Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2015
2015
2015
2015

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 7 publications
0
1
0
Order By: Relevance
“…Despite the different focus between such schemes and STONE , it is still possible to note how STONE is able to overcome some of their limitations, as discussed in the following. Sahu & Pandey (2015) discuss a defense scheme for wireless sensor networks. In this case, the proposed detection and mitigation methods are based on monitoring of the frequency with which clients connect to a given entity (the possible target of a DDoS attack).…”
Section: Ddos Mitigation Methodsmentioning
confidence: 99%
“…Despite the different focus between such schemes and STONE , it is still possible to note how STONE is able to overcome some of their limitations, as discussed in the following. Sahu & Pandey (2015) discuss a defense scheme for wireless sensor networks. In this case, the proposed detection and mitigation methods are based on monitoring of the frequency with which clients connect to a given entity (the possible target of a DDoS attack).…”
Section: Ddos Mitigation Methodsmentioning
confidence: 99%