Fine-grained capabilities for flooding DDoS defense using client reputations. Natu, M. & Mirkovic, J. In Proceedings of the 2007 workshop on Large Scale Attack Defense, pages 105–112, 2007. ACM. bibtex @inproceedings{natu2007fine,
title={Fine-grained capabilities for flooding DDoS defense using client reputations},
author={Natu, Maitreya and Mirkovic, Jelena},
booktitle={Proceedings of the 2007 workshop on Large Scale Attack Defense},
pages={105--112},
year={2007},
organization={ACM}
}
Downloads: 0
{"_id":"K73uPMA87u5Fofx9o","bibbaseid":"natu-mirkovic-finegrainedcapabilitiesforfloodingddosdefenseusingclientreputations-2007","author_short":["Natu, M.","Mirkovic, J."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","title":"Fine-grained capabilities for flooding DDoS defense using client reputations","author":[{"propositions":[],"lastnames":["Natu"],"firstnames":["Maitreya"],"suffixes":[]},{"propositions":[],"lastnames":["Mirkovic"],"firstnames":["Jelena"],"suffixes":[]}],"booktitle":"Proceedings of the 2007 workshop on Large Scale Attack Defense","pages":"105–112","year":"2007","organization":"ACM","bibtex":"@inproceedings{natu2007fine,\n title={Fine-grained capabilities for flooding DDoS defense using client reputations},\n author={Natu, Maitreya and Mirkovic, Jelena},\n booktitle={Proceedings of the 2007 workshop on Large Scale Attack Defense},\n pages={105--112},\n year={2007},\n organization={ACM}\n}\n\n","author_short":["Natu, M.","Mirkovic, J."],"key":"natu2007fine","id":"natu2007fine","bibbaseid":"natu-mirkovic-finegrainedcapabilitiesforfloodingddosdefenseusingclientreputations-2007","role":"author","urls":{},"metadata":{"authorlinks":{}}},"bibtype":"inproceedings","biburl":"https://bibbase.org/network/files/2WNBgwTRfefSKBGKb","dataSources":["Lc8KDmQn8RuDaFqeg","nxSyfTE8ojajS8Wcm","2Fkx7mpveyLCGzDsW","smJny2HbQ4ct2q8T6","5ByepEgrvFujJFiRX"],"keywords":[],"search_terms":["fine","grained","capabilities","flooding","ddos","defense","using","client","reputations","natu","mirkovic"],"title":"Fine-grained capabilities for flooding DDoS defense using client reputations","year":2007}