REFERENCES

1. Z. A. Baig. A performance analysis of an application-level mechanism for preventing service flooding in the internet. Masters Thesis, University of Maryland, USA, 2003.

2. E. Catterall, K. Van Laerhoven, and M. Strohbach. Self-organization in ad hoc sensor networks: an empirical study. In Proceedings of the Eighth International Conference on Artificial Life, 2002.

3. H. Chan and A. Perrig. Security and privacy in sensor networks. IEEE Comput. Mag., 36:103–105, 2003.

4. R. Chang. Defending against flooding-based distributed denial of service attacks: A tutorial. IEEE Commun. Mag., 40:42–51, 2004.

5. T. Cormen, C. Leiserson, R. Rivest, and C. Stein. Introduction to Algorithms. MIT Press, 2001.

6. J. Deng, R. Han, and S. Mishra. Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks. In IEEE Intl' Conference on Dependable Systems and Networks (DSN'04), 2004.

7. S. Dietrich, N. Long, and D. Dittrich. Analyzing distributed denial of service attack tools: the shaft case. In 14th Systems Administration Conference, May 2000.

8. J. Elliot. Distributed denial of service attacks and the zombie ant effect. IT Pro, 2000, pp. 55–57.

9. V. D. Gligor. Guaranteeing access in spite of service-flooding attacks. In Proceedings of Int'l Workshop on Security Protocols, 2003.

10. J. Jung, B. Krishnamurthy, and M. Rabinovich. Flash crowds and denial of service attacks: characterization and implications for cdns and web sites. In International World Wide Web ...

Get Mobile Intelligence now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.