Sciweavers

64 search results - page 7 / 13
» An Empirical Study of Denial of Service Mitigation Technique...
Sort
View
COMPSAC
2009
IEEE
15 years 6 months ago
Defending Battery Exhaustion Attacks on Mobile Systems
Battery Exhaustion Attack is a “denial of service” attack on mobile devices, causing more battery discharge than normally necessary. The excessive discharge arises out of the ...
Sungyong Shin, Taek Lee, Hoh Peter In
ICMCS
2006
IEEE
141views Multimedia» more  ICMCS 2006»
15 years 5 months ago
Ripple-Stream: Safeguarding P2P Streaming Against Dos Attacks
— Compared with file-sharing and distributed hash table (DHT) network, P2P streaming is more vulnerable to denial of service (DoS) attacks because of its high bandwidth demand a...
Wenjie Wang, Yongqiang Xiong, Qian Zhang, Sugih Ja...
CCS
2007
ACM
15 years 5 months ago
Non-intrusive IP traceback for DDoS attacks
The paper describes a Non-Intrusive IP traceback scheme which uses sampled traffic under non-attack conditions to build and maintains caches of the valid source addresses transiti...
Vrizlynn L. L. Thing, Morris Sloman, Naranker Dula...
RE
2005
Springer
15 years 4 months ago
Do Viewpoints Lead to Better Conceptual Models? An Exploratory Case Study
The use of viewpoints has long been proposed as a technique to structure evolving requirements models. In theory, viewpoints should provide better stakeholder traceability, and th...
Steve M. Easterbrook, Eric S. K. Yu, Jorge Aranda,...
NDSS
2007
IEEE
15 years 5 months ago
Low-Rate TCP-Targeted DoS Attack Disrupts Internet Routing
Compared to attacks against end hosts, Denial of Service (DoS) attacks against the Internet infrastructure such as those targeted at routers can be more devastating due to their g...
Ying Zhang, Zhuoqing Morley Mao, Jia Wang