Cited By
View all- Wu CLiu TRajaei H(2008)Simulation for intrusion-resilient, DDoS-resistant authentication system (IDAS)Proceedings of the 2008 Spring simulation multiconference10.5555/1400549.1400687(844-851)Online publication date: 14-Apr-2008
- Wang CChiang Y(2008)Multi-Layer Traceback under the Hierarchical Tracers DeploymentProceedings of the 22nd International Conference on Advanced Information Networking and Applications - Workshops10.1109/WAINA.2008.186(590-595)Online publication date: 25-Mar-2008
- Muthuprasanna MManimaran G(2008)Distributed Divide-and-Conquer Techniques for Effective DDoS Attack DefensesProceedings of the 2008 The 28th International Conference on Distributed Computing Systems10.1109/ICDCS.2008.10(93-102)Online publication date: 17-Jun-2008