References

[ABKM01] D.G. Andersen, H. Balakrishnan, M.F. Kaashoek, and R. Morris, “Resilient Overlay Networks,” Proceedings of 18th ACM Symposium on Operating Systems Principles (SOSP 2001), October 2001, pp. 131–145.

[ACF+99] J. Allen, A. Christie, W. Fithen, J. McHugh, J. Pickel, and E. Stoner, State of the Practice of Intrusion Detection Technologies, Technical Report CMU/SEI-99-TR-028, Software Engineering Institute, 1999.

[Ada80] D. Adams, Hitchhiker’s Guide to the Galaxy, Harmony Books, 1980.

[Adl02] M. Adler, “Tradeoffs in Probabilistic Packet Marking for IP Traceback,” Proceedings of the 34th annual ACM Symposium on Theory of Computing, ACM Press, 2002, pp. 407–418.

[AJ] A. Jesdanun, “New computer Virus Variant Floods Web Sites of Anti-Spam ...

Get Internet Denial of Service: Attack and Defense Mechanisms now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.