Добірка наукової літератури з теми "Link Flooding Attacks"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Link Flooding Attacks".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Link Flooding Attacks"
Hsieh, Chih-Hsiang, Wei-Kuan Wang, Cheng-Xun Wang, Shi-Chun Tsai, and Yi-Bing Lin. "Efficient Detection of Link-Flooding Attacks with Deep Learning." Sustainability 13, no. 22 (November 12, 2021): 12514. http://dx.doi.org/10.3390/su132212514.
Повний текст джерелаWang, Xin, Xiaobo Ma, Jiahao Peng, Jianfeng Li, Lei Xue, Wenjun Hu, and Li Feng. "On Modeling Link Flooding Attacks and Defenses." IEEE Access 9 (2021): 159198–217. http://dx.doi.org/10.1109/access.2021.3131503.
Повний текст джерелаXue, Lei, Xiaobo Ma, Xiapu Luo, Edmond W. W. Chan, Tony T. N. Miu, and Guofei Gu. "LinkScope: Toward Detecting Target Link Flooding Attacks." IEEE Transactions on Information Forensics and Security 13, no. 10 (October 2018): 2423–38. http://dx.doi.org/10.1109/tifs.2018.2815555.
Повний текст джерелаChou, Li-Der, Chien-Chang Liu, Meng-Sheng Lai, Kai-Cheng Chiu, Hsuan-Hao Tu, Sen Su, Chun-Lin Lai, Chia-Kuan Yen, and Wei-Hsiang Tsai. "Behavior Anomaly Detection in SDN Control Plane: A Case Study of Topology Discovery Attacks." Wireless Communications and Mobile Computing 2020 (November 20, 2020): 1–16. http://dx.doi.org/10.1155/2020/8898949.
Повний текст джерелаWang, Lei, Qing Li, Yong Jiang, Xuya Jia, and Jianping Wu. "Woodpecker: Detecting and mitigating link-flooding attacks via SDN." Computer Networks 147 (December 2018): 1–13. http://dx.doi.org/10.1016/j.comnet.2018.09.021.
Повний текст джерелаWang, Juan, Ru Wen, Jiangqi Li, Fei Yan, Bo Zhao, and Fajiang Yu. "Detecting and Mitigating Target Link-Flooding Attacks Using SDN." IEEE Transactions on Dependable and Secure Computing 16, no. 6 (November 1, 2019): 944–56. http://dx.doi.org/10.1109/tdsc.2018.2822275.
Повний текст джерелаLu, Ning, Junwei Zhang, Ximeng Liu, Wenbo Shi, and Jianfeng Ma. "STOP: A Service Oriented Internet Purification Against Link Flooding Attacks." IEEE Transactions on Information Forensics and Security 17 (2022): 938–53. http://dx.doi.org/10.1109/tifs.2022.3152406.
Повний текст джерелаGkounis, Dimitrios, Vasileios Kotronis, Christos Liaskos, and Xenofontas Dimitropoulos. "On the Interplay of Link-Flooding Attacks and Traffic Engineering." ACM SIGCOMM Computer Communication Review 46, no. 2 (April 9, 2016): 5–11. http://dx.doi.org/10.1145/2935634.2935636.
Повний текст джерелаAydeger, Abdullah, Mohammad Hossein Manshaei, Mohammad Ashiqur Rahman, and Kemal Akkaya. "Strategic Defense Against Stealthy Link Flooding Attacks: A Signaling Game Approach." IEEE Transactions on Network Science and Engineering 8, no. 1 (January 1, 2021): 751–64. http://dx.doi.org/10.1109/tnse.2021.3052090.
Повний текст джерелаRasool, Raihan ur, Hua Wang, Usman Ashraf, Khandakar Ahmed, Zahid Anwar, and Wajid Rafique. "A survey of link flooding attacks in software defined network ecosystems." Journal of Network and Computer Applications 172 (December 2020): 102803. http://dx.doi.org/10.1016/j.jnca.2020.102803.
