Search dblp for Publications

export results for "The Coremelt Attack."

 download as .bib file

@inproceedings{DBLP:conf/amcc/YangHSCHP18,
  author       = {Guosong Yang and
                  Hossein Hosseini and
                  Dinuka Sahabandu and
                  Andrew Clark and
                  Jo{\~{a}}o P. Hespanha and
                  Radha Poovendran},
  title        = {Modeling and Mitigating the Coremelt Attack},
  booktitle    = {2018 Annual American Control Conference, {ACC} 2018, Milwaukee, WI,
                  USA, June 27-29, 2018},
  pages        = {3410--3416},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.23919/ACC.2018.8431752},
  doi          = {10.23919/ACC.2018.8431752},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/amcc/YangHSCHP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/StuderP09,
  author       = {Ahren Studer and
                  Adrian Perrig},
  editor       = {Michael Backes and
                  Peng Ning},
  title        = {The Coremelt Attack},
  booktitle    = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
                  in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5789},
  pages        = {37--52},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04444-1\_3},
  doi          = {10.1007/978-3-642-04444-1\_3},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/StuderP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}