Denial of Service Attacks in Wireless Networks
Abstract
Full Text:
PDFReferences
H. F. Lipson. Tracking and tracing cyber-attacks: Technical challenges and global policy issues, Special Report CMU/SEI-2002-SR-009. Pittsburg: CERT Coordination Center; 2002.
J. A. Rochlis, M. W. Eichin. With microscope and tweezers: The worm from MIT's perspective, Communications of the ACM. 1989; 32(6): 689-98p.
L. Garber. Denial-of-service attacks rip the Internet, IEEE Computer. 2000; 33(4): 12-7p.
D. J. Marchette. Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint. New York: Springer; 2001.
C. Douligeris, A. Mitrokotsa. DDoS attacks and defense mechanisms: Classification and state-of-the-art, Computer Networks. 2004; 44(5): 643–66p.
G. Bhatti, R. Singh, P. Singh, A look back at issues in the layers of TCP/IP Model, International Journal of Enhanced Research in Management & Computer Applications. 2012; 1(2).
J. Mirkovic, S. Dietrich, D. Dittrich, P. Reiher, Internet Denial of Service: Attack and Defense Mechanisms. Prentice Hall PTR; 2004.
R. K. C. Chang. Defending against flooding-based distributed denial-of-service attacks: A tutorial, IEEE Communications Magazine. 2002; 40(10): 42-51p.
J. Jung, B. Krishnamurthy, M. Rabinovich. Flash crowds and denial of service attacks: Characterization and implications for CDNs and web sites, In: Proceedings of the International World Wide Web Conference, May 2002; 252–62p.
G. Carl, G. Kesidis, R. Brooks, S. Rai. Denial-of-service attack detection techniques, IEEE Internet Computing. 2006; 10(1): 82-9p.
DOI: https://doi.org/10.37628/jbcc.v4i1.746
Refbacks
- There are currently no refbacks.