
@inproceedings(abadi03moderately,
	author="M.~Abadi and M.~Burrows and M.~Manasse and T.~Wobber",
        title="Moderately hard, memory-bound functions",
        booktitle="Proc.\ {NDSS} '03",
        year="2003",
        pages="25--39")

@inproceedings(ahn03captcha,
	author="L.~von Ahn and M.~Blum and N.~Hopper and J.~Langford",
        title="{CAPTCHA}: Using hard {AI} problems for security",
        booktitle="Proc.\ {EUROCRYPT} '03",
	pages="294--311",
        year="2003")

@inproceedings(andersen03mayday,
        author="David Andersen",
        title="{M}ayday: distributed filtering for {I}nternet services",
        booktitle="Proc.\ {USENIX} {I}nternet Technologies and Systems '03",
        year="2003",
        month = {March},
        address = {Seattle, Washington},
)

@inproceedings(aura00dos,
	author="T.~Aura and P.~Nikander and J.~Leiwo",
        title="{DoS}-resistant authentication with client puzzles",
        booktitle="Proc.\ 8th {S}ecurity Protocols Workshop",
	pages="170--178",
        year="2000")

@inproceedings(bailey05internet,   
        author="Michael Bailey and Evan Cooke and Farnam Jahanian and Jose Nazario and David Watson",
        title="The Internet Motion Sensor: A Distributed Blackhole Monitoring System",
        booktitle="Proc.\ Network and Distributed System Security Symposium",
        year="2005",
        month = {February},
        address = {San Diego, CA},
        www_pdf_url = {http://www.isoc.org/isoc/conferences/ndss/05/proceedings/papers/ims-ndss05.pdf}
)

@article(bloom70space,
	author="B.~Bloom",
	title="Space/time trade-offs in hash coding with allowable errors",
	journal="{CACM}",
	volume="13",
	number="7",
	year="1970",
	pages="422--426")

@inproceedings(christos03cossack,
        author="C.~ Papadopoulos and R.~Lindell and J.~Mehringer and A.~Hussain and R.~Govindan",
        title="COSSACK: Coordinated Suppression of Simultaneous Attacks",
        booktitle="Proc.\ DARPA Information Survivability Conference and Exposition 2003",
	pages="2--14",
        year="2003")

@inproceedings(dean01client,
	author="D.~Dean and A.~Stubblefield",
        title="Using client puzzles to protect {TLS}",
        booktitle="Proc.\ {USENIX} Security '01",
	pages="1--8",
        year="2001")

@article(dean02algebraic,
        author="D.~Dean and M.~Franklin and A.~Stubblefield",
        title="An algebraic approach to {IP} traceback",
        journal="{ACM} Trans. Information and Systems Security",
	volume="5",
	number="2",
        year="2002",
        pages="119--137")

@inproceedings(feng05design,
	author="{Wu-chang}~Feng and E.~Kaiser and {Wu-chi}~Feng and A.~Luu",
        title="The design and implementation of network puzzles",
        booktitle="Proc.\ {INFOCOM} '05",
        year="2005")

@inproceedings(feng03case,
	author="{Wu-chang}~Feng",
        title="The case for {TCP}/{IP} puzzles",
        booktitle="Proc.\ {SIGCOMM} Workshop on future directions in
	           network architecture",
	pages="322--327",
        year="2003")

@inproceedings(gligor03guaranteeing,
	author="V.~Gligor",
        title="Guaranteeing access in spite of service-flooding attacks",
        booktitle="Proc.\ {S}ecurity Protocols Workshop",
        year="2003")

@inproceedings(gunter04dos,
	author="C.~Gunter and S.~Khanna and K.~Tan and S.~Venkatesh",
        title="{DoS} protection for reliably authenticated broadcast",
        booktitle="Proc.\ {NDSS} '04",
        year="2004")

@inproceedings(hussain03framework,
        author="A.~Hussain and J.~Heidemann and C.~Papadopoulos",
        title="A framework for classifying denial of service attacks",
        booktitle="Proc.\ {SIGCOMM} '03",
        year="2003",
        pages="99--110")

@inproceedings(ioannidis02pushback,
        author="J.~Ioannidis and S.~Bellovin",
        title="Pushback: router-based defense against {DDos} attacks",
        booktitle="Proc.\ {NDSS} '02",
	pages="79--86",
        year="2002")

@inproceedings(jin03hop,
	author="Cheng Jin and Haining Wang and Kang G. Shin",
        title="Hop-count Filtering: an effective defense against spoofed DDoS traffic",
        booktitle="Proc.\ 10th ACM CCS 2003",
	pages="30--41",
        year="2003",
        month = {},
        address = {Washington D.C.},
        www_pdf_url = {http://portal.acm.org/ft_gateway.cfm?id=948116&type=pdf&coll=GUIDE&dl=GUIDE&CFID=44255094&CFTOKEN=60469328}, 
)