Повний текст джерелаДисертації з теми "Link Flooding Attacks"
Kang, Min Suk. "Handling Large-Scale Link-Flooding Attacks in the Internet." Research Showcase @ CMU, 2016. http://repository.cmu.edu/dissertations/833.
Повний текст джерелаLee, Soo Bum. "Localizing the effects of link flooding attacks in the internet." College Park, Md. : University of Maryland, 2009. http://hdl.handle.net/1903/10052.
Повний текст джерелаThesis research directed by: Dept. of Electrical and Computer Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
Rasool, Raihan Ur. "CyberPulse: A Security Framework for Software-Defined Networks." Thesis, 2020. https://vuir.vu.edu.au/42172/.
Повний текст джерелаЧастини книг з теми "Link Flooding Attacks"
Cui, Yong, Lingjian Song, and Ke Xu. "RCS: A Distributed Mechanism Against Link Flooding DDoS Attacks." In Information Networking. Advances in Data Communications and Wireless Networks, 764–74. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11919568_76.
Повний текст джерелаKang, Min Suk, Virgil D. Gligor, and Vyas Sekar. "Defending Against Evolving DDoS Attacks: A Case Study Using Link Flooding Incidents." In Security Protocols XXIV, 47–57. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-62033-6_7.
Повний текст джерелаRezazad, Mostafa, Matthias R. Brust, Mohammad Akbari, Pascal Bouvry, and Ngai-Man Cheung. "Detecting Target-Area Link-Flooding DDoS Attacks Using Traffic Analysis and Supervised Learning." In Advances in Intelligent Systems and Computing, 180–202. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-03405-4_12.
Повний текст джерелаGligor, Virgil D. "Defending Against Evolving DDoS Attacks: A Case Study Using Link Flooding Incidents (Transcript of Discussion)." In Security Protocols XXIV, 58–66. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-62033-6_8.
Повний текст джерелаPeng, Jiahao, Xiaobo Ma, Jianfeng Li, Lei Xue, and Wenjun Hu. "Shoot at a Pigeon and Kill a Crow: On Strike Precision of Link Flooding Attacks." In Network and System Security, 436–51. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-02744-5_32.
Повний текст джерелаYang, Guosong, and João P. Hespanha. "Modeling and Mitigating Link-Flooding Distributed Denial-of-Service Attacks via Learning in Stackelberg Games." In Handbook of Reinforcement Learning and Control, 433–63. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-60990-0_15.
Повний текст джерелаNalayini, C. M., and Jeevaa Katiravan. "Block Link Flooding Algorithm for TCP SYN Flooding Attack." In International Conference on Computer Networks and Communication Technologies, 895–905. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8681-6_83.
Повний текст джерелаXie, Lixia, Ying Ding, and Hongyu Yang. "Mitigating Link-Flooding Attack with Segment Rerouting in SDN." In Cyberspace Safety and Security, 57–69. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-37337-5_6.
Повний текст джерелаPonnusamy, Vasaki, Naveena Devi Regunathan, Pardeep Kumar, Robithoh Annur, and Khalid Rafique. "A Review of Attacks and Countermeasures in Internet of Things and Cyber Physical Systems." In Industrial Internet of Things and Cyber-Physical Systems, 1–24. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2803-7.ch001.
Повний текст джерелаGanesan, Sangeetha, Vijayalakshmi Muthuswamy, Ganapathy Sannasi, and Kannan Arputharaj. "A Comprehensive Analysis of Congestion Control Models in Wireless Sensor Networks." In Sensor Technology, 1194–214. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2454-1.ch057.
Повний текст джерелаТези доповідей конференцій з теми "Link Flooding Attacks"
Kim, Jinwoo, and Seungwon Shin. "Software-Defined HoneyNet: Towards Mitigating Link Flooding Attacks." In 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W). IEEE, 2017. http://dx.doi.org/10.1109/dsn-w.2017.10.
