Detektion und Prävention von Denial-of-Service Amplification Attacken – Schutz des Netzes aus Sicht eines Amplifiers
Sicherheit in vernetzten Systemen: 22. DFN-Konferenz
Books on Demand
2015
Investigating the Nature of Routing Anomalies: Closing in on Subprefix Hijacking Attacks
Proc. 7th Int. Workshop on Traffic Monitoring and Analysis
2015
DoS Amplification Attacks – Protocol-Agnostic Detection of Service Abuse in Amplifier Networks
Proc. 7th Int. Workshop on Traffic Monitoring and Analysis
2015
A Scoring Method for the Verification of Configuration Changes in Self-Organizing Networks
7th International Conference on Mobile Networks and Management (MONAMI 2015)
2015
A Framework for Cell-Association Auto Configuration of Network Functions in Cellular Networks
7th International Conference on Mobile Networks and Management (MONAMI 2015)
2015
A Constraint Optimization-Based Resolution of Verification Collisions in Self-Organizing Networks
IEEE Global Communications Conference (GlobeCom 2015)
2015
A Graph Coloring Approach for Scheduling Undo Actions in Self-Organizing Networks
IFIP/IEEE International Symposium on Integrated Network Management (IM 2015)
2015
The Abandoned Side of the Internet: Hijacking Internet Resources When Domain Names Expire
Proc. 7th Int. Workshop on Traffic Monitoring and Analysis
2015
Investigating the Nature of Routing Anomalies: Closing in on Subprefix Hijacking Attacks
Proc. 7th Int. Workshop on Traffic Monitoring and Analysis
2015