Search Results

There are 20565 results for: content related to: Coloring networks for attacker identification and response

  1. You have full text access to this Open Access content
    Denial-of-service in content centric (named data) networking: a tutorial and state-of-the-art survey

    Security and Communication Networks

    Volume 8, Issue 11, 25 July 2015, Pages: 2037–2059, Muhammad Aamir and Syed Mustafa Ali Zaidi

    Version of Record online : 29 OCT 2014, DOI: 10.1002/sec.1149

  2. You have full text access to this Open Access content
    A novel path-based approach for single-packet IP traceback

    Security and Communication Networks

    Volume 7, Issue 2, February 2014, Pages: 309–321, Ning Lu, Yulong Wang, Sen Su and Fangchun Yang

    Version of Record online : 21 MAR 2013, DOI: 10.1002/sec.741

  3. Optimal redundancy allocation for high availability routers

    International Journal of Communication Systems

    Volume 23, Issue 12, December 2010, Pages: 1581–1599, Chia-Tai Tsai, Rong-Hong Jan and Kuochen Wang

    Version of Record online : 30 MAR 2010, DOI: 10.1002/dac.1127

  4. A proposal of an extended method of IP trace-back for distributed denial of service attacks using a dynamic marking scheme

    Electronics and Communications in Japan

    Volume 94, Issue 12, December 2011, Pages: 29–44, Katsuhiro Koga, Naonobu Okazaki, Akira Watanabe and Mi rang Park

    Version of Record online : 28 NOV 2011, DOI: 10.1002/ecj.10346

  5. You have full text access to this Open Access content
    TDPF: a traceback-based distributed packet filter to mitigate spoofed DDoS attacks

    Security and Communication Networks

    Volume 7, Issue 2, February 2014, Pages: 245–264, Mehran S. Fallah and Nafiseh Kahani

    Version of Record online : 14 FEB 2013, DOI: 10.1002/sec.725

  6. You have full text access to this Open Access content
    Transactions based secure routing in wireless networks: a cognitive science approach

    Security and Communication Networks

    Volume 8, Issue 6, April 2015, Pages: 1050–1062, R. Kumar and G. Kousalya

    Version of Record online : 11 AUG 2014, DOI: 10.1002/sec.1060

  7. You have full text access to this Open Access content
    Detecting and mitigating interest flooding attacks in content-centric network

    Security and Communication Networks

    Volume 7, Issue 4, April 2014, Pages: 685–699, Kai Wang, Huachun Zhou, Hongbin Luo, Jianfeng Guan, Yajuan Qin and Hongke Zhang

    Version of Record online : 10 APR 2013, DOI: 10.1002/sec.770

  8. You have full text access to this Open Access content
    An improved network mobility service for intelligent transportation systems

    Wireless Communications and Mobile Computing

    Volume 11, Issue 7, July 2011, Pages: 899–915, Romain Kuntz, Julien Montavont, Guillaume Schreiner, David Binet and Thomas Noël

    Version of Record online : 26 OCT 2009, DOI: 10.1002/wcm.860

  9. An asynchronous hierarchical router for networks-on-chip-based three-dimensional multi-processor system-on-chip

    Software: Practice and Experience

    Volume 42, Issue 7, July 2012, Pages: 877–890, Walid Lafi, Didier Lattard and Ahmed Jerrya

    Version of Record online : 7 FEB 2012, DOI: 10.1002/spe.1150

  10. Lightweight PIM—a new multicast routing protocol

    International Journal of Communication Systems

    Volume 27, Issue 10, October 2014, Pages: 1441–1458, Tomasz Bartczak and Piotr Zwierzykowski

    Version of Record online : 25 JUL 2012, DOI: 10.1002/dac.2407

  11. You have full text access to this Open Access content
    IP address assignment in wireless mesh networks

    Wireless Communications and Mobile Computing

    Volume 11, Issue 3, March 2011, Pages: 321–337, Alexander Zimmermann, Arnd Hannemann and Benjamin Schleinzer

    Version of Record online : 20 JUL 2010, DOI: 10.1002/wcm.982

  12. You have full text access to this Open Access content
    Filtering location optimization for the reactive packet filtering

    Security and Communication Networks

    Volume 7, Issue 7, July 2014, Pages: 1150–1164, Ning Lu, Yulong Wang, Sen Su, Fangchun Yang and Rui Han

    Version of Record online : 19 JUL 2013, DOI: 10.1002/sec.848

  13. Optimizing content routers deployment in large-scale information centric core-edge separation Internet

    International Journal of Communication Systems

    Volume 27, Issue 5, May 2014, Pages: 794–810, Jia Chen, Hongke Zhang, Huachun Zhou and Hongbin Luo

    Version of Record online : 5 JUN 2013, DOI: 10.1002/dac.2580

  14. Modeling denial-of-service against pending interest table in named data networking

    International Journal of Communication Systems

    Volume 27, Issue 12, December 2014, Pages: 4355–4368, Kai Wang, Jia Chen, Huachun Zhou, Yajuan Qin and Hongke Zhang

    Version of Record online : 26 JUL 2013, DOI: 10.1002/dac.2618

  15. You have full text access to this Open Access content
    Increasing the effectiveness of packet marking schemes using wrap-around counting Bloom filter

    Security and Communication Networks

    Volume 9, Issue 16, 10 November 2016, Pages: 3467–3482, Samant Saurabh and Ashok Singh Sairam

    Version of Record online : 7 JUL 2016, DOI: 10.1002/sec.1554

  16. You have full text access to this Open Access content
    A scalable NAT-based solution to Internet access denial by higher-tier ISPs

    Security and Communication Networks

    Volume 6, Issue 2, February 2013, Pages: 194–209, Marwan Abu-Amara, Abdulaziz Al-Baiz, Ashraf S. Mahmoud, Mohammed H. Sqalli and Farag Azzedin

    Version of Record online : 10 MAY 2012, DOI: 10.1002/sec.557

  17. Request routing through collaborative in-network caching for bandwidth optimization: a methodology

    Transactions on Emerging Telecommunications Technologies

    Volume 28, Issue 1, January 2017, Yuemei Xu, Zihou Wang, Yang Li, Fu Chen, Tao Lin and Wenjia Niu

    Version of Record online : 26 MAY 2015, DOI: 10.1002/ett.2947

  18. An exploration of cache collaboration in information-centric network

    International Journal of Communication Systems

    Volume 27, Issue 9, September 2014, Pages: 1243–1267, Bohao Feng, Huachun Zhou, Shuai Gao and Ilsun You

    Version of Record online : 17 MAR 2014, DOI: 10.1002/dac.2773

  19. You have full text access to this Open Access content
    DSA-Mesh: a distributed security architecture for wireless mesh networks

    Security and Communication Networks

    Volume 4, Issue 3, March 2011, Pages: 242–256, Fabio Martignon, Stefano Paris and Antonio Capone

    Version of Record online : 13 JAN 2010, DOI: 10.1002/sec.181

  20. You have full text access to this Open Access content
    Impact of denial of service solutions on network quality of service

    Security and Communication Networks

    Volume 4, Issue 10, October 2011, Pages: 1089–1103, Scott Fowler, Sherali Zeadally and Naveen Chilamkurti

    Version of Record online : 26 JUL 2010, DOI: 10.1002/sec.219