-
Autograph
- Referenced in 16 articles
[sw23929]
- local edge network from compromise and denial of service, it cannot alone effectively intervene...
-
SipHash
- Referenced in 10 articles
[sw09726]
- table lookups protected against hash-flooding denial-of-service attacks. SipHash is simpler than MACs...
-
BotMiner
- Referenced in 5 articles
[sw21748]
- Internet attacks, such as spam, distributed denial-of-service (DDoS), identity theft, and phishing. Most...
-
AMON
- Referenced in 3 articles
[sw35497]
- infrastructure from nefarious activity (e.g. distributed denial of service--DDoS--attacks). Network monitoring is essential...
-
Flowfence
- Referenced in 1 article
[sw38852]
- Flowfence: a denial of service defense system for software defined networking. Most Denial of Service ... present FlowFence, a lightweight and fast denial of service detection and mitigation system for Software...
-
OpenFlowSIA
- Referenced in 1 article
[sw38854]
- Defined Networks from flooding attacks (Distributed Denial-of-Service) based on Support Vector Machine...
-
SDSNM
- Referenced in 1 article
[sw38853]
- Defend against DDoS Attacks. The Distributed Denial of Service (DDoS) attack has seriously harmed network...
-
ArOMA
- Referenced in 1 article
[sw38845]
- based autonomic DDoS mitigation framework. Distributed Denial of Service (DDoS) attacks have been the plague...
-
Trinity
- Referenced in 1 article
[sw21759]
- provides a robust defense against denial-of-service and malevolent peer attacks...
-
JESS
- Referenced in 1 article
[sw38849]
- scale security threats such as distributed-denial-of-service (DDoS) attacks are jeopardizing safety...
-
DNSCurve
- Referenced in 1 article
[sw22847]
- today has no protection against denial of service. A sniffing attacker can disable...
-
BotFinder
- Referenced in 1 article
[sw21738]
- from infected machines, and perform distributed denial-of-service attacks. Many approaches to bot detection...
-
FADM
- Referenced in 1 article
[sw38850]
- System in Software-Defined Networking. Distributed Denial-of-Service (DDoS) flooding attack...
-
SGS
- Referenced in 1 article
[sw38855]
- exploit this vulnerability to launch distributed denial-of-service (DDoS) attacks to the controller. Existing...
-
Fortify
- Referenced in 1 article
[sw26890]
- Manipulation, (3) System Information Leak, (4) Denial of Service and (5) Unreleased Resource vulnerabilities...
-
StateSec
- Referenced in 1 article
[sw38848]
- protect end-hosts from Distributed Denial of Service (DDoS). We propose StateSec, a novel approach...
-
EVFDT
- Referenced in 0 articles
[sw23093]
- Decision Tree Algorithm for Detecting Distributed Denial of Service Attack in Cloud-Assisted Wireless Body...
-
NAXOS
- Referenced in 73 articles
[sw03050]
- LaMacchia, Lauter and Mityagin recently presented a strong...
-
TCPDUMP
- Referenced in 22 articles
[sw04165]
- Tcpdump prints out a description of the contents...
-
AspectJ
- Referenced in 132 articles
[sw04426]
- aspect-oriented extension to the Java. AspectJ TM...