Danger Theory Based Risk Evaluation Model for Smurf Attacks | Scientific.Net (original) (raw)
[1] G. Zhang and M. Parashar: Cluster Comput., Vol. 13 (2010), pp.67-86.
[2] R. J. Anderson: Security Engineering: A Guide to Building Dependable Distributed Systems , 2nd Edition, John Wiley & Sons, (2008).
[3] Information on http: /en. wikipedia. org/wiki/Computer_network_operations.
[4] Y. Yang, J. Jiao, H. Wang and C. Xai, in: Proc. of the Int. Conf. Info. Sci. Eng., (2009), pp.1617-1621.
[5] S. Hariri, Q.U. Guangzhi, T. Dharmagadda, M. Ramkishore and C. Raghavendra: IEEE Secur. Privacy, Vol. 1 (2003), pp.256-261.
DOI: 10.1109/msecp.2003.1236235
[6] X. T. Duan, C. F. Liu and C. B. Liu: Journal on Communications, Vol. 31 (2010), pp.109-114.
[7] M. Shehab, N. Mansour and A. Faour, in: Proc. of the Int. Symp. Parall. Archit. Algorithms Networks, (2008), pp.167-172.
[8] S. Teng, H. Du, N. Wu, W. Zhang and J. Su: Journal of Networks, Vol. 5 (2010), pp.475-483.
[9] F. D. Rango and A. Marano, in Proc. of the ACM Int. Wirel. Commun. Mob. Comput. Conf., (2009), pp.1443-1448.
[10] F. Sun, Q. Zheng and T. Li, in: Proc. of the Int. Conf. Bioinformatics Biomed. Eng., Vol. 1 (2008), pp.644-647.
[11] T. Li: Sci. in China, Ser. F: Info. Sci., Vol. 51 (2008), pp.1475-1486.
[12] R. L. Fanelli: Lecture Notes in Computer Science, Vol. 6209 (2010), pp.264-275.
[13] F. Sun and L. Gao, in Proc. of the ETP/IITA Conf. Sys. Sci. Simu. Eng., (2010), pp.62-65.
[14] G. R. Zargar and P. Kabiri, in: Proc. of the IEEE Stud. Conf. Res. Dev., (2009), pp.49-52.
[15] S. Kumar, M. Azad, O. Gomez and R. Valdez, in: Proc. Adv. Int. Conf. Telecom. Int. Conf. Internet Web Applic. Serv., (2006), p.89.
[16] F. Sun, M. Kong and S. Deng, in: Proc. of the Int. Conf. Networks Secur., Wirel. Commun. Trusted Comput., Vol. 1 (2010), pp.74-76.
[17] L. N. Castro and J. I. Timmis: Soft Computing, Vol. 7 (2003), pp.526-544.
[18] N. Nanas and A. De Roeck: Lecture Notes in Computer Science, Vol. 4628 (2007), pp.13-24.
[19] F. Sun and Z. Wu, in: Proc. of the Int. Conf. E-learn., E-Bus., Enterp. Inf. Syst., E-Gov., (2009), pp.119-121.
[20] F. Sun and F. Xu, in: Proc. of the Int. Conf. Bioinformatics Biomed. Eng., Vol. 1 (2009), pp.1-4.
[21] F. Sun and S. Zhang, in: Proc. of the Int. Conf. Web Inf. Syst. Min., (2009), pp.515-518.
[22] F. Sun, X. Han and J. Wang, in: Proc. of the Int. Conf. Chall. Environ. Sci. Comput. Eng., Vol. 2 (2010), pp.33-35.
[23] P. Matzinger: Science, Vol. 12 (2002), pp.301-305.
[24] F. Sun, M. Kong and J. Wang, in: Proc. of the Int. Conf. MultiMedia Info. Technol., Vol. 2 (2010), pp.93-95.
[25] F. Sun, in: Proc. of the Int. Conf. E-learn., E-Bus., Enterp. Inf. Syst., E-Gov., Vol. 2 (2010), pp.145-148.
[26] F. Sun: submitted to Journal of Advanced Materials Research (2010).