1. Gao Z Q, Ansari N. Tracing cyber attacks from the practical perspective. IEEE Communications Magazine, 2005, 43(5): 123-131
2. Douligeris C, Mitrokotsa A. DDoS attacks and defense mechanisms: Classification and state-of-the-art. Computer Networks, 2004, 44(4): 643-666
3. Belenky A, Ansari N. IP traceback with deterministic packet marking. IEEE Communications Letters, 2003, 7(4): 162-164
4. Belenky A, Ansari N. Tracing multiple attackers with deterministic packet marking (DPM). Proceedings of the 2003 IEEE Pacific Rim Conference on Communications Computers and Signal Processing (PACRIM’03), Aug 28-30, 2003, Victoria, Canada. Piscataway, NJ, USA: IEEE, 2003: 49-52
5. Belenky A, Ansari N. Accommodating fragmentation in deterministic packet marking for IP traceback. Proceedings of Global Telecommunications Conference (GLOBECOM’03), Dec 1-5, 2003, San Francisco, CA, USA. Piscataway, NJ, USA: IEEE, 2003: 1374-1378
6. Jin G, Yang J G. Deterministic packet marking based on redundant decomposition for IP traceback. IEEE Communications Letters, 2006, 10(3): 204-206
7. Song D, Perrig A. Advanced and authenticated marking schemes for IP traceback. Proceedings of the 20th Annual Joint Conference of the IEEE Computer and Communications Societies (Infocom’01), Apr 24-26, 2001, Anchorage, AK, USA. Piscataway, NJ, USA: IEEE, 2001: 878-886
8. Yaar A, Perrig A, Song D. FIT: fast Internet traceback. Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM’05), Mar 13-17, 2005, Miami, FL, USA. Piscataway, NJ, USA: IEEE, 2005: 1395-1406
9. Feller W. An introduction to probability theory and its applications: Vol 1. 3rd ed. New York, NY, USA: John Wiley & Sons, 1968 |