Повний текст джерелаBelabed, Dallal, Mathieu Bouet, and Vania Conan. "Centralized Defense Using Smart Routing Against Link-Flooding Attacks." In 2018 2nd Cyber Security in Networking Conference (CSNet). IEEE, 2018. http://dx.doi.org/10.1109/csnet.2018.8602966.
Повний текст джерелаWang, Zhaoxu, Huachun Zhou, Bohao Feng, Wei Quan, and Shui Yu. "MTF: Mitigating Link Flooding Attacks in Delay Tolerant Networks." In 2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI). IEEE, 2018. http://dx.doi.org/10.1109/smartworld.2018.00264.
Повний текст джерелаDing, Xuyang, Feng Xiao, Man Zhou, and Zhibo Wang. "Active Link Obfuscation to Thwart Link-flooding Attacks for Internet of Things." In 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2020. http://dx.doi.org/10.1109/trustcom50675.2020.00040.
Повний текст джерелаKang, Min Suk, Virgil D. Gligor, and Vyas Sekar. "SPIFFY: Inducing Cost-Detectability Tradeoffs for Persistent Link-Flooding Attacks." In Network and Distributed System Security Symposium. Reston, VA: Internet Society, 2016. http://dx.doi.org/10.14722/ndss.2016.23147.
Повний текст джерелаLee, Soo Bum, and Virgil D. Gligor. "FLoc : Dependable Link Access for Legitimate Traffic in Flooding Attacks." In 2010 IEEE 30th International Conference on Distributed Computing Systems. IEEE, 2010. http://dx.doi.org/10.1109/icdcs.2010.78.
Повний текст джерелаLiaskos, Christos, Vasileios Kotronis, and Xenofontas Dimitropoulos. "A novel framework for modeling and mitigating distributed link flooding attacks." In IEEE INFOCOM 2016 - IEEE Conference on Computer Communications. IEEE, 2016. http://dx.doi.org/10.1109/infocom.2016.7524507.
Повний текст джерелаChen, Xu, Wei Feng, Ning Ge, and Xianbin Wang. "Defending Link Flooding Attacks under Incomplete Information: A Bayesian Game Approach." In ICC 2020 - 2020 IEEE International Conference on Communications (ICC). IEEE, 2020. http://dx.doi.org/10.1109/icc40277.2020.9148653.
Повний текст джерелаAydeger, Abdullah, Nico Saputro, and Kemal Akkaya. "Utilizing NFV for Effective Moving Target Defense Against Link Flooding Reconnaissance Attacks." In MILCOM 2018 - IEEE Military Communications Conference. IEEE, 2018. http://dx.doi.org/10.1109/milcom.2018.8599803.
Повний текст джерелаXing, Junchi, Jingjing Cai, Boyang Zhou, and Chunming Wu. "A Deep ConvNet-Based Countermeasure to Mitigate Link Flooding Attacks Using Software-Defined Networks." In 2019 IEEE Symposium on Computers and Communications (ISCC). IEEE, 2019. http://dx.doi.org/10.1109/iscc47284.2019.8969595.
Повний текст джерелаЗвіти організацій з теми "Link Flooding Attacks"
Lee, Soo B., and Virgil D. Gligor. FLoc : Dependable Link Access for Legitimate Traffic in Flooding Attacks. Fort Belvoir, VA: Defense Technical Information Center, November 2011. http://dx.doi.org/10.21236/ada580050.
Повний текст джерелаLee, Soo B., and Virgil D. Gligor. FLoc: Dependable Link Access for Legitimate Traffic in Flooding Attacks. Fort Belvoir, VA: Defense Technical Information Center, November 2011. http://dx.doi.org/10.21236/ada582042.
Повний текст джерелаRamanujan, Ranga S., Doug Harper, Maher Kaddoura, David Baca, John Wu, and Kevin Millikin. Organic Techniques for Protecting Virtual Private Network (VPN) Services from Access Link Flooding Attacks. Fort Belvoir, VA: Defense Technical Information Center, January 2002. http://dx.doi.org/10.21236/ada436292.
Повний текст джерела