Cited By
View all- Jiang LXu CWang XZhou Y(2015)Analysis and Comparison of the Network Security Protocol with DoS/DDoS Attack Resistance PerformanceProceedings of the 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conf on Embedded Software and Systems10.1109/HPCC-CSS-ICESS.2015.148(1785-1790)Online publication date: 24-Aug-2015
- Cristea MGroza B(2012)Provable Synthetic Coordinates for Increasing PoWs Effectiveness against DoS and SpamProceedings of the 2012 ASE/IEEE International Conference on Social Computing and 2012 ASE/IEEE International Conference on Privacy, Security, Risk and Trust10.1109/SocialCom-PASSAT.2012.96(809-810)Online publication date: 3-Sep-2012
- Boyd CGonzalez-Nieto JKuppusamy LNarasimhan HRangan CRangasamy JSmith JStebila DVaradarajan V(2011)Cryptographic Approaches to Denial-of-Service ResistanceAn Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks10.1007/978-81-322-0277-6_6(183-238)Online publication date: 6-Sep-2011
- Show More Cited By