Jelena Mirkovic
Jelena Mirkovic
Verificeret mail på isi.edu - Startside
Citeret af
Citeret af
A taxonomy of DDoS attacks and DDoS defense mechanisms
J Mirkovic, J Martin, P Reiher
ACM SIGCOMM Computer Communication Review 34 (2), 39-53, 2004
Attacking DDoS at the source
P Reiher, J Mirkovic, G Prier
Proceedings of the 10th IEEE International Conference on Network Protocols, 2002
Internet denial of service: attack and defense mechanisms (Radia Perlman Computer Networking and Security)
J Mirkovic, S Dietrich, D Dittrich, P Reiher
Prentice Hall PTR, 2004
SAVE: Source address validity enforcement protocol
J Li, J Mirkovic, M Wang, P Reiher, L Zhang
Proceedings. Twenty-First Annual Joint Conference of the IEEE Computer and …, 2002
D-WARD: a source-end defense against flooding denial-of-service attacks
J Mirkovic, P Reiher
IEEE transactions on Dependable and Secure Computing 2 (3), 216-232, 2005
Modeling human behavior for defense against flash-crowd attacks
G Oikonomou, J Mirkovic
2009 IEEE International Conference on Communications, 1-6, 2009
D-WARD: source-end defense against distributed denial-of-service attacks
J Mirkovic
University of California, Los Angeles, 2003
The DETER project: Advancing the science of cyber security experimentation and test
J Mirkovic, TV Benzel, T Faber, R Braden, JT Wroclawski, S Schwab
Technologies for Homeland Security (HST), 2010 IEEE International Conference …, 2010
A framework for a collaborative DDoS defense
G Oikonomou, J Mirkovic, P Reiher, M Robinson
Computer Security Applications Conference, 2006. ACSAC'06. 22nd Annual, 33-42, 2006
Teaching cybersecurity with DeterLab
J Mirkovic, T Benzel
IEEE Security & Privacy 10 (1), 73-76, 2012
Alliance formation for DDoS defense
J Mirkovic, M Robinson, P Reiher
Proceedings of the 2003 workshop on New security paradigms, 11-18, 2003
Source-end DDoS defense
J Mirkovic, G Prier, P Reiher
Second IEEE International Symposium on Network Computing and Applications …, 2003
Distributed defense against DDOS attacks
J Mirkovic, M Robinson, P Reiher, G Oikonomou
University of Delaware CIS Department Technical Report CIS-TR-2005-02, 2005
Accurately measuring denial of service in simulation and testbed experiments
J Mirkovic, A Hussain, S Fahmy, P Reiher, RK Thomas
IEEE Transactions on Dependable and Secure Computing 6 (2), 81-95, 2008
Towards user-centric metrics for denial-of-service measurement
J Mirkovic, A Hussain, B Wilson, S Fahmy, P Reiher, R Thomas, WM Yao, ...
Proceedings of the 2007 workshop on Experimental computer science, 8-es, 2007
Perspectives on the SolarWinds incident
S Peisert, B Schneier, H Okhravi, F Massacci, T Benzel, C Landwehr, ...
IEEE Security & Privacy 19 (2), 7-13, 2021
Profiling and Clustering Internet Hosts.
S Wei, J Mirkovic, E Kissel
DMIN 6, 269-75, 2006
Class Capture-the-Flag Exercises
J Mirkovic, PAH Peterson
2014 USENIX Summit on Gaming, Games, and Gamification in Security Education …, 2014
Distributed worm simulation with a realistic internet model
S Wei, J Mirkovic, M Swany
Proceedings of the 19th Workshop on Principles of Advanced and Distributed …, 2005
Benchmarks for DDoS defense evaluation
J Mirkovic, E Arikan, S Wei, R Thomas, S Fahmy, P Reiher
MILCOM 2006-2006 IEEE Military Communications conference, 1-10, 2006
Systemet kan ikke foretage handlingen nu. Prøv igen senere.
Artikler 1–20