A Targeted Denial of Service Attack on Data Caching Networks

[1]  Niloy Ganguly,et al.  HPC5: An efficient topology generation mechanism for Gnutella networks , 2009, Comput. Networks.

[2]  Dharma P. Agrawal,et al.  Mobile Ad hoc Networking , 2002 .

[3]  Diomidis Spinellis,et al.  A survey of peer-to-peer content distribution technologies , 2004, CSUR.

[4]  Mengjun Xie,et al.  Enhancing cache robustness for content-centric networking , 2012, 2012 Proceedings IEEE INFOCOM.

[5]  Donald F. Towsley,et al.  Inferring Military Activity in Hybrid Networks through Cache Behavior , 2013, MILCOM 2013 - 2013 IEEE Military Communications Conference.

[6]  Kevin Henry,et al.  Official (ISC)2 Guide to the CISSP CBK ((Isc)2 Press Series) , 2006 .

[7]  R. Schaller,et al.  Moore's law: past, present and future , 1997 .

[8]  Igor M. Moraes,et al.  Information-Centric Networks: A New Paradigm for the Internet , 2013 .

[9]  Johan A. Pouwelse,et al.  The Bittorrent P2P File-Sharing System: Measurements and Analysis , 2005, IPTPS.

[10]  Steven Hernandez Cissp Official (ISC)2 Guide to the CISSP CBK , 2012 .

[11]  Mauro Conti,et al.  A lightweight mechanism for detection of cache pollution attacks in Named Data Networking , 2013, Comput. Networks.

[12]  A. Odlyzko,et al.  Internet growth: is there a Moore's law for data traffic? , 2000 .

[13]  Nishanth R. Sastry,et al.  Where is in a Name? A Survey of Mobility in Information-Centric Networks , 2013 .

[14]  Pavel Bzoch,et al.  Design and Implementation of a Caching Algorithm Applicable to Mobile Clients , 2012, Informatica.