Performance Comparison of IPsec and TLS Based VPN Technologies Stará Lesná, The High Tatras, Slovakia, ICETA 2011 : 9th IEEE International Conference on Emerging eLearning Technologies and Applications, pp.217-221, 2011. ,
Summary cache: a scalable wide-area Web cache sharing protocol, IEEE/ACM Transactions on Networking, vol.8, issue.3, pp.281-293, 2000. ,
DOI : 10.1109/90.851975
A taxonomy of capabilities based DDoS defense architectures, 2011 9th IEEE/ACS International Conference on Computer Systems and Applications (AICCSA), pp.157-164, 2011. ,
DOI : 10.1109/AICCSA.2011.6126615
Evaluation of mitigation methods for distributed denial of service attacks, 2012 7th IEEE Conference on Industrial Electronics and Applications (ICIEA), pp.713-718, 2012. ,
DOI : 10.1109/ICIEA.2012.6360818
Steps to defend against DoS attacks, 2009 12th International Conference on Computers and Information Technology, pp.614-619, 2009. ,
DOI : 10.1109/ICCIT.2009.5407310
Sep.) Transmission control protocol, 1981. ,
Improving false positive in Bloom filter, 19th Iranian Conference on, p.1, 2011. ,
Enhancing security in mobile data networks through end user and core network cooperation, Proceedings of International Conference on Advances in Mobile Computing & Multimedia, MoMM '13, pp.978-979 ,
DOI : 10.1145/2536853.2536875
Throttling spoofed syn flooding traffic at the source, Telecommunication Systems, vol.33, issue.3, pp.47-65, 2006. ,
Use offense to inform defense. Find flaws before the bad guys do. SANS Institute Last Updated: 31, 2000. ,
Complemento Howto, 2011. ,
Flood with Random Spoofed Source Address, p.31, 2014. ,
Mitigate TCP SYN Flood Attacks with Red Hat Enterprise Linux 7 Beta Posted on 11, 2014. ,
Securing and controling CISCO routers, 2002. ,
DOI : 10.1201/9781420031454