Denial-of-service attacks

Results: 652



#Item
61Temporal Lensing and its Application in Pulsing Denial-of-Service Attacks Ryan Rasti∗† , Mukul Murthy∗ , Nicholas Weaver∗† , Vern Paxson∗† ∗ UC Berkeley, † ICSI,  VMware Abstract—We introduce tempor

Temporal Lensing and its Application in Pulsing Denial-of-Service Attacks Ryan Rasti∗† , Mukul Murthy∗ , Nicholas Weaver∗† , Vern Paxson∗† ∗ UC Berkeley, † ICSI,  VMware Abstract—We introduce tempor

Add to Reading List

Source URL: icir.org

Language: English - Date: 2015-04-22 12:30:04
62An Analysis of China’s “Great Cannon” Bill Marczak Nicholas Weaver Jakub Dalek Roya Ensafi UC Berkeley, Citizen Lab

An Analysis of China’s “Great Cannon” Bill Marczak Nicholas Weaver Jakub Dalek Roya Ensafi UC Berkeley, Citizen Lab

Add to Reading List

Source URL: www.usenix.org

Language: English
63Analysis of Fair Queueing schedulers in Real Systems Luigi Rizzo Universita‘ di Pisa Paolo Valente Universita‘ di Modena e Reggio Emilia

Analysis of Fair Queueing schedulers in Real Systems Luigi Rizzo Universita‘ di Pisa Paolo Valente Universita‘ di Modena e Reggio Emilia

Add to Reading List

Source URL: info.iet.unipi.it

Language: English - Date: 2012-05-25 16:00:35
64Motivation Contribution Summary Detecting Denial of Service Attacks in Tor Norman Danner

Motivation Contribution Summary Detecting Denial of Service Attacks in Tor Norman Danner

Add to Reading List

Source URL: fc09.ifca.ai

Language: English - Date: 2009-03-05 11:10:55
    65Bohatei: Flexible and Elastic DDoS Defense Seyed K. Fayaz∗ Yoshiaki Tobioka∗ Vyas Sekar∗ ∗ CMU † UIUC

    Bohatei: Flexible and Elastic DDoS Defense Seyed K. Fayaz∗ Yoshiaki Tobioka∗ Vyas Sekar∗ ∗ CMU † UIUC

    Add to Reading List

    Source URL: mdbailey.ece.illinois.edu

    Language: English - Date: 2015-08-05 21:41:25
    66Exploiting Underlying Structure for Detailed Reconstruction of an Internet-scale Event Abhishek Kumar Georgia Institute of Technology

    Exploiting Underlying Structure for Detailed Reconstruction of an Internet-scale Event Abhishek Kumar Georgia Institute of Technology

    Add to Reading List

    Source URL: www1.icsi.berkeley.edu

    Language: English - Date: 2012-09-26 16:43:03
    67Baiting Inside Attackers Using Decoy Documents Brian M. Bowen, Shlomo Hershkop, Angelos D. Keromytis, Salvatore J. Stolfo Department of Computer Science Columbia University  Abstract. The insider threat remains one of th

    Baiting Inside Attackers Using Decoy Documents Brian M. Bowen, Shlomo Hershkop, Angelos D. Keromytis, Salvatore J. Stolfo Department of Computer Science Columbia University Abstract. The insider threat remains one of th

    Add to Reading List

    Source URL: ids.cs.columbia.edu

    Language: English - Date: 2011-09-04 10:44:35
    68PFS: Probabilistic Filter Scheduling Against Distributed Denial-of-Service Attacks

    PFS: Probabilistic Filter Scheduling Against Distributed Denial-of-Service Attacks

    Add to Reading List

    Source URL: www.netsec.ethz.ch

    Language: English - Date: 2015-06-01 09:06:13
      69One Fast Guard for Life (or 9 months) Roger Dingledine1 , Nicholas Hopper2? , George Kadianakis1 , and Nick Mathewson1 1  2

      One Fast Guard for Life (or 9 months) Roger Dingledine1 , Nicholas Hopper2? , George Kadianakis1 , and Nick Mathewson1 1 2

      Add to Reading List

      Source URL: www-users.cs.umn.edu

      Language: English - Date: 2014-06-05 16:45:15
      70Denial of Service Attacks and Resilient Overlay Networks Angelos D. Keromytis Network Security Lab Computer Science Department, Columbia University

      Denial of Service Attacks and Resilient Overlay Networks Angelos D. Keromytis Network Security Lab Computer Science Department, Columbia University

      Add to Reading List

      Source URL: www.nis-summer-school.eu

      Language: English - Date: 2008-10-20 04:40:05