scientific article; zbMATH DE number 2088572
From MaRDI portal
Publication:3045132
zbMATH Open1046.68863MaRDI QIDQ3045132FDOQ3045132
Authors: Tao Peng, Christopher Leckie, Kotagiri Ramamohanarao
Publication date: 12 August 2004
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2345/23450697.htm
Title of this publication is not available (Why is that?)
Recommendations
Computing methodologies and applications (68U99) Performance evaluation, queueing, and scheduling in the context of computer systems (68M20) Network design and communication in computer systems (68M10) Network protocols (68M12)
Cited In (16)
- Trade-offs in probabilistic packet marking for IP traceback
- Learning the valid incoming direction of IP packets
- Applied Cryptography and Network Security
- LIPS: a lightweight permit system for packet source origin accountability
- Title not available (Why is that?)
- Dynamic probabilistic packet marking for efficient ip traceback
- On deterministic packet marking
- The Time for Reconstructing the Attack Graph in DDoS Attacks
- DMIPS -- defensive mechanism against IP spoofing
- Deterministic Packet Marking with Link Signatures for IP Traceback
- An authenticated deterministic packet marking scheme
- Honeypot back-propagation for mitigating spoofing distributed denial-of-service attacks
- Applied Cryptography and Network Security
- Packet forwarding with source verification
- A Proposal of Extension of FMS-Based Mechanism to Find Attack Paths
- Fragmentation considered leaking: port inference for DNS poisoning
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3045132)