A taxonomy of DDoS attacks and DDoS defense mechanisms J Mirkovic, J Martin, P Reiher ACM SIGCOMM Computer Communication Review 34 (2), 39-53, 2004 | 2998 | 2004 |
Attacking DDoS at the source P Reiher, J Mirkovic, G Prier Proceedings of the 10th IEEE International Conference on Network Protocols, 2002 | 732* | 2002 |
Internet denial of service: attack and defense mechanisms (Radia Perlman Computer Networking and Security) J Mirkovic, S Dietrich, D Dittrich, P Reiher Prentice Hall PTR, 2004 | 589 | 2004 |
SAVE: Source address validity enforcement protocol J Li, J Mirkovic, M Wang, P Reiher, L Zhang Proceedings. Twenty-First Annual Joint Conference of the IEEE Computer and …, 2002 | 392 | 2002 |
D-WARD: a source-end defense against flooding denial-of-service attacks J Mirkovic, P Reiher IEEE transactions on Dependable and Secure Computing 2 (3), 216-232, 2005 | 287 | 2005 |
Modeling human behavior for defense against flash-crowd attacks G Oikonomou, J Mirkovic 2009 IEEE International Conference on Communications, 1-6, 2009 | 175 | 2009 |
D-WARD: source-end defense against distributed denial-of-service attacks J Mirkovic University of California, Los Angeles, 2003 | 169 | 2003 |
The DETER project: Advancing the science of cyber security experimentation and test J Mirkovic, TV Benzel, T Faber, R Braden, JT Wroclawski, S Schwab Technologies for Homeland Security (HST), 2010 IEEE International Conference …, 2010 | 154 | 2010 |
A framework for a collaborative DDoS defense G Oikonomou, J Mirkovic, P Reiher, M Robinson Computer Security Applications Conference, 2006. ACSAC'06. 22nd Annual, 33-42, 2006 | 141 | 2006 |
Teaching cybersecurity with DeterLab J Mirkovic, T Benzel IEEE Security & Privacy 10 (1), 73-76, 2012 | 125 | 2012 |
Alliance formation for DDoS defense J Mirkovic, M Robinson, P Reiher Proceedings of the 2003 workshop on New security paradigms, 11-18, 2003 | 106 | 2003 |
Source-end DDoS defense J Mirkovic, G Prier, P Reiher Second IEEE International Symposium on Network Computing and Applications …, 2003 | 95 | 2003 |
Distributed defense against DDOS attacks J Mirkovic, M Robinson, P Reiher, G Oikonomou University of Delaware CIS Department Technical Report CIS-TR-2005-02, 2005 | 93 | 2005 |
Accurately measuring denial of service in simulation and testbed experiments J Mirkovic, A Hussain, S Fahmy, P Reiher, RK Thomas IEEE Transactions on Dependable and Secure Computing 6 (2), 81-95, 2008 | 92 | 2008 |
Towards user-centric metrics for denial-of-service measurement J Mirkovic, A Hussain, B Wilson, S Fahmy, P Reiher, R Thomas, WM Yao, ... Proceedings of the 2007 workshop on Experimental computer science, 8-es, 2007 | 89 | 2007 |
Perspectives on the solarwinds incident S Peisert, B Schneier, H Okhravi, F Massacci, T Benzel, C Landwehr, ... IEEE Security & Privacy 19 (2), 7-13, 2021 | 85 | 2021 |
Class Capture-the-Flag Exercises J Mirkovic, PAH Peterson 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education …, 2014 | 75 | 2014 |
Profiling and Clustering Internet Hosts. S Wei, J Mirkovic, E Kissel DMIN 6, 269-75, 2006 | 72 | 2006 |
Distributed worm simulation with a realistic internet model S Wei, J Mirkovic, M Swany Proceedings of the 19th Workshop on Principles of Advanced and Distributed …, 2005 | 70 | 2005 |
Benchmarks for DDoS defense evaluation J Mirkovic, E Arikan, S Wei, R Thomas, S Fahmy, P Reiher MILCOM 2006-2006 IEEE Military Communications conference, 1-10, 2006 | 67 | 2006 |