol 12, Num 3, pp 231-256, issn 1382-6905, 26 p.Article

Defending RFID authentication protocols against DoS attacksDANG NGUYEN DUC; KIM, Kwangjo.Computer communications. 2011, Vol 34, Num 3, pp 384-390, issn 0140-3664, 7 p.Article

Defense techniques for low-rate DoS attacks against application serversMACIA-FERNANDEZ, Gabriel; RODRIGUEZ-GOMEZ, Rafael A; DIAZ-VERDEJO, Jesús E et al.Computer networks (1999). 2010, Vol 54, Num 15, pp 2711-2727, issn 1389-1286, 17 p.Article

Anticipatory distributed packet filter configurations for carrier-grade IP networksTÖDTMANN, Birger; RATHGEB, Erwin P.Computer networks (1999). 2007, Vol 51, Num 10, pp 2565-2579, issn 1389-1286, 15 p.Article

Application of anomaly detection algorithms for detecting SYN flooding attacksSIRIS, Vasilios A; PAPAGALOU, Fotini.Computer communications. 2006, Vol 29, Num 9, pp 1433-1442, issn 0140-3664, 10 p.Article

Evaluation of a low-rate DoS attack against iterative serversMACIA-FERNANDEZ, Gabriel; DIAZ-VERDEJO, Jesus E; GARCFA-TEODORO, Pedro et al.Computer networks (1999). 2007, Vol 51, Num 4, pp 1013-1030, issn 1389-1286, 18 p.Article

Packet forwarding with source verificationSHUE, Craig A; GUPTA, Minaxi; DAVY, Matthew P et al.Computer networks (1999). 2008, Vol 52, Num 8, pp 1567-1582, issn 1389-1286, 16 p.Article

Most Active Band (MAB) Attack and Countermeasures in a Cognitive Radio NetworkHU, Nansai; YAO, Yu-Dong; MITOLA, Joseph et al.IEEE transactions on wireless communications. 2012, Vol 11, Num 3, pp 898-902, issn 1536-1276, 5 p.Article

An effective defence mechanism for Distributed Denial-of-Service (DDoS) attacks using router-based techniquesKUMARASAMY, Saravanan.International journal of critical infrastructures. 2010, Vol 6, Num 1, pp 73-80, issn 1475-3219, 8 p.Article

Security flaws in authentication and key establishment protocols for mobile communicationsSHIM, Kyungah; LEE, Young-Ran.Applied mathematics and computation. 2005, Vol 169, Num 1, pp 62-74, issn 0096-3003, 13 p.Article

Secure Delegation-Based Authentication Protocol for Wireless Roaming ServiceTSAI, Jia-Lun; LO, Nai-Wei; WU, Tzong-Chen et al.IEEE communications letters. 2012, Vol 16, Num 7, pp 1100-1102, issn 1089-7798, 3 p.Article

  • Page / 26