Search Results

There are 9518 results for: content related to: TDPF: a traceback-based distributed packet filter to mitigate spoofed DDoS attacks

  1. You have full text access to this Open Access content
    A novel path-based approach for single-packet IP traceback

    Security and Communication Networks

    Volume 7, Issue 2, February 2014, Pages: 309–321, Ning Lu, Yulong Wang, Sen Su and Fangchun Yang

    Version of Record online : 21 MAR 2013, DOI: 10.1002/sec.741

  2. You have full text access to this Open Access content
    Denial-of-service in content centric (named data) networking: a tutorial and state-of-the-art survey

    Security and Communication Networks

    Volume 8, Issue 11, 25 July 2015, Pages: 2037–2059, Muhammad Aamir and Syed Mustafa Ali Zaidi

    Version of Record online : 29 OCT 2014, DOI: 10.1002/sec.1149

  3. You have full text access to this Open Access content
    A scalable certificateless architecture for multicast wireless mesh network using proxy re-encryption

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 14–32, Hongbing Wang, Zhenfu Cao and Lifei Wei

    Version of Record online : 30 MAY 2013, DOI: 10.1002/sec.720

  4. Competition for Order Flow and Smart Order Routing Systems

    The Journal of Finance

    Volume 63, Issue 1, February 2008, Pages: 119–158, THIERRY FOUCAULT and ALBERT J. MENKVELD

    Version of Record online : 10 JAN 2008, DOI: 10.1111/j.1540-6261.2008.01312.x

  5. You have full text access to this Open Access content
    Detecting and mitigating interest flooding attacks in content-centric network

    Security and Communication Networks

    Volume 7, Issue 4, April 2014, Pages: 685–699, Kai Wang, Huachun Zhou, Hongbin Luo, Jianfeng Guan, Yajuan Qin and Hongke Zhang

    Version of Record online : 10 APR 2013, DOI: 10.1002/sec.770

  6. Optimal redundancy allocation for high availability routers

    International Journal of Communication Systems

    Volume 23, Issue 12, December 2010, Pages: 1581–1599, Chia-Tai Tsai, Rong-Hong Jan and Kuochen Wang

    Version of Record online : 30 MAR 2010, DOI: 10.1002/dac.1127

  7. You have full text access to this Open Access content
    A scalable NAT-based solution to Internet access denial by higher-tier ISPs

    Security and Communication Networks

    Volume 6, Issue 2, February 2013, Pages: 194–209, Marwan Abu-Amara, Abdulaziz Al-Baiz, Ashraf S. Mahmoud, Mohammed H. Sqalli and Farag Azzedin

    Version of Record online : 10 MAY 2012, DOI: 10.1002/sec.557

  8. Request routing through collaborative in-network caching for bandwidth optimization: a methodology

    Transactions on Emerging Telecommunications Technologies

    Volume 28, Issue 1, January 2017, Yuemei Xu, Zihou Wang, Yang Li, Fu Chen, Tao Lin and Wenjia Niu

    Version of Record online : 26 MAY 2015, DOI: 10.1002/ett.2947

  9. You have full text access to this Open Access content
    Coloring networks for attacker identification and response

    Security and Communication Networks

    Volume 8, Issue 5, 25 March 2015, Pages: 751–768, Ashok Singh Sairam, Sangita Roy and Rishikesh Sahay

    Version of Record online : 19 JUL 2014, DOI: 10.1002/sec.1022

  10. You have free access to this content
    Popularity–Based Adaptive Content Delivery Scheme with In-Network Caching

    ETRI Journal

    Volume 36, Issue 5, October 2014, Pages: 819–828, Jeong Yun Kim, Gyu Myoung Lee and Jun Kyun Choi

    Version of Record online : 1 OCT 2014, DOI: 10.4218/etrij.14.0113.0090

  11. Lightweight PIM—a new multicast routing protocol

    International Journal of Communication Systems

    Volume 27, Issue 10, October 2014, Pages: 1441–1458, Tomasz Bartczak and Piotr Zwierzykowski

    Version of Record online : 25 JUL 2012, DOI: 10.1002/dac.2407

  12. Internet Architecture

    Standard Article

    The Internet Encyclopedia

    Graham Knight

    Published Online : 15 APR 2004, DOI: 10.1002/047148296X.tie088

  13. You have full text access to this Open Access content
    IP address assignment in wireless mesh networks

    Wireless Communications and Mobile Computing

    Volume 11, Issue 3, March 2011, Pages: 321–337, Alexander Zimmermann, Arnd Hannemann and Benjamin Schleinzer

    Version of Record online : 20 JUL 2010, DOI: 10.1002/wcm.982

  14. You have full text access to this Open Access content
    Filtering location optimization for the reactive packet filtering

    Security and Communication Networks

    Volume 7, Issue 7, July 2014, Pages: 1150–1164, Ning Lu, Yulong Wang, Sen Su, Fangchun Yang and Rui Han

    Version of Record online : 19 JUL 2013, DOI: 10.1002/sec.848

  15. Optimizing content routers deployment in large-scale information centric core-edge separation Internet

    International Journal of Communication Systems

    Volume 27, Issue 5, May 2014, Pages: 794–810, Jia Chen, Hongke Zhang, Huachun Zhou and Hongbin Luo

    Version of Record online : 5 JUN 2013, DOI: 10.1002/dac.2580

  16. You have full text access to this Open Access content
    A combined solution for the Internet access denial caused by malicious Internet service providers

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 2078–2093, Marwan Abu-Amara

    Version of Record online : 14 NOV 2013, DOI: 10.1002/sec.920

  17. You have full text access to this Open Access content
    Increasing the effectiveness of packet marking schemes using wrap-around counting Bloom filter

    Security and Communication Networks

    Volume 9, Issue 16, 10 November 2016, Pages: 3467–3482, Samant Saurabh and Ashok Singh Sairam

    Version of Record online : 7 JUL 2016, DOI: 10.1002/sec.1554

  18. An exploration of cache collaboration in information-centric network

    International Journal of Communication Systems

    Volume 27, Issue 9, September 2014, Pages: 1243–1267, Bohao Feng, Huachun Zhou, Shuai Gao and Ilsun You

    Version of Record online : 17 MAR 2014, DOI: 10.1002/dac.2773

  19. A forwarding strategy of counteracting redundancy data in named data networking

    International Journal of Communication Systems

    Volume 28, Issue 18, December 2015, Pages: 2289–2310, Huan Yan, Deyun Gao, Wei Su and Han-Chieh Chao

    Version of Record online : 3 AUG 2015, DOI: 10.1002/dac.3025

  20. An asynchronous hierarchical router for networks-on-chip-based three-dimensional multi-processor system-on-chip

    Software: Practice and Experience

    Volume 42, Issue 7, July 2012, Pages: 877–890, Walid Lafi, Didier Lattard and Ahmed Jerrya

    Version of Record online : 7 FEB 2012, DOI: 10.1002/spe.1150