Related references
Note: Only part of the references are listed.An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data
Jian Shen et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)
Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data
Zhangjie Fu et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)
A survey of intrusion detection systems in smart grid
Julius Jow et al.
INTERNATIONAL JOURNAL OF SENSOR NETWORKS (2017)
A secure cloud-assisted urban data sharing framework for ubiquitous-cities
Jian Shen et al.
PERVASIVE AND MOBILE COMPUTING (2017)
DDoS attacks in cloud computing: Issues, taxonomy, and future directions
Gaurav Somani et al.
COMPUTER COMMUNICATIONS (2017)
A distributed filtering mechanism against DDoS attacks: ScoreForCore
Kubra Kalkan et al.
COMPUTER NETWORKS (2016)
A Feasible IP Traceback Framework through Dynamic Deterministic Packet Marking
Shui Yu et al.
IEEE TRANSACTIONS ON COMPUTERS (2016)
Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement
Zhangjie Fu et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)
A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing
Zhihua Xia et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)
E-LDAT: a lightweight system for DDoS flooding attack detection and IP traceback using extended entropy metric
Monowar H. Bhuyan et al.
SECURITY AND COMMUNICATION NETWORKS (2016)
Election-based method for fault tolerance in a hierarchical sensor network (EFTOHSN): a case study of an indoor localisation system
Mohamed Naili et al.
International Journal of Sensor Networks (2016)
DDoS attack protection in the era of cloud computing and Software-Defined Networking
Bing Wang et al.
COMPUTER NETWORKS (2015)
Passive IP Traceback: Disclosing the Locations of IP Spoofers From Path Backscatter
Guang Yao et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)
Fault-tolerant topology evolution and analysis of sensing systems in IoT based on complex networks
Shuming Xiong et al.
INTERNATIONAL JOURNAL OF SENSOR NETWORKS (2015)
High performance simulation technology in the Internet of Things
Buquan Liu
INTERNATIONAL JOURNAL OF SENSOR NETWORKS (2015)
A moving target DDoS defense mechanism
Huangxin Wang et al.
COMPUTER COMMUNICATIONS (2014)
ICMP based IP traceback with negligible overhead for highly distributed reflector attack using bloom filters
S. Saurabh et al.
COMPUTER COMMUNICATIONS (2014)
DDoS Detection Method Based on Chaos Analysis of Network Traffic Entropy
Xinlei Ma et al.
IEEE COMMUNICATIONS LETTERS (2014)
Can We Beat DDoS Attacks in Clouds?
Shui Yu et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2014)
A transform domain-based anomaly detection approach to network-wide traffic
Dingde Jiang et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2014)
Cyber security in the Smart Grid: Survey and challenges
Wenye Wang et al.
COMPUTER NETWORKS (2013)
Security and Privacy in Cloud Computing
Zhifeng Xiao et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2013)
A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks
Saman Taghavi Zargar et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2013)
Cyber Security and Privacy Issues in Smart Grids
Jing Liu et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2012)
Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics
Yang Xiang et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2011)
Security Challenges in the IP-based Internet of Things
Tobias Heer et al.
WIRELESS PERSONAL COMMUNICATIONS (2011)
NetFence: Preventing Internet Denial of Service from Inside Out
Xin Liu et al.
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW (2010)
Self-propagating mal-packets in wireless sensor networks: Dynamics and defense implications
Bo Sun et al.
AD HOC NETWORKS (2009)
Flow-Net Methodology for Accountability in Wireless Networks
Yang Xiao
IEEE NETWORK (2009)
Flexible Deterministic Packet Marking: An IP Traceback System to Find the Real Source of Attacks
Yang Xiang et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2009)
A Large-Scale Hidden Semi-Markov Model for Anomaly Detection on User Browsing Behaviors
Yi Xie et al.
IEEE-ACM TRANSACTIONS ON NETWORKING (2009)
To filter or to authorize: Network-layer DoS Defense against multimillion-node botnets
Xin Liu et al.
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW (2008)
Controlling IP Spoofing through Interdomain Packet Filters
Zhenhai Duan et al.
IEEE Transactions on Dependable and Secure Computing (2008)
Probabilistic packet marking for large-scale IP traceback
Michael T. Goodrich
IEEE-ACM TRANSACTIONS ON NETWORKING (2008)
Detection of fraudulent usage in wireless networks
Bo Sun et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2007)
Intrusion detection techniques in mobile Ad Hoc and wireless sensor networks
Bo Sun et al.
IEEE WIRELESS COMMUNICATIONS (2007)
Survey of network-based defense mechanisms countering the DoS and DDoS problems
Tao Peng et al.
ACM COMPUTING SURVEYS (2007)
StackPi: New packet marking and filtering mechanisms for DDoS and IP spoofing defense
Abraham Yaar et al.
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2006)
Capacity overprovisioning for networks with resilience requirements
Michael Menth et al.
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW (2006)
PacketScore:: A statistics-based packet filtering scheme against distributed denial-of-service attacks
Y Kim et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2006)
Policing congestion response in an internetwork using re-feedback
B Briscoe et al.
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW (2005)
A DoS-limiting network architecture
XW Yang et al.
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW (2005)
You can run, but you can't hide: An effective statistical methodology to trace back DDoS attackers
TKT Law et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2005)
Mitigating denial of service attacks: A tutorial
Jarmo Molsa
JOURNAL OF COMPUTER SECURITY (2005)
DDoS attacks and defense mechanisms: classification and state-of-the-art
C Douligeris et al.
COMPUTER NETWORKS (2004)
A taxonomy of DDoS attack and DDoS Defense mechanisms
J Mirkovic et al.
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW (2004)
Replication for Web hosting systems
S Sivasubramanian et al.
ACM COMPUTING SURVEYS (2004)
IP traceback with deterministic packet marking
A Belenky et al.
IEEE COMMUNICATIONS LETTERS (2003)
SOS: Secure Overlay Services
AD Keromytis et al.
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW (2002)
Controlling high bandwidth aggregates in the network
R Mahajan et al.
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW (2002)
On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law Internets
K Park et al.
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW (2001)
Practical network support for IP traceback
S Savage et al.
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW (2000)