SYN flood

Results: 71



#Item
111  Accurately Measuring Denial of Service in Simulation and Testbed Experiments Jelena Mirkovic Member, IEEE, Alefiya Hussain, Sonia Fahmy Senior Member, IEEE, Peter Reiher Member, IEEE, Roshan K. Thomas

1 Accurately Measuring Denial of Service in Simulation and Testbed Experiments Jelena Mirkovic Member, IEEE, Alefiya Hussain, Sonia Fahmy Senior Member, IEEE, Peter Reiher Member, IEEE, Roshan K. Thomas

Add to Reading List

Source URL: www.lasr.cs.ucla.edu

Language: English - Date: 2009-07-27 18:05:25
12ERT THREAT ALERT Tsunami SYN Flood Attack ERT Threat Alert Tsunami SYN Flood Attack, Oct 7, 2014

ERT THREAT ALERT Tsunami SYN Flood Attack ERT Threat Alert Tsunami SYN Flood Attack, Oct 7, 2014

Add to Reading List

Source URL: security.radware.com

Language: English - Date: 2014-10-07 17:23:37
13Pakistan Telecom Hijacks YouTube Or how to SYN-flood DOS yourself while annoying everyone on on the planet APRICOT Taipei 2008

Pakistan Telecom Hijacks YouTube Or how to SYN-flood DOS yourself while annoying everyone on on the planet APRICOT Taipei 2008

Add to Reading List

Source URL: research.dyn.com

Language: English - Date: 2014-07-27 14:34:20
14RAD: Reflector Attack Defense Using Message Authentication Codes Erik Kline† Matt Beaumont-Gay† Jelena Mirkovic? Peter Reiher† for Advanced Systems Research ? Information Sciences Institute UCLA Computer Science US

RAD: Reflector Attack Defense Using Message Authentication Codes Erik Kline† Matt Beaumont-Gay† Jelena Mirkovic? Peter Reiher† for Advanced Systems Research ? Information Sciences Institute UCLA Computer Science US

Add to Reading List

Source URL: www.lasr.cs.ucla.edu

Language: English - Date: 2010-12-13 19:36:16
15Inferring Internet Denial-of-Service Activity David Moore CAIDA San Diego Supercomputer Center University of California, San Diego

Inferring Internet Denial-of-Service Activity David Moore CAIDA San Diego Supercomputer Center University of California, San Diego

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2008-01-24 07:43:10
16Past and Future Internet Disasters: DDoS attacks survey and analysis Thomas Dübendorfer <> Arno Wagner <> April 8th, 2003

Past and Future Internet Disasters: DDoS attacks survey and analysis Thomas Dübendorfer <> Arno Wagner <> April 8th, 2003

Add to Reading List

Source URL: www.tik.ee.ethz.ch

Language: English - Date: 2003-06-26 15:18:01
17IEEE TRANSACTIONS ON COMPUTERS,  VOL. 57, NO. 7, JULY 2008

IEEE TRANSACTIONS ON COMPUTERS, VOL. 57, NO. 7, JULY 2008

Add to Reading List

Source URL: www.lasr.cs.ucla.edu

Language: English - Date: 2008-11-14 18:01:53
18A Taxonomy of DDoS Attack and DDoS Defense Mechanisms ∗  Jelena Mirkovic

A Taxonomy of DDoS Attack and DDoS Defense Mechanisms ∗ Jelena Mirkovic

Add to Reading List

Source URL: lasr.cs.ucla.edu

Language: English - Date: 2005-06-22 14:30:02
19A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms Jelena Mirkovic, Janice Martin and Peter Reiher Computer Science Department University of California, Los Angeles Technical report #020018

A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms Jelena Mirkovic, Janice Martin and Peter Reiher Computer Science Department University of California, Los Angeles Technical report #020018

Add to Reading List

Source URL: www.lasr.cs.ucla.edu

Language: English - Date: 2002-05-01 03:16:24
20STEPS Toward The Reinvention of Programming, 2008 Progress Report Submitted to the National Science Foundation (NSF) October 2008 A. Kay, I. Piumarta, K. Rose, D. Ingalls, D. Amelang, T. Kaehler, Y. Ohshima, H. Samimi, C

STEPS Toward The Reinvention of Programming, 2008 Progress Report Submitted to the National Science Foundation (NSF) October 2008 A. Kay, I. Piumarta, K. Rose, D. Ingalls, D. Amelang, T. Kaehler, Y. Ohshima, H. Samimi, C

Add to Reading List

Source URL: www.vpri.org

Language: English - Date: 2015-01-21 19:13:18