Distributed divide-and-conquer techniques for effective DDoS attack defenses

M Muthuprasanna, G Manimaran - 2008 The 28th International …, 2008 - ieeexplore.ieee.org
Distributed Denial-of-Service (DDoS) attacks have emerged as a popular means of causing
mass targeted service disruptions, often for extended periods of time. The relative ease and …

Microphone array speech dereverberation using coarse channel modeling

SM Griebel, MS Brandstein - 2001 IEEE International …, 2001 - ieeexplore.ieee.org
This paper presents a model-based method for the enhancement of multichannel speech
acquired under reverberant conditions. A very coarse estimate of the channel responses …

[引用][C] 基于超混沌系统的图像加密算法的安全性分析

刘金梅, 丘水生, 刘伟平 - 计算机应用研究, 2010

[图书][B] Evaluation of Hash Functions for Multipoint Sampling in IP Networks

C Henke, BF Fokus, IT Zseby, DIC Schmoll, BTU Berlin… - 2012 - publica.fraunhofer.de
Network Measurements play an essential role in operating and developing today's Internet.
A variety of measurement applications demand for multipoint network measurements, eg …

Simulation for intrusion-resilient, DDoS-resistant authentication system (IDAS)

CHJ Wu, T Liu - Proceedings of the 2008 Spring simulation …, 2008 - dl.acm.org
SSL (Secure Sockets Layer) protocol and IPSec (Internet Protocol Security) are widely used
for identity authentication and communication protection. However, both protocols suffer …

Multi-Layer Traceback under the Hierarchical Tracers Deployment

CH Wang, YC Chiang - 22nd International Conference on …, 2008 - ieeexplore.ieee.org
The enhanced routers which can provide tracing service are referred to as tracers. In this
paper, we propose a new hierarchical tracers deployment which can guarantee that the …

Intrusion Resilient and Real-Time Forensics

T Liu - 2011 - etd.auburn.edu
Intrusion to corporate network and unauthorized access to sensitive information can cause
huge damage and intellectual property loss. In addition to intrusion, Denial of service …

[PDF][PDF] Modeling of Attacks over Scale-Free Computer Networks using Colored Petri Nets

LM Healy - 2007 - Citeseer
Modeling of Attacks over Scale-Free Computer Networks using Colored Petri Nets The
purpose of the research presented in this proposal is to determine the feasibility of inferring …

[引用][C] 基于追踪部署的着色包标记算法的研究

刘渊, 陈彦, 李秀珍 - 计算机应用研究, 2008

[引用][C] 基于追踪部署的动态概率包标记算法的研究

陈彦, 彭昱静 - 电脑知识与技术, 2010