Sciweavers

SIGCOMM   2000 Communications architectures & protocols
Wall of Fame | Most Viewed SIGCOMM-2000 Paper
SIGCOMM
2000
ACM
13 years 9 months ago
Practical network support for IP traceback
This paper describes a technique for tracing anonymous packet flooding attacks in the Internet back towards their source. This work is motivated by the increased frequency and so...
Stefan Savage, David Wetherall, Anna R. Karlin, Th...
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
IdReadViewsTitleStatus
1Download preprint from source177
2Download preprint from source162
3Download preprint from source150
4Download preprint from source143
5Download preprint from source133
6Download preprint from source129
7Download preprint from source127
8Download preprint from source126
9Download preprint from source126
10Download preprint from source123
11Download preprint from source121
12Download preprint from source115
13Download preprint from source110
14Download preprint from source105
15Download preprint from source104
16Download preprint from source100
17Download preprint from source97
18Download preprint from source97
19Download preprint from source89