Danger Theory Based Risk Evaluation Model for Smurf Attacks | Scientific.Net (original) (raw)

[1] G. Zhang and M. Parashar: Cluster Comput., Vol. 13 (2010), pp.67-86.

Google Scholar

[2] R. J. Anderson: Security Engineering: A Guide to Building Dependable Distributed Systems , 2nd Edition, John Wiley & Sons, (2008).

Google Scholar

[3] Information on http: /en. wikipedia. org/wiki/Computer_network_operations.

Google Scholar

[4] Y. Yang, J. Jiao, H. Wang and C. Xai, in: Proc. of the Int. Conf. Info. Sci. Eng., (2009), pp.1617-1621.

Google Scholar

[5] S. Hariri, Q.U. Guangzhi, T. Dharmagadda, M. Ramkishore and C. Raghavendra: IEEE Secur. Privacy, Vol. 1 (2003), pp.256-261.

DOI: 10.1109/msecp.2003.1236235

Google Scholar

[6] X. T. Duan, C. F. Liu and C. B. Liu: Journal on Communications, Vol. 31 (2010), pp.109-114.

Google Scholar

[7] M. Shehab, N. Mansour and A. Faour, in: Proc. of the Int. Symp. Parall. Archit. Algorithms Networks, (2008), pp.167-172.

Google Scholar

[8] S. Teng, H. Du, N. Wu, W. Zhang and J. Su: Journal of Networks, Vol. 5 (2010), pp.475-483.

Google Scholar

[9] F. D. Rango and A. Marano, in Proc. of the ACM Int. Wirel. Commun. Mob. Comput. Conf., (2009), pp.1443-1448.

Google Scholar

[10] F. Sun, Q. Zheng and T. Li, in: Proc. of the Int. Conf. Bioinformatics Biomed. Eng., Vol. 1 (2008), pp.644-647.

Google Scholar

[11] T. Li: Sci. in China, Ser. F: Info. Sci., Vol. 51 (2008), pp.1475-1486.

Google Scholar

[12] R. L. Fanelli: Lecture Notes in Computer Science, Vol. 6209 (2010), pp.264-275.

Google Scholar

[13] F. Sun and L. Gao, in Proc. of the ETP/IITA Conf. Sys. Sci. Simu. Eng., (2010), pp.62-65.

Google Scholar

[14] G. R. Zargar and P. Kabiri, in: Proc. of the IEEE Stud. Conf. Res. Dev., (2009), pp.49-52.

Google Scholar

[15] S. Kumar, M. Azad, O. Gomez and R. Valdez, in: Proc. Adv. Int. Conf. Telecom. Int. Conf. Internet Web Applic. Serv., (2006), p.89.

Google Scholar

[16] F. Sun, M. Kong and S. Deng, in: Proc. of the Int. Conf. Networks Secur., Wirel. Commun. Trusted Comput., Vol. 1 (2010), pp.74-76.

Google Scholar

[17] L. N. Castro and J. I. Timmis: Soft Computing, Vol. 7 (2003), pp.526-544.

Google Scholar

[18] N. Nanas and A. De Roeck: Lecture Notes in Computer Science, Vol. 4628 (2007), pp.13-24.

Google Scholar

[19] F. Sun and Z. Wu, in: Proc. of the Int. Conf. E-learn., E-Bus., Enterp. Inf. Syst., E-Gov., (2009), pp.119-121.

Google Scholar

[20] F. Sun and F. Xu, in: Proc. of the Int. Conf. Bioinformatics Biomed. Eng., Vol. 1 (2009), pp.1-4.

Google Scholar

[21] F. Sun and S. Zhang, in: Proc. of the Int. Conf. Web Inf. Syst. Min., (2009), pp.515-518.

Google Scholar

[22] F. Sun, X. Han and J. Wang, in: Proc. of the Int. Conf. Chall. Environ. Sci. Comput. Eng., Vol. 2 (2010), pp.33-35.

Google Scholar

[23] P. Matzinger: Science, Vol. 12 (2002), pp.301-305.

Google Scholar

[24] F. Sun, M. Kong and J. Wang, in: Proc. of the Int. Conf. MultiMedia Info. Technol., Vol. 2 (2010), pp.93-95.

Google Scholar

[25] F. Sun, in: Proc. of the Int. Conf. E-learn., E-Bus., Enterp. Inf. Syst., E-Gov., Vol. 2 (2010), pp.145-148.

Google Scholar

[26] F. Sun: submitted to Journal of Advanced Materials Research (2010).

Google Scholar