@inproceedings(juels99client,
	author="A.~Juels and J.~Brainard",
        title="Client puzzles: a cryptographic defense against
	       connection depletion",
        booktitle="Proc.\ {NDSS} '99",
	pages="151--165",
        year="1999")

@inproceedings(kandula05botz,
        author="S.~Kandula and D.~Katabi and M.~Jacob and A.~Berger",
        title="Botz-4-Sale: Surviving Organized DDoS Attacks that Mimic 
               Flash Crowds",
        booktitle="Proc.\ {NSDI}",
	pages="151--165",
        year="2005")

@inproceedings(keromytis02sos,
	author="Angelos D. Keromytis and Vishal Misra and Dan Rubenstein",
        title="{SOS}: Secure Overlay Services",
        booktitle="Proc.\ {SIGCOMM} '02",
        year="2002",
        pages="61--72")

@inproceedings(kompella04scalable,
        author="R.R.~Kompella and S.~Singh and G.~Varghese",
        title="On Scalable Attack Detection in the Network",
        booktitle="Proc.\ ACM {IMC}",
	pages="187--200",
        year="2004")

@inproceedings(lafrance03using,
        author="S.~Lafrance and J.~Mullins",
        title="Using admissible interference to detect denial of service
	       vulnerabilities",
        booktitle="Proc.\ {IWFM} '03",
        year="2003")

@inproceedings(leiwo00towards,
	author="J.~Leiwo and T.~Auro and P.~Nikander",
        title="Towards network denial of service resistant protocols",
        booktitle="Proc.\ {SEC} '00",
        year="2000",
        pages="301--310")

@inproceedings(liu03incentive,
	author="P.~Liu and W.~Zang",
        title="Incentive-based modeling and inference of attacker intent",
        booktitle="Proc.\ ACM {CCS} '03",
        year="2003",
        pages="179--189")

@inproceedings(luo05new,
        author="X.~Luo and K.C.~Chang",
        title="On a New Class of Pulsing Denial-of-Service Attacks and the Defense",
        booktitle="Proc.\ Network and Distributed System Security Symposium",
        year="2005")

@article(mahajan02controlling,
        author="R.~Mahajan and S.~Bellovin and S.~Floyd and
	        J.~Ioannidis and V.~Paxson and S.~Shenker",
        title="Controlling high bandwidth aggregates in the network",
        journal="{ACM} {CCR}",
	volume="32",
	number="3",
        year="2002",
        pages="62--73")

@article(meadows01cost,
        author="C.~Meadows",
	title="A cost-based framework for analysis of denial of service in 
	       networks",
	journal="J. Computer Security",
	volume="9",
	number="1/2",
	year="2001",
	pages="143--164")

@inproceedings(mirkovic02attacking,
	author="J.~Mirkovic and G.~Prier and P.~Reiher",
        title="Attacking {DDoS} at the source",
        booktitle="Proc.\ {ICNP} '02",
	pages="312--321",
        year="2002")

@inproceedings(mirkovic03alliance,
        author="J.~Mirkovic and M.~Robinson and P.~Reiher and G.~Kuenning",
        title="Alliance Formation for DDoS Defense",
        booktitle="Proc.\ New Security Paradigms Workshop, ACM SIGSAC '03",
        year="2003")
    
@inproceedings(moore01inferring,
	author="D.~Moore and G.~Voelker and S.~Savage",
        title="Inferring {I}nternet denial-of-service activity",
        booktitle="Proc.\ {USENIX} Security '01",
        year="2001",
        pages="9--22")

@inproceedings(moore02code,
	author="D.~Moore and C.~Shannon and J.~Brown",
        title="{C}ode-{R}ed: a case study on the spread and victims of
	       an {I}nternet worm",
        booktitle="Proc.\ 2nd {I}nternet Measurement Workshop",
        year="2002",
        pages="273--284")

@inproceedings(morein03using,
	author="W.G.~Morein and A.~Stavrou and C.~Cook and A.D.~Keromytis and V.~Misra and R.~Rubenstein",
        title="Using Graphic Turing Tests to counter automated DDoS attacks against web servers",
        booktitle="Proc.\ ACM CCS",
        year="2003",
        pages="8--19")

@inproceedings(pang04characteristics,
	author="Ruoming Pang and Vinod Yegneswaran and Paul Barford and Vern Paxson and Larry Peterson",
        title="Characteristics of internet background radiation",
        booktitle="Proc.\ ACM SIGCOMM Conference on Internet Measurement (ACM IMC)",
        year="2004",
        location=" Taormina, Sicily, Italy",
        pages="27--40")

