<--- Back to Details
First PageDocument Content
Computing / Routing algorithms / Cyberwarfare / Concurrent computing / Denial-of-service attack / Denial-of-service attacks / Internet Relay Chat / Computer network / Multipath routing / Botnet / Routing / Crowds
Date: 2016-04-22 11:14:02
Computing
Routing algorithms
Cyberwarfare
Concurrent computing
Denial-of-service attack
Denial-of-service attacks
Internet Relay Chat
Computer network
Multipath routing
Botnet
Routing
Crowds

On the Interplay of Link-Flooding Attacks and Traffic Engineering Dimitrios Gkounis1 , Vasileios Kotronis2 , Christos Liaskos3 , Xenofontas Dimitropoulos3∗ 1 NEC 2 ETH Zurich, Switzerland

Add to Reading List

Source URL: inspire.edu.gr

Download Document from Source Website

File Size: 629,09 KB

Share Document on Facebook

Similar Documents

Efficient Traffic Routing with Progress Guarantees Stefan Blumer Manuel Eichelberger  Roger Wattenhofer

Efficient Traffic Routing with Progress Guarantees Stefan Blumer Manuel Eichelberger Roger Wattenhofer

DocID: 1xVZy - View Document

Sweet Little Lies: Fake Topologies for Flexible Routing Stefano Vissicchio University of Louvain

Sweet Little Lies: Fake Topologies for Flexible Routing Stefano Vissicchio University of Louvain

DocID: 1xVPP - View Document

Decoy Routing: Toward Unblockable Internet Communication Josh Karlin  Daniel Ellard

Decoy Routing: Toward Unblockable Internet Communication Josh Karlin Daniel Ellard

DocID: 1xVLC - View Document

Hijacking Bitcoin: Routing Attacks on Cryptocurrencies https://btc-hijack.ethz.ch Maria Apostolaki  Aviv Zohar

Hijacking Bitcoin: Routing Attacks on Cryptocurrencies https://btc-hijack.ethz.ch Maria Apostolaki Aviv Zohar

DocID: 1xVI1 - View Document

Wheel + Ring = Reel: the Impact of Route Filtering on the Stability of Policy Routing Luca Cittadini Giuseppe Di Battista

Wheel + Ring = Reel: the Impact of Route Filtering on the Stability of Policy Routing Luca Cittadini Giuseppe Di Battista

DocID: 1xVsm - View Document