On deterministic packet marking
From MaRDI portal
Recommendations
Cited in
(17)- Dynamic probabilistic packet marking for efficient ip traceback
- scientific article; zbMATH DE number 2088572 (Why is no real title available?)
- The Time for Reconstructing the Attack Graph in DDoS Attacks
- Trade-offs in probabilistic packet marking for IP traceback
- A Proposal of Extension of FMS-Based Mechanism to Find Attack Paths
- Deterministic Packet Marking with Link Signatures for IP Traceback
- LIPS: a lightweight permit system for packet source origin accountability
- A practical and robust inter-domain marking scheme for IP traceback
- An authenticated deterministic packet marking scheme
- Applied Cryptography and Network Security
- scientific article; zbMATH DE number 1941225 (Why is no real title available?)
- Trace malicious source to guarantee cyber security for mass monitor critical infrastructure
- Honeypot back-propagation for mitigating spoofing distributed denial-of-service attacks
- Tabu marking scheme to speedup IP traceback
- Applied Cryptography and Network Security
- Information and Communications Security
- scientific article; zbMATH DE number 2112409 (Why is no real title available?)
This page was built for publication: On deterministic packet marking
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q885124)