341 | Add to Reading ListSource URL: www.icir.orgLanguage: English - Date: 2002-04-09 16:51:09
|
---|
342 | |
---|
343 | DDoS for Zombies John "JI" Ioannidis AT&T Labs – Research Add to Reading ListSource URL: www.icir.orgLanguage: English - Date: 2003-10-09 02:05:59
|
---|
344 | W2SP- Blase Ur and Vinod GanapathyAdd to Reading ListSource URL: w2spconf.comLanguage: English - Date: 2012-02-07 16:10:05
|
---|
345 | Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks Peng Ning, An Liu North Carolina State University and Wenliang DuAdd to Reading ListSource URL: discovery.csc.ncsu.eduLanguage: English - Date: 2011-11-09 13:26:13
|
---|
346 | C:/Users/Gautam/Desktop/JournalRevision/Thatte_JRNL_twoColumn_revision.dviAdd to Reading ListSource URL: www.isi.eduLanguage: English - Date: 2013-05-17 18:59:37
|
---|
347 | Countering DDoS Without Changing The Internet Angelos Keromytis Columbia University Add to Reading ListSource URL: www.icir.orgLanguage: English - Date: 2003-10-09 02:04:49
|
---|
348 | SIFF: A Stateless Internet Flow Filter to Mitigate DDoS Flooding Attacks∗ Abraham Yaar Adrian Perrig Dawn Song Carnegie Mellon University {ayaar, perrig, dawnsong}@cmu.eduAdd to Reading ListSource URL: www.icir.orgLanguage: English - Date: 2008-01-24 07:43:10
|
---|
349 | HTTP/2.0 : Intermediary Requirements Willy Tarreau - Exceliance (HAProxy project) Amos Jeffries - Treehouse Networks Ltd. (Squid project) Hit the space bar for next slideAdd to Reading ListSource URL: tools.ietf.orgLanguage: English - Date: 2012-03-26 03:57:41
|
---|
350 | BENCHMARKS FOR DDOS DEFENSE EVALUATION Jelena Mirkovic, Erinc Arikan and Songjie Wei University of Delaware Newark, DE Roshan Thomas SPARTA, Inc.Add to Reading ListSource URL: www.lasr.cs.ucla.eduLanguage: English - Date: 2006-11-28 14:50:49
|
---|