Sciweavers

507 search results - page 30 / 102
» Attacking DDoS at the Source
Sort
View
58
Voted
NETWORKING
2004
14 years 11 months ago
Proactively Detecting Distributed Denial of Service Attacks Using Source IP Address Monitoring
Tao Peng, Christopher Leckie, Kotagiri Ramamohanar...
INTERNET
2002
107views more  INTERNET 2002»
14 years 9 months ago
Tracing Network Attacks to Their Sources
Tatsuya Baba, Shigeyuki Matsuda
IWPC
2009
IEEE
15 years 4 months ago
The effectiveness of source code obfuscation: An experimental assessment
Source code obfuscation is a protection mechanism widely used to limit the possibility of malicious reverse engineering or attack activities on a software system. Although several...
Mariano Ceccato, Massimiliano Di Penta, Jasvir Nag...
CCS
2000
ACM
15 years 2 months ago
Using router stamping to identify the source of IP packets
Denial of Service and Distributed Denial of Service attacks have cost millions of dollars to online companies. Unfortunately, these attacks are particularly di cult to stop since ...
Thomas W. Doeppner, Philip N. Klein, Andrew Koyfma...
SDM
2012
SIAM
252views Data Mining» more  SDM 2012»
13 years 1 days ago
Learning from Heterogeneous Sources via Gradient Boosting Consensus
Multiple data sources containing different types of features may be available for a given task. For instance, users’ profiles can be used to build recommendation systems. In a...
Xiaoxiao Shi, Jean-François Paiement, David...