4.4 Article

An Effective Traceback Network Attack Procedure for Source Address Verification

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Enhanced resource allocation in mobile edge computing using reinforcement learning based MOACO algorithm for IIOT

S. Vimal et al.

COMPUTER COMMUNICATIONS (2020)

Article Computer Science, Information Systems

Fast attack detection system using log analysis and attack tree generation

Duhoe Kim et al.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2019)

Article Telecommunications

MTPKM: Multipart Trust Based Public Key Management Technique to Reduce Security Vulnerability in Mobile Ad-Hoc Networks

Y. Harold Robinson et al.

WIRELESS PERSONAL COMMUNICATIONS (2019)

Article Computer Science, Information Systems

Mitigating attacks in software defined networks

Kallol Krishna Karmakar et al.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2019)

Article Engineering, Electrical & Electronic

Deployment and validation of out of band IP traceback approach (OBTA) in wireless mesh network

Mouna Gassara et al.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2018)

Article Computer Science, Hardware & Architecture

HPSIPT: A high-precision single-packet IP traceback scheme

Vijayalakshmi Murugesan et al.

COMPUTER NETWORKS (2018)

Article Computer Science, Theory & Methods

FACT: A Framework for Authentication in Cloud-Based IP Traceback

Long Cheng et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Computer Science, Information Systems

Denial of service attacks, defences and research challenges

Vinko Zlomislic et al.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2017)

Article Computer Science, Information Systems

IP traceback with sparsely-tagged fragment marking scheme under massively multiple attack paths

Kichang Kim et al.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2013)

Article Computer Science, Theory & Methods

RIHT: A Novel Hybrid IP Traceback Scheme

Ming-Hour Yang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2012)

Article Computer Science, Information Systems

A hybrid scheme using packet marking and logging for IP traceback

S. Malliga et al.

INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY (2010)

Article Computer Science, Information Systems

On the State of IP Spoofing Defense

Toby Ehrenkranz et al.

ACM TRANSACTIONS ON INTERNET TECHNOLOGY (2009)

Article Computer Science, Theory & Methods

A more practical approach for single-packet IP traceback using packet logging and marking

Chao Gong et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2008)

Article Engineering, Electrical & Electronic

On IP traceback

A Belenky et al.

IEEE COMMUNICATIONS MAGAZINE (2003)

Article Telecommunications

IP traceback with deterministic packet marking

A Belenky et al.

IEEE COMMUNICATIONS LETTERS (2003)