Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("denial of service (DoS)")

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 13 of 13

  • Page / 1
Export

Selection :

  • and

Security analysis of DoS vulnerability in stream authentication schemes using hash chainingKANG, Namhi; RULAND, Christoph.IEICE transactions on communications. 2005, Vol 88, Num 3, pp 1264-1265, issn 0916-8516, 2 p.Article

A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research DirectionsATTAR, Alireza; TANG, Helen; VASILAKOS, Athanasios V et al.Proceedings of the IEEE. 2012, Vol 100, Num 12, pp 3172-3186, issn 0018-9219, 15 p.Article

Probabilistic packet marking with non-preemptive compensationYU KUO TSENG; HSI HAN CHEN; WEN SHYONG HSIEH et al.IEEE communications letters. 2004, Vol 8, Num 6, pp 359-361, issn 1089-7798, 3 p.Article

A Precise and Practical IP Traceback Technique Based on Packet Marking and LoggingDONG YAN; YULONG WANG; SEN SU et al.Journal of information science and engineering. 2012, Vol 28, Num 3, pp 453-470, issn 1016-2364, 18 p.Article

Design and analysis of a denial-of-service-resistant quality-of-service signaling protocol for MANETs : Cross-layer designs for mobile Ad Hoc networks and wireless sensor networksHEJMO, Marek; MARK, Brian L; ZOURIDAKI, Charikleia et al.IEEE transactions on vehicular technology. 2006, Vol 55, Num 3, pp 743-751, issn 0018-9545, 9 p.Conference Paper

Co-opetition Enabling Security for Cooperative Networks : Authorizing Composition Agreement Negotiations between Ambient NetworksSCHOO, Peter.Wireless personal communications. 2009, Vol 49, Num 3, pp 415-430, issn 0929-6212, 16 p.Conference Paper

Secure Delegation-Based Authentication Protocol for Wireless Roaming ServiceTSAI, Jia-Lun; LO, Nai-Wei; WU, Tzong-Chen et al.IEEE communications letters. 2012, Vol 16, Num 7, pp 1100-1102, issn 1089-7798, 3 p.Article

Protecting Satellite Systems from Disassociation DoS AttacksTING MA; YEE HUI LEE; MAODE MA et al.Wireless personal communications. 2013, Vol 69, Num 2, pp 623-638, issn 0929-6212, 16 p.Article

Backscatter from the data plane ― Threats to stability and security in information-centric network infrastructureWÄHLISCH, Matthias; SCHMIDT, Thomas C; VAHLENKAMP, Markus et al.Computer networks (1999). 2013, Vol 57, Num 16, pp 3192-3206, issn 1389-1286, 15 p.Article

Measures and Countermeasures for Null Frequency Jamming of On-Demand Routing Protocols in Wireless Ad Hoc NetworksBALAKRISHNAN, M; HUANG, H; ASOREY-CACHEDA, R et al.IEEE transactions on wireless communications. 2012, Vol 11, Num 11, pp 3860-3868, issn 1536-1276, 9 p.Article

A router-based technique to mitigate reduction of quality (RoQ) attacksSHEVTEKAR, Amey; AN SARI, Nirwan.Computer networks (1999). 2008, Vol 52, Num 5, pp 957-970, issn 1389-1286, 14 p.Article

Modular square root puzzles: Design of non-parallelizable and non-interactive client puzzlesJERSCHOW, Yves Igor; MAUVE, Martin.Computers & security. 2013, Vol 35, pp 25-36, issn 0167-4048, 12 p.Article

Prevention of DoS Attacks in VANETVERMA, Karan; HASBULLAH, Halabi; KUMAR, Ashok et al.Wireless personal communications. 2013, Vol 73, Num 1, pp 95-126, issn 0929-6212, 32 p.Article

  • Page / 1