The case for network witnesses
暂无分享,去创建一个
[1] Stefan Savage,et al. TCP congestion control with a misbehaving receiver , 1999, CCRV.
[2] Erik Johnson,et al. Is a bot at the controls?: Detecting input data attacks , 2007, NetGames '07.
[3] Michael K. Reiter,et al. Defending against denial-of-service attacks with puzzle auctions , 2003, 2003 Symposium on Security and Privacy, 2003..
[4] Wu-chang Feng,et al. The case for TCP/IP puzzles , 2003, FDNA '03.
[5] Elaine Shi,et al. Portcullis: protecting connection setup from denial-of-capability attacks , 2007, SIGCOMM '07.
[6] Wu-chang Feng,et al. The Case for Public Work , 2006, 2007 IEEE Global Internet Symposium.
[7] Gary McGraw,et al. Exploiting Online Games , 2007, USENIX Annual Technical Conference.
[8] Elaine Shi,et al. Portcullis: protecting connection setup from denial-of-capability attacks , 2007, SIGCOMM 2007.
[9] Moni Naor,et al. Pricing via Processing or Combatting Junk Mail , 1992, CRYPTO.
[10] Suresh Singh,et al. An Algorithm for Anomaly-based Botnet Detection , 2006, SRUTI.
[11] Scott Shenker,et al. Core-stateless fair queueing: a scalable architecture to approximate fair bandwidth allocations in high-speed networks , 2003, TNET.
[12] 网行者. 最“变态”的下载:BitTorrent , 2003 .
[13] Ari Juels,et al. Client puzzles: A cryptographic defense against connection depletion , 1999 .