Peter Reiher mostly deals with Computer security, Denial-of-service attack, Application layer DDoS attack, Computer network and Trinoo. His Authorization study in the realm of Computer security interacts with subjects such as Insider, Monitoring system and Optimistic concurrency control. His Denial-of-service attack research is classified as research in The Internet.
Ddos defense is the focus of his Application layer DDoS attack research. His Computer network study which covers Distributed computing that intersects with Source routing, Virtual Router Redundancy Protocol, Network security and Next-generation network. Peter Reiher combines subjects such as Spoofing attack, Internet security and Service with his study of Trinoo.
Peter Reiher focuses on Computer security, Computer network, Distributed computing, The Internet and Denial-of-service attack. His work deals with themes such as Wireless, Ubiquitous computing, Software, Mobile computing and Botnet, which intersect with Computer security. His biological study spans a wide range of topics, including Overlay network, Software deployment and Vehicular ad hoc network.
His studies in Distributed computing integrate themes in fields like Service and Adaptation. His The Internet research is multidisciplinary, incorporating elements of Routing and Internet privacy. His Denial-of-service attack research incorporates themes from Testbed and Quality of service.
Computer security, The Internet, Computer network, Botnet and Wireless ad hoc network are his primary areas of study. His primary area of study in Computer security is in the field of Exploit. In general The Internet, his work in Denial-of-service attack and Internet service provider is often linked to Mechanism, Psychological resilience and Multi point linking many areas of study.
His Denial-of-service attack study is concerned with World Wide Web in general. His work in the fields of Node, Network packet, Routing and Spoofing attack overlaps with other areas such as Traffic congestion reconstruction with Kerner's three-phase theory. His work on Vehicular ad hoc network as part of general Wireless ad hoc network research is often related to Interference, thus linking different fields of science.
His primary scientific interests are in Computer security, Computer network, Software, Vehicular ad hoc network and Botnet. His work carried out in the field of Computer network brings together such families of science as Transmission and The Internet. His research in The Internet is mostly concerned with Denial-of-service attack.
His Vehicular ad hoc network study incorporates themes from TCP tuning, Network congestion and Scalability. Peter Reiher interconnects Telecommunications, Control channel and Communications protocol in the investigation of issues within Botnet. The concepts of his Wireless ad hoc network study are interwoven with issues in Node, Sybil attack, Radio propagation and Global Positioning System.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
A taxonomy of DDoS attack and DDoS defense mechanisms
Jelena Mirkovic;Peter Reiher.
acm special interest group on data communication (2004)
PARAID: a gear-shifting power-aware RAID
Charles Weddle;Mathew Oldham;Jin Qian;An-I Andy Wang.
file and storage technologies (2007)
Attacking DDoS at the source
J. Mirkovic;G. Prier;P. Reiher.
international conference on network protocols (2002)
Internet Denial of Service: Attack and Defense Mechanisms (Radia Perlman Computer Networking and Security)
Jelena Mirkovic;Sven Dietrich;David Dittrich;Peter Reiher.
Saving portable computer battery power through remote process execution
Alexey Rudenko;Peter Reiher;Gerald J. Popek;Geoffrey H. Kuenning.
Mobile Computing and Communications Review (1998)
SAVE: source address validity enforcement protocol
Jun Li;J. Mirkovic;Mengqiu Wang;P. Reiher.
international conference on computer communications (2002)
Host-to-Host Congestion Control for TCP
Alexander Afanasyev;Neil Tilley;Peter Reiher;Leonard Kleinrock.
IEEE Communications Surveys and Tutorials (2010)
Resolving file conflicts in the Ficus file system
Peter Reiher;John Heidemann;David Ratner;Greg Skinner.
usenix summer technical conference (1994)
D-WARD: a source-end defense against flooding denial-of-service attacks
J. Mirkovic;P. Reiher.
IEEE Transactions on Dependable and Secure Computing (2005)
Detecting insider threats by monitoring system call activity
N. Nguyen;P. Reiher;G.H. Kuenning.
systems man and cybernetics (2003)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: