Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
4
views
10
references
Top references
cited by
0
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,516
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Network and System Security
Next-Generation DoS at the Higher Layers: A Study of SMTP Flooding
other
Author(s):
Gabriel Cartier
,
Jean-François Cartier
,
José M. Fernandez
Publication date
(Print):
2013
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Global Health Next Generation Network
Most cited references
10
Record
: found
Abstract
: not found
Article
: not found
Monitoring the Application-Layer DDoS Attacks for Popular Websites
Shun-Zheng Yu
,
Yi Xie
(2009)
0
comments
Cited
18
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
DDoS-Resilient Scheduling to Counter Application Layer Attacks Under Imperfect Detection
M. Uysal
,
R. Swaminathan
,
E. Knightly
…
(2006)
0
comments
Cited
11
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
An empirical study of spam traffic and the use of DNS black lists
Jaeyeon Jung
,
Emil Sit
(2004)
0
comments
Cited
10
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2013
Pages
: 149-163
DOI:
10.1007/978-3-642-38631-2_12
SO-VID:
f8373604-3629-4634-a812-a4bd18c8d177
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Stochastic Traffic Identification for Security Management: eDonkey Protocol as a Case Study
pp. 14
A Technology Independent Security Gateway for Real-Time Multimedia Communication
pp. 26
Efficient Attribute Based Access Control Mechanism for Vehicular Ad Hoc Network
pp. 40
Evaluation of Detecting Malicious Nodes Using Bayesian Model in Wireless Intrusion Detection
pp. 54
Model the Influence of Sybil Nodes in P2P Botnets
pp. 68
A Novel Security Protocol for Resolving Addresses in the Location/ID Split Architecture
pp. 80
The OffPAD: Requirements and Usage
pp. 94
Information-Oriented Trustworthiness Evaluation in Vehicular Ad-hoc Networks
pp. 109
Using Trusted Platform Modules for Location Assurance in Cloud Networking
pp. 122
Tracing Sources of Anonymous Slow Suspicious Activities
pp. 135
Static Analysis for Regular Expression Denial-of-Service Attacks
pp. 149
Next-Generation DoS at the Higher Layers: A Study of SMTP Flooding
pp. 164
Towards Hybrid Honeynets via Virtual Machine Introspection and Cloning
pp. 178
MADS: Malicious Android Applications Detection through String Analysis
pp. 192
X-TIER: Kernel Module Injection
pp. 206
Leveraging String Kernels for Malware Detection
pp. 220
Insiders Trapped in the Mirror Reveal Themselves in Social Media
pp. 236
On Business Logic Vulnerabilities Hunting: The APP_LogGIC Framework
pp. 250
Using the Smart Card Web Server in Secure Branchless Banking
pp. 264
Liability for Data Breaches: A Proposal for a Revenue-Based Sanctioning Approach
pp. 278
Efficient and Private Three-Party Publish/Subscribe
pp. 293
Marlin: A Fine Grained Randomization Approach to Defend against ROP Attacks
pp. 307
Mobile Trusted Agent (MTA): Build User-Based Trust for General-Purpose Computer Platform
pp. 321
Anomaly Detection for Ephemeral Cloud IaaS Virtual Machines
pp. 336
JShadObf: A JavaScript Obfuscator Based on Multi-Objective Optimization Algorithms
pp. 350
Forward Secure Certificateless Proxy Signature Scheme
pp. 365
Leakage-Resilient Zero-Knowledge Proofs of Knowledge for NP
pp. 381
On the Security of an Efficient Attribute-Based Signature
pp. 393
Factoring RSA Modulus with Known Bits from Both p and q: A Lattice Method
pp. 405
Performance Prediction Model for Block Ciphers on GPU Architectures
pp. 424
Threshold-Oriented Optimistic Fair Exchange
pp. 439
Secure Storage and Fuzzy Query over Encrypted Databases
