Cited By
View all- Patil RDevane SShekhawat RGaur MElci AVaidya JMakarevich OPoet ROrgun MDhaka VBohra MSingh VBabenko LSheykhkanloo NRahnama B(2017)Unmasking of source identity, a step beyond in cyber forensicProceedings of the 10th International Conference on Security of Information and Networks10.1145/3136825.3136870(157-164)Online publication date: 13-Oct-2017
- Singh KSingh PKumar K(2016)A systematic review of IP traceback schemes for denial of service attacksComputers and Security10.1016/j.cose.2015.06.00756:C(111-139)Online publication date: 1-Feb-2016
- Wang CYu CLiang CYu KOuyang WHsu CChen YOnoe SGuizani MChen HSawahashi M(2006)Tracers placement for IP traceback against DDoS attacksProceedings of the 2006 international conference on Wireless communications and mobile computing10.1145/1143549.1143620(355-360)Online publication date: 3-Jul-2006