共 24 条
[2]
Bahaweres R. B., 2016, CITSM 2016, DOI [10.1109/citsm.2016.7577583, DOI 10.1109/CITSM.2016.7577583]
[3]
Balobaid A, 2016, 2016 INTERNATIONAL CONFERENCE ON COMPUTING, ANALYTICS AND SECURITY TRENDS (CAST), P416, DOI 10.1109/CAST.2016.7915005
[4]
Defence for Distributed Denial of Service Attacks in Cloud Computing
[J].
INTERNATIONAL CONFERENCE ON ADVANCED WIRELESS INFORMATION AND COMMUNICATION TECHNOLOGIES (AWICT 2015),
2015, 73
:490-497
[6]
Understanding DDoS Attack & Its Effect In Cloud Environment
[J].
PROCEEDINGS OF 4TH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND CONTROL(ICAC3'15),
2015, 49
:202-210
[8]
Kabir M.R., 2017, INT J COMPUTER APPL, V166, P13, DOI [https://doi.org/10.5120/ijca2017913992, DOI 10.5120/IJCA2017913992]
[9]
Karaboga D., 2005, TR06 ERC U COMP ENG