@inproceedings(park01effectiveness,
	author="K.~Park and H.~Lee",
        title="On the effectiveness of route-based packet filtering for
	       distributed {DoS} attack prevention in power-law internets",
        booktitle="Proc.\ {SIGCOMM} '01",
        year="2001",
        pages="15--26")

@article(paxson01analysis,
	author="V.~Paxson",
	title="An analysis of using reflectors for
	       distributed denial-of-service attacks",
	journal="{ACM} {CCR}",
	volume="31",
	number="3",
	year="2001",
	pages="38--47")

@inproceedings(peng04proactively,
        author="T.~Peng and C.~Leckie and K.~Ramamohanarao",
        title="Proactively Detecting Distributed Denial of Service Attacks Using Source IP Address Monitoring",
        booktitle="Proc.\ NETWORKING",
        year="2004")

@misc(ramachandran02analyzing,
	author="V.~Ramachandran",
        title="Analyzing {DoS}-resistance of protocols using a 
	       cost-based framework",
        howpublished="Yale Technical Report YALEU/DCS/TR-1239",
	month="July",
        year="2002")

@inproceedings(savage00practical,
	author="S.~Savage and D.~Wetherall and A.~Karlin and T.~Anderson",
        title="Practical network support for {IP} traceback",
        booktitle="Proc.\ {SIGCOMM} '00",
        year="2000",
        pages="295--306")

@inproceedings(snoeren01hash,
        author="A.~Snoeren and C.~Partridge and L.~Sanchez and
	        C.~Jones and F.~Tchakountio and S.~Kent and W.~Strayer",
        title="Hash-based {IP} traceback",
        booktitle="Proc.\ {SIGCOMM} '01",
        year="2001",
        pages="3--14")

@inproceedings(song01advanced,
	author="D.~Song and A.~Perrig",
        title="Advanced and authenticated marking schemes for {IP} traceback",
        booktitle="Proc.\ {INFOCOM} '01",
        year="2001",
        pages="878--886")

@inproceedings(staniford02how,
        author="S.~Staniford and V.~Paxson and N.~Weaver",
        title="How to own the {I}nternet in your spare time",
        booktitle="Proc.\ {USENIX} Security '02",
        year="2002",
        pages="149--167")

@inproceedings(stavrou05move,
        author="A.~Stavrou and A.D.~Keromytis and J.~Nieh and V.~Misra and D.~Rubenstein",
        title="MOVE: An End-to-End Solution to Network Denial of Service",
        booktitle="Proc.\  Network and Distributed System Security Symposium (NDSS)",
        year="2005",
        pages="")

@inproceedings(yegneswaran04global,
        author="Vinod Yegneswaran and Paul Barford and Somesh Jha",
        title="Global Intrusion Detection in the DOMINO Overlay System",
        booktitle="Proc.\ Network and Distributed System Security Symposium",
        year="2004")

@inproceedings(wang03defending,
	author="X.~Wang and M.~Reiter",
        title="Defending against denial-of-service attacks with 
	       puzzle auctions",
        booktitle="Proc.\ {IEEE} Security and Privacy '03",
        year="2003",
        pages="78--92")

@inproceedings(wang02detecting,
	author="H.~Wang and D.~Zhang and K.~Shin",
        title="Detecting {SYN} flooding attacks",
        booktitle="Proc.\ {INFOCOM} '02",
        year="2002",
        pages="1530--1539")

@inproceedings(waters04new,
	author="B.~Waters and A.~Juels and J.~Halderman and E.~Felten",
        title="New client puzzle outsourcing techniques for {DoS} resistance",
        booktitle="Proc.\ {CCS} '04",
        year="2004",
        pages="246--256")

@article(xu03sustaining,
	author="J.~Xu and W.~Lee",
	title="Sustaining availability of {W}eb services under
	       distributed denial of service attacks",
	journal="{IEEE} Trans. Computers",
	volume="52",
	number="2",
	year="2003",
	pages="195--208")

@inproceedings(yaar03pi,
	author="A.~Yaar and A.~Perrig and D.~Song",
        title="{Pi}: A path identification mechanism to defend against
	       {DDos} attacks",
        booktitle="Proc.\ {IEEE} Security and Privacy '03",
        year="2003",
        pages="93--109")

@inproceedings(yaar04siff,
	author="A.~Yaar and D.~Song and A.~Perrig",
        title="{SIFF}: A stateless {I}nternet flow filter to mitigate
	       {DDos} flooding attacks",
        booktitle="Proc.\ {IEEE} Security and Privacy '04",
        year="2004",
        pages="130--146")