• Autograph

  • Referenced in 16 articles [sw23929]
  • local edge network from compromise and denial of service, it cannot alone effectively intervene...
  • SipHash

  • Referenced in 10 articles [sw09726]
  • table lookups protected against hash-flooding denial-of-service attacks. SipHash is simpler than MACs...
  • BotMiner

  • Referenced in 5 articles [sw21748]
  • Internet attacks, such as spam, distributed denial-of-service (DDoS), identity theft, and phishing. Most...
  • AMON

  • Referenced in 3 articles [sw35497]
  • infrastructure from nefarious activity (e.g. distributed denial of service--DDoS--attacks). Network monitoring is essential...
  • Flowfence

  • Referenced in 1 article [sw38852]
  • Flowfence: a denial of service defense system for software defined networking. Most Denial of Service ... present FlowFence, a lightweight and fast denial of service detection and mitigation system for Software...
  • OpenFlowSIA

  • Referenced in 1 article [sw38854]
  • Defined Networks from flooding attacks (Distributed Denial-of-Service) based on Support Vector Machine...
  • SDSNM

  • Referenced in 1 article [sw38853]
  • Defend against DDoS Attacks. The Distributed Denial of Service (DDoS) attack has seriously harmed network...
  • ArOMA

  • Referenced in 1 article [sw38845]
  • based autonomic DDoS mitigation framework. Distributed Denial of Service (DDoS) attacks have been the plague...
  • Trinity

  • Referenced in 1 article [sw21759]
  • provides a robust defense against denial-of-service and malevolent peer attacks...
  • JESS

  • Referenced in 1 article [sw38849]
  • scale security threats such as distributed-denial-of-service (DDoS) attacks are jeopardizing safety...
  • DNSCurve

  • Referenced in 1 article [sw22847]
  • today has no protection against denial of service. A sniffing attacker can disable...
  • BotFinder

  • Referenced in 1 article [sw21738]
  • from infected machines, and perform distributed denial-of-service attacks. Many approaches to bot detection...
  • FADM

  • Referenced in 1 article [sw38850]
  • System in Software-Defined Networking. Distributed Denial-of-Service (DDoS) flooding attack...
  • SGS

  • Referenced in 1 article [sw38855]
  • exploit this vulnerability to launch distributed denial-of-service (DDoS) attacks to the controller. Existing...
  • Fortify

  • Referenced in 1 article [sw26890]
  • Manipulation, (3) System Information Leak, (4) Denial of Service and (5) Unreleased Resource vulnerabilities...
  • StateSec

  • Referenced in 1 article [sw38848]
  • protect end-hosts from Distributed Denial of Service (DDoS). We propose StateSec, a novel approach...
  • EVFDT

  • Referenced in 0 articles [sw23093]
  • Decision Tree Algorithm for Detecting Distributed Denial of Service Attack in Cloud-Assisted Wireless Body...
  • NAXOS

  • Referenced in 73 articles [sw03050]
  • LaMacchia, Lauter and Mityagin recently presented a strong...
  • TCPDUMP

  • Referenced in 22 articles [sw04165]
  • Tcpdump prints out a description of the contents...
  • AspectJ

  • Referenced in 132 articles [sw04426]
  • aspect-oriented extension to the Java. AspectJ TM...