pp. 451
A Highly Efficient RFID Distance Bounding Protocol without Real-Time PRF Evaluation
pp. 465
Privacy Preserving Context Aware Publish Subscribe Systems
pp. 479
A New Unpredictability-Based RFID Privacy Model
pp. 493
Privacy-Preserving Multi-party Reconciliation Using Fully Homomorphic Encryption
pp. 507
Privacy-Preserving Password-Based Authenticated Key Exchange in the Three-Party Setting
pp. 521
Light Weight Network Coding Based Key Distribution Scheme for MANETs
pp. 535
Identity-Based Dynamic Authenticated Group Key Agreement Protocol for Space Information Network
pp. 549
Authentication and Key Agreement Based on Hyper-sphere Using Smart Cards
pp. 563
An Efficient Constant Round ID-Based Group Key Agreement Protocol for Ad Hoc Networks
pp. 575
Human Identification with Electroencephalogram (EEG) for the Future Network Security
pp. 582
Building Better Unsupervised Anomaly Detector with S-Transform
pp. 590
Fault-Tolerant Topology Control Based on Artificial Immune Theory in WMNs
pp. 599
Virtually Reconfigurable Secure Wireless Networks Using Broadcast Tokens
pp. 607
On the Use of Key Assignment Schemes in Authentication Protocols
pp. 614
On the Interactions between Privacy-Preserving, Incentive, and Inference Mechanisms in Participatory Sensing Systems
pp. 621
Security Authentication of AODV Protocols in MANETs
pp. 628
Architecture for Trapping Toll Fraud Attacks Using a VoIP Honeynet Approach
pp. 635
Towards a Privacy-Preserving Solution for OSNs
pp. 642
Measuring and Comparing the Protection Quality in Different Operating Systems
pp. 649
Collusion-Resistant Domain-Specific Pseudonymous Signatures
pp. 656
On the Applicability of Time-Driven Cache Attacks on Mobile Devices
pp. 663
Ancestor Excludable Hierarchical ID-Based Encryption Revisited
pp. 671
Think Twice before You Share: Analyzing Privacy Leakage under Privacy Control in Online Social Networks
pp. 678
A Dynamic and Multi-layer Reputation Computation Model for Multi-hop Wireless Networks
pp. 692
Enhancing Passive Side-Channel Attack Resilience through Schedulability Analysis of Data-Dependency Graphs
pp. 699
Combining Dynamic Passive Analysis and Active Fingerprinting for Effective Bot Malware Detection in Virtualized Environments
pp. 707
Filtering Trolling Comments through Collective Classification
pp. 714
Security Analysis of Touch Inputted Passwords
pp. 721
A Pairing-Free Identity Based Authentication Framework for Cloud Computing
pp. 728
Formal Modeling and Automatic Security Analysis of Two-Factor and Two-Channel Authentication Protocols
pp. 735
Towards a More Secure Apache Hadoop HDFS Infrastructure
pp. 742
A Formally Verified Initial Authentication and Key Agreement Protocol in Heterogeneous Environments Using Casper/FDR
pp. 749
A Comprehensive Access Control System for Scientific Applications
pp. 756
Partial Fingerprint Reconstruction with Improved Smooth Extension
pp. 763
Modeling and Analysis for Thwarting Worm Propagation in Email Networks
pp. 770
On Secure and Power-Efficient RFID-Based Wireless Body Area Network
pp. 777
Towards Authenticated Objects
pp. 784
A Finger-Vein Based Cancellable Bio-cryptosystem
Similar content
2,516
Utilizing BERT Intermediate Layers for Aspect Based Sentiment Analysis and Natural Language Inference
Authors:
Youwei Song
,
Jiahai Wang
,
Zhiwei Liang
…
The Rustenburg Layered Suite formed as a stack of mush with transient magma chambers
Authors:
Zhuosen Yao
,
James Mungall
,
M Jenkins
Investigation into the effect of doping of boron and nitrogen atoms in the mechanical properties of single-layer polycrystalline graphene
Authors:
Amir Jam
,
Rouzbeh Abadi
,
Timon Rabczuk
…
See all similar