Jarmo Mölsä Cross-Layer Designs for Mitigating Range Attacks in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP] Parallel and Distributed Computing and Networks, 2006, pp:64-69 [Conf]
Jarmo Mölsä Effectiveness of rate-limiting in mitigating flooding DOS attacks. [Citation Graph (0, 0)][DBLP] Communications, Internet, and Information Technology, 2004, pp:155-160 [Conf]
Jarmo Mölsä Mitigating denial of service attacks: A tutorial. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2005, v:13, n:6, pp:807-837 [Journal]
Search in 0.001secs, Finished in 0.001secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP