2009 IEEE International Conference on Network Infrastructure and Digital Content 2009
DOI: 10.1109/icnidc.2009.5360962
|View full text |Cite
|
Sign up to set email alerts
|
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 6 publications
0
1
0
Order By: Relevance
“…In a word, SEND has many limitations including computation, deployment and security (Ahmed et al, 2017;Gelogo et al, 2011). Proposals to enhance SEND and make it applicable were introduced in (Sarma, 2014;Rafiee et al, 2011;Doja and Saggar, 2012;Kempf et al, 2006;Park et al, 2007;Cheneau and Laurent, 2011;Huang et al, 2009;Oh and Chae, 2007;Vasić et al, 2011;Lu et al, 2017). A small test bed consists of three computers; switch and router were used to implement DoS attacks against SeND.…”
Section: Proposed Solutionmentioning
confidence: 99%
“…In a word, SEND has many limitations including computation, deployment and security (Ahmed et al, 2017;Gelogo et al, 2011). Proposals to enhance SEND and make it applicable were introduced in (Sarma, 2014;Rafiee et al, 2011;Doja and Saggar, 2012;Kempf et al, 2006;Park et al, 2007;Cheneau and Laurent, 2011;Huang et al, 2009;Oh and Chae, 2007;Vasić et al, 2011;Lu et al, 2017). A small test bed consists of three computers; switch and router were used to implement DoS attacks against SeND.…”
Section: Proposed Solutionmentioning
confidence: 99%