2010 2nd International Conference on Information Technology Convergence and Services 2010
DOI: 10.1109/itcs.2010.5581263
View full text |Buy / Rent full text
|
Sign up to set email alerts
|
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2014
2014
2018
2018

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 26 publications
(7 citation statements)
references
References 11 publications
(7 reference statements)
0
7
0
Order By: Relevance
“…In Choi et al 2010) integrated infrastructure for defense from DDOS attacks is presented. Firstly, attack is divided into three phases, than requirements for defense are shown for each phase.…”
Section: • Victimmentioning
confidence: 99%
“…In Choi et al 2010) integrated infrastructure for defense from DDOS attacks is presented. Firstly, attack is divided into three phases, than requirements for defense are shown for each phase.…”
Section: • Victimmentioning
confidence: 99%
“…Note that there can be other kinds of attacks such as distributed denial of service (DDoS) attacks in a VANET environment. However, there are already many existing techniques such as [23] and so we do not make it our focus in this paper.…”
Section: Security Requirementsmentioning
confidence: 99%
“…A general purpose DDoS defense technology is developed where the attack phases are analysed alongwith the general characteristics of attacks. For each phase DDoS attack prevention requirements are proposed and the integrated DDoS attack defense infrastructure is suggested [8].…”
Section: Integrated Ddos Attack Defense Infrastructure For Effectmentioning
confidence: 99%