Trinoo

Results: 6



#Item
1T h e r e i s i n c r e a s i n g ta l k o f c y b e r Dav i d D i t t r i ch  the conflicts facing those responding to cyberconflict Dave Dittrich holds an appointment as an

T h e r e i s i n c r e a s i n g ta l k o f c y b e r Dav i d D i t t r i ch the conflicts facing those responding to cyberconflict Dave Dittrich holds an appointment as an

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 2009-12-01 11:51:21
2D-WARD: DDoS Network Attack Recognition and Defense Ph.D. Dissertation Prospectus  Jelena Mirkovi

D-WARD: DDoS Network Attack Recognition and Defense Ph.D. Dissertation Prospectus Jelena Mirkovi

Add to Reading List

Source URL: www.lasr.cs.ucla.edu

Language: English - Date: 2002-01-24 19:27:00
3Distributed Denial of Service: Taxonomies of Attacks, Tools and Countermeasures Stephen M. Specht Electrical Engineering Princeton University Princeton, NJ 08544

Distributed Denial of Service: Taxonomies of Attacks, Tools and Countermeasures Stephen M. Specht Electrical Engineering Princeton University Princeton, NJ 08544

Add to Reading List

Source URL: palms.ee.princeton.edu

Language: English - Date: 2004-11-30 12:42:22
4Denial of Service Attacks Qijun Gu, PhD. Assistant Professor

Denial of Service Attacks Qijun Gu, PhD. Assistant Professor

Add to Reading List

Source URL: s2.ist.psu.edu

Language: English - Date: 2008-02-21 16:49:08
5Author Guidelines for IEEE style format

Author Guidelines for IEEE style format

Add to Reading List

Source URL: www.utica.edu

Language: English - Date: 2006-01-06 12:16:35
6Trends in Denial of Service Attack Technology

Trends in Denial of Service Attack Technology

Add to Reading List

Source URL: www.cert.org

Language: English - Date: 2008-07-31 14:36:16