4.2 Review

Denial-of-service in content centric (named data) networking: a tutorial and state-of-the-art survey

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Hardware & Architecture

Information-centric networking: The evolution from circuits to packets to content

Jim Kurose

COMPUTER NETWORKS (2014)

Article Computer Science, Information Systems

A Survey of Information-Centric Networking Research

George Xylomenos et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2014)

Article Computer Science, Hardware & Architecture

A survey of emerging threats in cybersecurity

Julian Jang-Jaccard et al.

JOURNAL OF COMPUTER AND SYSTEM SCIENCES (2014)

Article Computer Science, Information Systems

Detecting and mitigating interest flooding attacks in content-centric network

Kai Wang et al.

SECURITY AND COMMUNICATION NETWORKS (2014)

Article Computer Science, Artificial Intelligence

Cooperative-Filter: countering Interest flooding attacks in named data networking

Kai Wang et al.

SOFT COMPUTING (2014)

Article Computer Science, Information Systems

Cache less for more in information-centric networks (extended version)

Wei Koong Chai et al.

COMPUTER COMMUNICATIONS (2013)

Article Computer Science, Information Systems

A case for stateful forwarding plane

Cheng Yi et al.

COMPUTER COMMUNICATIONS (2013)

Article Computer Science, Hardware & Architecture

Backscatter from the data plane - Threats to stability and security in information-centric network infrastructure

Matthias Waehlisch et al.

COMPUTER NETWORKS (2013)

Article Computer Science, Hardware & Architecture

A lightweight mechanism for detection of cache pollution attacks in Named Data Networking

Mauro Conti et al.

COMPUTER NETWORKS (2013)

Article Computer Science, Hardware & Architecture

Caching in information centric networking: A survey

Guoqiang Zhang et al.

COMPUTER NETWORKS (2013)

Article Computer Science, Hardware & Architecture

From content delivery today to information centric networking

G. Carofiglio et al.

COMPUTER NETWORKS (2013)

Article Engineering, Electrical & Electronic

How to Make Content Centric Network (CCN) More Robust against DoS/DDoS Attack

DaeYoub Kim et al.

IEICE TRANSACTIONS ON COMMUNICATIONS (2013)

Article Computer Science, Hardware & Architecture

Networking Named Content

Van Jacobson et al.

COMMUNICATIONS OF THE ACM (2012)

Article Computer Science, Information Systems

Distributed Denial of Service is a Scalability Problem

Yoo Chung

ACM SIGCOMM COMPUTER COMMUNICATION REVIEW (2012)

Article Computer Science, Information Systems

Adaptive Forwarding in Named Data Networking

Cheng Yi et al.

ACM SIGCOMM COMPUTER COMMUNICATION REVIEW (2012)

Editorial Material Computer Science, Information Systems

Privacy Risks in Named Data Networking: What is the Cost of Performance?

Tobias Lauinger et al.

ACM SIGCOMM COMPUTER COMMUNICATION REVIEW (2012)

Article Engineering, Electrical & Electronic

A Survey of Information-Centric Networking

Bengt Ahlgren et al.

IEEE COMMUNICATIONS MAGAZINE (2012)

Article Computer Science, Hardware & Architecture

Pollution attacks and defenses for Internet caching systems

Leiwen Deng et al.

COMPUTER NETWORKS (2008)

Article Computer Science, Information Systems

A data-oriented (and beyond) network architecture

Teemu Koponen et al.

ACM SIGCOMM COMPUTER COMMUNICATION REVIEW (2007)

Article Computer Science, Hardware & Architecture

DDoS attacks and defense mechanisms: classification and state-of-the-art

C Douligeris et al.

COMPUTER NETWORKS (2004)

Article Computer Science, Information Systems

A taxonomy of DDoS attack and DDoS Defense mechanisms

J Mirkovic et al.

ACM SIGCOMM COMPUTER COMMUNICATION REVIEW (2004)