共 39 条
[1]
Rao S., Verma A. K., Bhatia T., Evolving cyber threats, combating techniques, and open issues in online social networks, Handbook of Research on Cyber Crime and Information Privacy, pp. 219-235, (2021)
[2]
Bindra N., Sood M., Detecting ddos attacks using machine learning techniques and contemporary intrusion detection dataset, Automatic Control Computer Sciences, 53, 5, pp. 419-428, (2019)
[3]
Dietzel C., Wichtlhuber M., Smaragdakis G., Feldmann A., Stellar: Network attack mitigation using advanced blackholing, Proc. of the 14th Int. Conf. on Emerging Networking Experiments and Technologies, pp. 152-164, (2018)
[4]
Chatzis N., Smaragdakis G., Bottger J., Krenc T., Feldmann A., On the benefits of using a large ixp as an internet vantage point, Proc. of the 2013 Conf. on Internet Measurement Conf, pp. 333-346, (2013)
[5]
Kobialka D., Kaspersky lab study: Average cost of enterprise ddos attack totals $2M, MSSP Alert, (2018)
[6]
Buragohain C., Kalita M. J., Singh S., Bhattacharyya D. K., Anomaly based ddos attack detection, International Journal of Computer Applications, 123, 17, pp. 35-40, (2015)
[7]
Nadiammai G., Hemalatha M., Effective approach toward intrusion detection system using data mining techniques, Egyptian Informatics Journal, 15, 1, pp. 37-50, (2014)
[8]
Rungta K., Tensorflow in 1 day: Make your own neural network, (2019)
[9]
Schmidhuber J., Deep learning in neural networks: An overview, Neural Networks, 61, 3, pp. 85-117, (2015)
[10]
Rowe B., Reeves D., Gallaher M., The role of internet service providers in cyber security, Computers & Security, 28, 1, pp. 1-11, (2009)