[1]
P. Th. Eugster, P. A. Felber, R. Guerraoui and Kermarrec. The many faces of publish/subscribe. ACM Comput. Surv. Vol 35, Pages: 114-131, (2003).
DOI: 10.1145/857076.857078
Google Scholar
[2]
S. Mudhakar, G and James,L. Ling. Security architectures and algorithms for publish subscribe network services , http: /www. cc. gatech. edu/projects/disl/SGuard/eventguard/sguard. pdf.
Google Scholar
[3]
H. Beitollahi and G. Deconinck. Tackling application-layer DDoS attacks. Procedia Computer Science, Volume 10, 2012, Pages 432–441.
DOI: 10.1016/j.procs.2012.06.056
Google Scholar
[4]
Mudhakar Srivatsa and Ling Liu. Securing publish-subscribe overlay services with EentGuard. Proceedings of the 12th ACM conference on Computer and communications security, (2005).
DOI: 10.1145/1102120.1102158
Google Scholar
[5]
Chenxi Wang, Antonio Carzaniga, David Evans and Alexander L. Wolf. Security issues and requirements for internet-scale publish-subscribe systems. Proceedings of the 35th Hawaii International Conference on System Sciences, (2002).
DOI: 10.1109/hicss.2002.994531
Google Scholar
[6]
Sasu Tarkoma. Publish/Subscribe Systems: Design and Principles, A John Wiley & Sons, Ltd., Publication, (2012).
Google Scholar
[7]
Christos Douligeris and Aikaterini Mitrokotsa. DDoS attacks and defense mechanisms: classification and state-of-the-art. Comput. Netw. Vol 44, Pages: 643-666, (2004).
DOI: 10.1016/j.comnet.2003.10.003
Google Scholar
[8]
Ranjan, S., Swaminathan, R., etc. DDoS-Resilient scheduling to counter application layer attacks under imperfect detection. INFOCOM 2006. 25th IEEE International Conference on Computer Communications. Proceedings, April (2006).
DOI: 10.1109/infocom.2006.127
Google Scholar
[9]
Hakem Beitollahi and Geert Deconinck. Analyzing well-known countermeasures against distributed denial of service attacks. Computer Communications, Volume 35, Issue 11, 15 June 2012, Pages 1312–1332.
DOI: 10.1016/j.comcom.2012.04.008
Google Scholar
[10]
Chu-Hsing Lin, Chen-Yun Lee, Jung-Chun Liu and Ching-Ru Chen. A detection scheme for flooding attack on application layer based on semantic concept. Proc of International Computer Symposium. 2010: 385-389.
DOI: 10.1109/compsym.2010.5685483
Google Scholar
[11]
M. Srivatsa, A. Iyengar, Jian Yin and Ling Liu. Mitigating application-level denial of service attacks on Web servers: A client-transparent approach. ACM Trans. Web, Vol 2, Pages: 1-49, (2008).
DOI: 10.1145/1377488.1377489
Google Scholar
[12]
Xie Y,Yu S. A large-scale hidden semi-markov model for anomaly detection on user browsing behaviors. IEEE/ACM Trans New 17(1): 54-65, (2009).
DOI: 10.1109/tnet.2008.923716
Google Scholar
[13]
H. Beitollahi, G. Deconinck, ConnectionScore: A statistical technique to resist application-layer DDoS attacks. Tech. Rep. 01-2012-0130, Electrical Engineering Department, University of Leuven, Belgium, http: /www. esat. kuleuven. be/electa/publications/fulltexts/pub2313. pdf. (2012).
DOI: 10.1007/s12652-013-0196-5
Google Scholar