Related references
Note: Only part of the references are listed.SSL/TLS session-aware user authentication - Or how to effectively thwart the man-in-the-middle
Rolf Oppliger et al.
COMPUTER COMMUNICATIONS (2006)
Early detection and prevention of denial-of-service attacks: A novel mechanism with propagated traced-back attack blocking
J Haggerty et al.
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2005)
You can run, but you can't hide: An effective statistical methodology to trace back DDoS attackers
TKT Law et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2005)
Remote timing attacks are practical
D Brumley et al.
COMPUTER NETWORKS (2005)
WebSOS: an overlay-based system for protecting web servers from denial of service attacks
A Stavrou et al.
COMPUTER NETWORKS (2005)
Tracing cyber attacks from the practical perspective
ZQ Gao et al.
IEEE COMMUNICATIONS MAGAZINE (2005)
Change-point monitoring for the detection of DoS attacks
HN Wang et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2004)
On IP traceback
A Belenky et al.
IEEE COMMUNICATIONS MAGAZINE (2003)
Network support for IP traceback
S Savage et al.
IEEE-ACM TRANSACTIONS ON NETWORKING (2001)
Towards trapping wily intruders in the large
G Mansfield et al.
COMPUTER NETWORKS (2000)