Abouzakhar et al., 2002
ViewPDF| Publication | Publication Date | Title |
|---|---|---|
| Kargl et al. | Protecting web servers from distributed denial of service attacks | |
| US7610375B2 (en) | Intrusion detection in a data center environment | |
| US7523485B1 (en) | System and method for source IP anti-spoofing security | |
| US7039950B2 (en) | System and method for network quality of service protection on security breach detection | |
| JP2010268483A (en) | Active network defense system and method | |
| Bakr et al. | A survey on mitigation techniques against ddos attacks on cloud computing architecture | |
| Khalaf et al. | A simulation study of syn flood attack in cloud computing environment | |
| Arafat et al. | A practical approach and mitigation techniques on application layer DDoS attack in web server | |
| Fakeeh | An overview of DDoS attacks detection and prevention in the cloud | |
| Shaar et al. | DDoS attacks and impacts on various cloud computing components | |
| Boppana et al. | Analyzing the vulnerabilities introduced by ddos mitigation techniques for software-defined networks | |
| Safa et al. | A collaborative defense mechanism against SYN flooding attacks in IP networks | |
| Abouzakhar et al. | An intelligent approach to prevent distributed systems attacks | |
| Noureldien et al. | A stateful inspection module architecture | |
| Chen | Aegis: An active-network-powered defense mechanism against ddos attacks | |
| Singh et al. | Analysis of Botnet behavior using Queuing theory | |
| JP2006501527A (en) | Method, data carrier, computer system, and computer program for identifying and defending attacks against server systems of network service providers and operators | |
| Djalaliev et al. | Sentinel: hardware-accelerated mitigation of bot-based DDoS attacks | |
| Abouzakhar et al. | Counteracting network distributed attacks: an intelligent approach to minimise the TCP/IP protocol threats using agents technology | |
| Singh et al. | Study to validate the performance of flooding based distributed denial of service attacks | |
| Junaid et al. | An indigenous solution for SYN flooding | |
| Yadav et al. | Trust or reputation base encryption decryption technique for preventing network from DOS attack in MANET | |
| ABOUZAKHAR et al. | Towards Intelligent Fuzzy Agents to Dynamically Control the Resources Allocations for a Network under Denial of Service Attacks | |
| Kuldeep et al. | Enhancing Network Security by implementing preventive mechanism using GNS3 | |
| Mohiuddin et al. | Design and Development of an effective DDoS Shield to implement a well secured Defense System against vulnerable attacks |