4.5 Article

DTRAB: Combating Against Attacks on Encrypted Protocols Through Traffic-Feature Analysis

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

SSL/TLS session-aware user authentication - Or how to effectively thwart the man-in-the-middle

Rolf Oppliger et al.

COMPUTER COMMUNICATIONS (2006)

Article Engineering, Electrical & Electronic

Early detection and prevention of denial-of-service attacks: A novel mechanism with propagated traced-back attack blocking

J Haggerty et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2005)

Article Computer Science, Theory & Methods

You can run, but you can't hide: An effective statistical methodology to trace back DDoS attackers

TKT Law et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2005)

Article Computer Science, Hardware & Architecture

Remote timing attacks are practical

D Brumley et al.

COMPUTER NETWORKS (2005)

Article Computer Science, Hardware & Architecture

WebSOS: an overlay-based system for protecting web servers from denial of service attacks

A Stavrou et al.

COMPUTER NETWORKS (2005)

Article Engineering, Electrical & Electronic

Tracing cyber attacks from the practical perspective

ZQ Gao et al.

IEEE COMMUNICATIONS MAGAZINE (2005)

Article Computer Science, Hardware & Architecture

Change-point monitoring for the detection of DoS attacks

HN Wang et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2004)

Article Engineering, Electrical & Electronic

On IP traceback

A Belenky et al.

IEEE COMMUNICATIONS MAGAZINE (2003)

Article Computer Science, Hardware & Architecture

Network support for IP traceback

S Savage et al.

IEEE-ACM TRANSACTIONS ON NETWORKING (2001)

Article Computer Science, Hardware & Architecture

Towards trapping wily intruders in the large

G Mansfield et al.

COMPUTER NETWORKS (2000)