

Security for Web Applications Using Wiretap Library
Abstract
Keywords
References
D. Moore, G. Voelker, and S. Savage, “Inferring internet denial-of-service activity,” in Proc. USENIX Security Symp.,Washigton, D.C., Aug.2001, pp. 9–22.
P. Ferguson and D. Senie, “Network ingress filtering: Defeating denial of service attacks which employ ip source address spoofing,” RFC 2827, May 2000.
S. Kandula, D. Katabi, M. Jacob, and A. Berger, “Botz-4-sale: Surviving organized ddos attacks that mimic flash crowds,” presented at the 2nd Symp. Networked Systems Design and Implementation, Boston,MA, May 2005.
T. Bu, S. Norden, and T.Woo, “A survivable dos-resistant overlay network,”Comput. Netw., vol. 50, no. 9, pp. 1281–1301, Jun. 2006.
T. Bu, S. Norden, and T. Woo, “Trading resiliency for security: Model and algorithms,” in Proc. 12th IEEE Int. Conf. Network Protocols, Berlin, Germany, 2004, pp. 218–227.
R. Narasimha, Z. Chen, and C. Ji, “Topological malware propagation on networks: Spatial dependence and its significance,” IEEE Trans. Secure Dependable Comput., 2007, submitted for publication.
C. E. Shannon, “Communication theory of secrecy systems,” Bell Syst. Tech. J., vol. 28, pp. 656–715, 1948.
A. D.Wyner, “The wire-tap channel,” Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355–1367, Oct. 1975.
L. H. Ozarow and A. D.Wyner, “Wire tap channel II,” AT&T Bell Laboratories Tech. J., vol. 63, no. 10, pp. 2135–2157, Dec. 1984.
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution 3.0 License.