Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 59 matches
- 2023
- Ali Karakoç, Fatih Alagöz:
LSAV: Lightweight source address validation in SDN to counteract IP spoofing-based DDoS attacks. Turkish J. Electr. Eng. Comput. Sci. 31(7): 1187-1205 (2023) - Tze Uei Chai, Hock Guan Goh, Soung-Yue Liew, Vasaki Ponnusamy:
Protection Schemes for DDoS, ARP Spoofing, and IP Fragmentation Attacks in Smart Factory. Syst. 11(4): 211 (2023) - Yasir Abdelgadir Mohamed:
Mitigating Distributed Denial of Service Attacks Through IP Spoofing Detection. ACIT 2023: 1-9 - Kenniston Arraes Bonfim, Fernando Da Silva Dutra, Carlos Eduardo Travagini Siqueira, Rodolfo Ipolito Meneguette, Aldri Luiz dos Santos, Lourenço Alves Pereira Júnior:
Federated Learning-based Architecture for Detecting Position Spoofing in Basic Safety Messages. VTC2023-Spring 2023: 1-5 - 2022
- Alden Hilton, Joel Hirschmann, Casey T. Deccio:
Beware of IPs in Sheep's Clothing: Measurement and Disclosure of IP Spoofing Vulnerabilities. IEEE/ACM Trans. Netw. 30(4): 1659-1673 (2022) - Fernando Da Silva Dutra, Kenniston Arraes Bonfim, Carlos Eduardo Travagini Siqueira, Lourenço Alves Pereira Júnior, Aldri Santos, Rodolfo Ipolito Meneguette:
DISMISS-BSM: an Architecture for Detecting Position Spoofing in Basic Safety Messages. GLOBECOM 2022: 3381-3386 - Hua Wu, Xuange Zhang, Tingzheng Chen, Guang Cheng, Xiaoyan Hu:
IM-Shield: A Novel Defense System against DDoS Attacks under IP Spoofing in High-speed Networks. ICC 2022: 4168-4173 - 2021
- Osvaldo L. H. M. Fonseca, Ítalo Cunha, Elverton C. Fazzion, Wagner Meira Jr., Brivaldo Alves da Silva, Ronaldo A. Ferreira, Ethan Katz-Bassett:
Identifying Networks Vulnerable to IP Spoofing. IEEE Trans. Netw. Serv. Manag. 18(3): 3170-3183 (2021) - 2020
- Harsh Gondaliya, Ganesh Chennimala Sankaran, Krishna M. Sivalingam:
Comparative Evaluation of IP Address Anti-Spoofing Mechanisms using a P4/NetFPGA-based Switch. EuroP4@CoNEXT 2020: 1-6 - 2019
- Natalija Vlajic, Mashruf Chowdhury, Marin Litoiu:
IP Spoofing In and Out of the Public Cloud: From Policy to Practice. Comput. 8(4): 81 (2019) - Yihao Jia, Ying Liu, Gang Ren:
Address Protection-as-a-Service an Inter-AS Framework for IP Spoofing Resilience. GLOBECOM 2019: 1-7 - Manoel F. Ramos, Bruno Lopes Dalmazo, Jéferson Campos Nobre:
A Proposal for IP Spoofing Mitigation at Origin in Homenet Using Software-Defined Networking. ICCSA (1) 2019: 179-192 - Jasper Eumann, Raphael Hiesgen, Thomas C. Schmidt, Matthias Wählisch:
A Reproducibility Study of "IP Spoofing Detection in Inter-Domain Traffic". CoRR abs/1911.05164 (2019) - 2018
- Chaoqin Zhang, Guangwu Hu, Guolong Chen, Arun Kumar Sangaiah, Ping'an Zhang, Xia Yan, Weijin Jiang:
Towards a SDN-Based Integrated Architecture for Mitigating IP Spoofing Attack. IEEE Access 6: 22764-22777 (2018) - S. Rajashree, K. S. Soman, Pritam Gajkumar Shah:
Security with IP Address Assignment and Spoofing for Smart IOT Devices. ICACCI 2018: 1914-1918 - 2017
- Monali Mavani, Krishna Asawa:
Modeling and analyses of IP spoofing attack in 6LoWPAN network. Comput. Secur. 70: 95-110 (2017) - Jelena Mirkovic, Erik Kline, Peter L. Reiher:
RESECT: Self-Learning Traffic Filters for IP Spoofing Defense. ACSAC 2017: 474-485 - Yihao Jia, Ying Liu, Gang Ren, Lin He:
Revisiting inter-AS IP spoofing let the protection drive source address validation. IPCCC 2017: 1-10 - 2016
- Alwar Rengarajan, Rajendran Sugumar, Chinnappan Jayakumar:
Secure verification technique for defending IP spoofing attacks. Int. Arab J. Inf. Technol. 13(2): 302-309 (2016) - Tae Hwan Kim, Dong Seong Kim, Heeyoung Jung:
Defending against DDoS Attacks under IP Spoofing Using Image Processing Approach. IEICE Trans. Commun. 99-B(7): 1511-1522 (2016) - N. M. Sahri, Koji Okamura:
Protecting DNS services from IP spoofing: SDN collaborative authentication approach. CFI 2016: 83-89 - Jaegwan Yu, Eunsoo Kim, Hyoungshick Kim, Jun Ho Huh:
A Framework for Detecting MAC and IP Spoofing Attacks with Network Characteristics. ICSSA 2016: 49-53 - Jian Zhang, Pin Liu, Jianbiao He, Yawei Zhang:
A Hadoop Based Analysis and Detection Model for IP Spoofing Typed DDoS Attack. Trustcom/BigDataSE/ISPA 2016: 1976-1983 - 2015
- Yohan Suryanto, Rizki Reynaldo Nasser, Riri Fitri Sari:
Performance Comparison of TCP Spoofing and End to End Approach to Enable Partial QoS on IP Based Network. Int. J. Comput. Commun. Control 10(3): 403-419 (2015) - Kevin Benton, L. Jean Camp, Timothy Kelley, Martin Swany:
Filtering IP source spoofing using feasible path reverse path forwarding with SDN. CNS 2015: 733-734 - Opeyemi A. Osanaiye:
Short Paper: IP spoofing detection for preventing DDoS attack in Cloud Computing. ICIN 2015: 139-141 - 2014
- Jung-Ha Kang, Yang Sun Lee, Jae Young Kim, Eun-Gi Kim:
ARP Modification for Prevention of IP Spoofing. J. Inform. and Commun. Convergence Engineering 12(3): 154-160 (2014) - Ayman Mukaddam, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab:
IP Spoofing Detection Using Modified Hop Count. AINA 2014: 512-516 - Guang Yao, Jun Bi, Tao Feng, Peiyao Xiao, Duanqi Zhou:
Performing software defined route-based IP spoofing filtering with SEFA. ICCCN 2014: 1-8 - 2013
- Guang Yao, Jun Bi, Peiyao Xiao:
VASE: Filtering IP spoofing traffic with agility. Comput. Networks 57(1): 243-257 (2013)
skipping 29 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-25 04:19 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint