Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Denegación de servicio")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 421

  • Page / 17
Export

Selection :

  • and

MarKing technique to isolate boundary bouter and attackerVIJAIRAGHAVAR, Vaarun; SHAH, Darshak; GALGALI, Pallavi et al.Computer (Long Beach, CA). 2007, Vol 40, Num 2, pp 54-58, issn 0018-9162, 5 p.Article

An anti-spam scheme using pre-challengesROMAN, Rodrigo; JIANYING ZHOU; LOPEZ, Javier et al.Computer communications. 2006, Vol 29, Num 15, pp 2739-2749, issn 0140-3664, 11 p.Article

Distributed defense against distributed denial-of-service attacksWEI SHI; YANG XIANG; WANLEI ZHOU et al.Lecture notes in computer science. 2005, pp 357-362, issn 0302-9743, isbn 3-540-29235-7, 1Vol, 6 p.Conference Paper

Access points vulnerabilities to DoS attacks in 802.11 networksFERRERI, F; BERNASCHI, M; VALCAMONICI, L et al.IEEE Wireless Communications and Networking Conference. 2004, pp 634-638, isbn 0-7803-8344-3, 5 p.Conference Paper

Bandwidth Distributed Denial of Service: Attacks and DefensesGEVA, Moti; HERZBERG, Amir; GEV, Yehoshua et al.IEEE security & privacy. 2014, Vol 12, Num 1, pp 54-61, issn 1540-7993, 8 p.Article

Advanced packet marking mechanism with pushback for IP tracebackLEE, Hyung-Woo.Lecture notes in computer science. 2004, pp 426-438, issn 0302-9743, isbn 3-540-22217-0, 13 p.Conference Paper

The LoSS Technique for Detecting New Denial of Service AttacksALLEN, William H; MARIN, Gerald A.IEEE Southeastcon. 2004, pp 302-309, isbn 0-7803-8367-2, 1Vol, 8 p.Conference Paper

Mathematical foundations for the design of a low-rate DoS attack to iterative servers (short paper)MACIA-FERNANDEZ, Gabriel; DIAZ-VERDEJO, Jesus E; GARCIA-TEODORO, Pedro et al.Lecture notes in computer science. 2006, pp 282-291, issn 0302-9743, isbn 3-540-49496-0, 10 p.Conference Paper

A hash-based strong-password authentication scheme without using smart cardsKU, Wei-Chi.Operating systems review. 2004, Vol 38, Num 1, pp 29-34, issn 0163-5980, 6 p.Article

A secure user authentication scheme using hash functionsYOON, Eun-Jun; RYU, Eun-Kyung; YOO, Kee-Young et al.Operating systems review. 2004, Vol 38, Num 2, pp 62-68, issn 0163-5980, 7 p.Article

A mechanism for detection and prevention of distributed denial of service attacksSEN, Jaydip; PIYALI ROY CHOWDHURY; SENGUPTA, Indranil et al.Lecture notes in computer science. 2006, pp 139-144, issn 0302-9743, isbn 978-3-540-68139-7, 1Vol, 6 p.Conference Paper

Security analysis of DoS vulnerability in stream authentication schemes using hash chainingKANG, Namhi; RULAND, Christoph.IEICE transactions on communications. 2005, Vol 88, Num 3, pp 1264-1265, issn 0916-8516, 2 p.Article

On reusing ephemeral keys in Diffie-Hellman key agreement protocolsMENEZES, Alfred; USTAOGLU, Berkant.International journal of applied cryptography (Print). 2010, Vol 2, Num 2, pp 154-158, issn 1753-0563, 5 p.Article

A backpressure technique for filtering spoofed traffic at upstream routersMALLIGA, S; TAMILARASI, A.International journal of security and networks (Print). 2010, Vol 5, Num 1, pp 3-14, issn 1747-8405, 12 p.Article

Defending against Internet worms using a phase space method from chaos theoryJING HU; JIANBO GAO; RAO, Nageswara S et al.Proceedings of SPIE, the International Society for Optical Engineering. 2007, pp 657003.1-657003.9, issn 0277-786X, isbn 978-0-8194-6692-1Conference Paper

Improvements to Mitchell's remote user authentication protocolGOYAL, Vipul; JAIN, Abhishek; QUISQUATER, Jean Jacques et al.Lecture notes in computer science. 2006, pp 69-80, issn 0302-9743, isbn 3-540-33354-1, 1Vol, 12 p.Conference Paper

A novel architecture for detecting and defending against flooding-based DDoS attacksYI SHI; XINYU YANG.Lecture notes in computer science. 2005, issn 0302-9743, isbn 3-540-30818-0, 2Vol, Part 2, 364-374Conference Paper

Detecting SYN flooding attacks near innocent sideYANXIANG HE; WEI CHEN; BIN XIAO et al.Lecture notes in computer science. 2005, pp 443-452, issn 0302-9743, isbn 3-540-30856-3, 1Vol, 10 p.Conference Paper

A denial-of-service-resistant IP traceback approachWANG, Bao-Tung; SCHULZRINNE, Henning.IEEE symposium on computers communications. 2004, isbn 0-7803-8623-X, 2Vol, vol1, 351-356Conference Paper

A source address filtering firewall to defend against denial of service attacksYI XU; LEE, Henry C. J.IEEE Vehicular Technology Conference. 2004, pp 3296-3300, isbn 0-7803-8521-7, 5 p.Conference Paper

Security enhancement for two remote user authentication schemesPENG, Shuanghe; HAN, Zhen; LIU, Jiqiang et al.International Conference on Signal Processing. 2004, pp 2628-2631, isbn 0-7803-8406-7, 4 p.Conference Paper

How to Make Content Centric Network (CCN) More Robust against DoS/DDoS AttackKIM, Daeyoub; LEE, Jihoon.IEICE transactions on communications. 2013, Vol 96, Num 1, pp 313-316, issn 0916-8516, 4 p.Article

Detecting Distributed Network Traffic Anomaly with Network-Wide Correlation AnalysisLI ZONGLIN; HU GUANGMIN; YAO XINGMIAO et al.EURASIP Journal on advances in signal processing (Print). 2009, Vol 2009, Num 3, pp 60-70, issn 1687-6172, 11 p.Article

Three-round smart card-based key exchange schemeKWON, Jeong Ok; JEONG, Ik Rae; LEE, Dong Hoon et al.IEICE transactions on communications. 2007, Vol 90, Num 11, pp 3255-3258, issn 0916-8516, 4 p.Article

Inferring internet denial-of-service activityMOORE, David; SHANNON, Colleen; BROWN, Douglas J et al.ACM transactions on computer systems. 2006, Vol 24, Num 2, pp 115-139, issn 0734-2071, 25 p.Article

  • Page / 17