ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Detection of interest flooding attacks in Named Data Networking using hypothesis testing
2015 IEEE International Workshop on Information Forensics and Security (WIFS)
◽
10.1109/wifs.2015.7368571
◽
2015
◽
Cited By ~ 15
Author(s):
Tan N. Nguyen
◽
Remi Cogranne
◽
Guillaume Doyen
◽
Florent Retraint
Keyword(s):
Hypothesis Testing
◽
Named Data Networking
◽
Flooding Attacks
◽
Data Networking
Download Full-text
Related Documents
Cited By
References
Cooperative detection and protection for Interest flooding attacks in named data networking
International Journal of Communication Systems
◽
10.1002/dac.2883
◽
2014
◽
Vol 29
(13)
◽
pp. 1968-1980
◽
Cited By ~ 8
Author(s):
Kun Ding
◽
Yun Liu
◽
Hsin-Hung Cho
◽
Han-Chieh Chao
◽
Timothy K. Shih
Keyword(s):
Named Data Networking
◽
Flooding Attacks
◽
Cooperative Detection
◽
Data Networking
Download Full-text
Mitigation measures of collusive interest flooding attacks in named data networking
Computers & Security
◽
10.1016/j.cose.2020.101971
◽
2020
◽
Vol 97
◽
pp. 101971
◽
Cited By ~ 1
Author(s):
Zhijun Wu
◽
Wenzhi Feng
◽
Meng Yue
◽
Xinran Xu
◽
Liang Liu
Keyword(s):
Mitigation Measures
◽
Named Data Networking
◽
Flooding Attacks
◽
Data Networking
Download Full-text
Cooperative-Filter: countering Interest flooding attacks in named data networking
Soft Computing
◽
10.1007/s00500-014-1275-z
◽
2014
◽
Vol 18
(9)
◽
pp. 1803-1813
◽
Cited By ~ 21
Author(s):
Kai Wang
◽
Huachun Zhou
◽
Yajuan Qin
◽
Hongke Zhang
Keyword(s):
Named Data Networking
◽
Flooding Attacks
◽
Data Networking
Download Full-text
Advanced interest flooding attacks in named-data networking
2017 IEEE 16th International Symposium on Network Computing and Applications (NCA)
◽
10.1109/nca.2017.8171325
◽
2017
◽
Cited By ~ 7
Author(s):
Salvatore Signorello
◽
Samuel Marchal
◽
Jerome Francois
◽
Olivier Festor
◽
Radu State
Keyword(s):
Named Data Networking
◽
Flooding Attacks
◽
Data Networking
Download Full-text
A Novel Congestion-Aware Interest Flooding Attacks Detection Mechanism in Named Data Networking
2019 28th International Conference on Computer Communication and Networks (ICCCN)
◽
10.1109/icccn.2019.8847146
◽
2019
◽
Cited By ~ 1
Author(s):
Ahmed Benmoussa
◽
Abdou el Karim Tahari
◽
Nasreddine Lagaa
◽
Abderrahmane Lakas
◽
Farhan Ahmad
◽
...
Keyword(s):
Named Data Networking
◽
Detection Mechanism
◽
Flooding Attacks
◽
Congestion Aware
◽
Data Networking
Download Full-text
Isolation Forest-Based Mechanism to Defend against Interest Flooding Attacks in Named Data Networking
IEEE Communications Magazine
◽
10.1109/mcom.001.2000368
◽
2021
◽
Vol 59
(3)
◽
pp. 98-103
Author(s):
Guanglin Xing
◽
Jing Chen
◽
Rui Hou
◽
Lingyun Zhou
◽
Mianxiong Dong
◽
...
Keyword(s):
Named Data Networking
◽
Flooding Attacks
◽
Isolation Forest
◽
Data Networking
Download Full-text
Detection of collusive interest flooding attacks in named data networking using wavelet analysis
MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)
◽
10.1109/milcom.2017.8170763
◽
2017
◽
Cited By ~ 8
Author(s):
Yonghui Xin
◽
Yang Li
◽
Wei Wang
◽
Weiyuan Li
◽
Xin Chen
Keyword(s):
Wavelet Analysis
◽
Named Data Networking
◽
Flooding Attacks
◽
Data Networking
Download Full-text
Exploring the availability and effectiveness of named data networking in handling consumer mobility
Industrial Electronics and Engineering
◽
10.2495/iciee140961
◽
2014
◽
Author(s):
Kai Lei
◽
Fanyun Zou
Keyword(s):
Named Data Networking
◽
Data Networking
Download Full-text
Legal and Policy Implications of Named Data Networking
SSRN Electronic Journal
◽
10.2139/ssrn.2242051
◽
2013
◽
Author(s):
Charles Duan
◽
Cynthia Grady
◽
Paul Ohm
◽
James Grimmelmann
Keyword(s):
Policy Implications
◽
Named Data Networking
◽
Data Networking
Download Full-text
A Cache Placement Strategy Based on Entropy weighting method and TOPSIS in Named Data Networking
IEEE Access
◽
10.1109/access.2021.3071427
◽
2021
◽
pp. 1-1
Author(s):
Yiqi Gui
◽
Yongkang Chen
Keyword(s):
Named Data Networking
◽
Weighting Method
◽
Cache Placement
◽
Data Networking
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close