Users and services in intelligent networks
暂无分享,去创建一个
[1] Erol Gelenbe,et al. Measurement and performance of a cognitive packet network , 2001, Comput. Networks.
[2] Angelos D. Keromytis,et al. Using graphic turing tests to counter automated DDoS attacks against web servers , 2003, CCS '03.
[3] Craig Partridge,et al. Single-packet IP traceback , 2002, TNET.
[4] Dawn Xiaodong Song,et al. Advanced and authenticated marking schemes for IP traceback , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[5] Salim Hariri,et al. A component-based programming model for autonomic applications , 2004, International Conference on Autonomic Computing, 2004. Proceedings..
[6] Jelena Mirkovic,et al. Alliance formation for DDoS defense , 2003, NSPW '03.
[7] Vern Paxson,et al. An analysis of using reflectors for distributed denial-of-service attacks , 2001, CCRV.
[8] Henry A. Kautz,et al. Inferring activities from interactions with objects , 2004, IEEE Pervasive Computing.
[9] Franco Zambonelli,et al. Developing multiagent systems: The Gaia methodology , 2003, TSEM.
[10] Erol Gelenbe,et al. Simulation with learning agents , 2001, Proc. IEEE.
[11] Ariel Orda,et al. QoS Routing Mechanisms and OSPF Extensions , 1999, RFC.
[12] Erol Gelenbe,et al. Design and performance of cognitive packet networks , 2001, Perform. Evaluation.
[13] Erol Gelenbe,et al. QoS and routing in the cognitive packet network , 2005, Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks.
[14] Jun Xu,et al. IP traceback-based intelligent packet filtering: a novel technique for defending against Internet DDoS attacks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[15] Jelena Mirkovic,et al. D-WARD: a source-end defense against flooding denial-of-service attacks , 2005, IEEE Transactions on Dependable and Secure Computing.
[16] Jitendra Malik,et al. Recognizing objects in adversarial clutter: breaking a visual CAPTCHA , 2003, 2003 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2003. Proceedings..
[17] Hong Zhu,et al. NetBouncer: client-legitimacy-based high-performance DDoS filtering , 2003, Proceedings DARPA Information Survivability Conference and Exposition.
[18] Kang G. Shin,et al. Hop-count filtering: an effective defense against spoofed DDoS traffic , 2003, CCS '03.
[19] Christian Tschudin,et al. Active routing for ad hoc networks , 2000, IEEE Commun. Mag..
[20] Erol Gelenbe,et al. Cognitive packet networks , 1999, Proceedings 11th International Conference on Tools with Artificial Intelligence.
[21] Gaurav S. Sukhatme,et al. Connecting the Physical World with Pervasive Networks , 2002, IEEE Pervasive Comput..
[22] James A. Davis,et al. A Genealogical Approach to Analyzing Post-Mortem Denial of Service Attacks , 2002 .
[23] Erol Gelenbe,et al. Learning in the Recurrent Random Neural Network , 1992, Neural Computation.
[24] Amy L. Murphy,et al. LIME: a middleware for physical and logical mobility , 2001, Proceedings 21st International Conference on Distributed Computing Systems.
[25] David K. Y. Yau,et al. Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles , 2005, IEEE/ACM Transactions on Networking.
[26] Ratul Mahajan,et al. Controlling high bandwidth aggregates in the network , 2002, CCRV.
[27] John S. Heidemann,et al. A framework for classifying denial of service attacks , 2003, SIGCOMM '03.
[28] Mark Handley,et al. A scalable content-addressable network , 2001, SIGCOMM '01.
[29] Marco Pistore,et al. XSRL: An XML web-services request language , 2002 .
[30] Anna R. Karlin,et al. Practical network support for IP traceback , 2000, SIGCOMM.
[31] Kang G. Shin,et al. Hop-Count Filtering : An Effective Defense Against Spoofed Traffic , 2003 .
[32] Cecilia Mascolo,et al. CARISMA: Context-Aware Reflective mIddleware System for Mobile Applications , 2003, IEEE Trans. Software Eng..
[33] James A. Hendler,et al. The Semantic Web" in Scientific American , 2001 .
[34] Srikanth Kandula,et al. Botz-4-sale: surviving organized DDoS attacks that mimic flash crowds , 2005, NSDI.
[35] Robert Morris. A Weakness in the 4.2BSD Unix† TCP/IP Software , 1999 .
[36] Erol Gelenbe,et al. Self-aware networks and QoS , 2004, Proceedings of the IEEE.
[37] Jeffrey O. Kephart,et al. The Vision of Autonomic Computing , 2003, Computer.
[38] Paul Ferguson,et al. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing , 1998, RFC.
[39] Luciano Serafini,et al. Peer-to-peer semantic coordination , 2004, J. Web Semant..
[40] Andrea Omicini,et al. "Exhibitionists" and "Voyeurs" Do It Better: A Shared Environment for Flexible Coordination with Tacit Messages , 2004, E4MAS.
[41] Marco Pistore,et al. XSRL : A request language for web services , 2002 .
[42] David De Roure,et al. Less is More: Lightweight Ontologies and User Interfaces for Smart Labs , 2004 .
[43] Erol Gelenbe,et al. Autonomous smart routing for network QoS , 2004, International Conference on Autonomic Computing, 2004. Proceedings..
[44] Erol Gelenbe,et al. Cognitive packet networks: QoS and performance , 2002, Proceedings. 10th IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunications Systems.
[45] Marco Dorigo,et al. Swarm intelligence: from natural to artificial systems , 1999 .
[46] Franco Zambonelli,et al. Spray computers: Explorations in self-organization , 2005, Pervasive Mob. Comput..
[47] Erol Gelenbe,et al. An autonomic approach to denial of service defence , 2005, Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks.
[48] Liviu Iftode,et al. Cooperative computing for distributed embedded systems , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.
[49] Liviu Iftode,et al. Cooperative Computin for Distributed Embedded Systems , 2002, ICDCS 2002.
[50] Marija Mikic-Rakic,et al. Support for disconnected operation via architectural self-reconfiguration , 2004 .
[51] Mark Handley,et al. A scalable content-addressable network , 2001, SIGCOMM 2001.
[52] Albert-László Barabási,et al. Statistical mechanics of complex networks , 2001, ArXiv.
[53] ShenkerScott,et al. A scalable content-addressable network , 2001 .
[54] Frank van Harmelen,et al. Reviewing the design of DAML+OIL: an ontology language for the semantic web , 2002, AAAI/IAAI.
[55] Erol Gelenbe,et al. Power-aware ad hoc cognitive packet networks , 2004, Ad Hoc Networks.