共 50 条
- [31] Cloud Computing Vulnerability: DDoS as its main Security Threat, and Analysis of IDS as a Solution Model 2014 11TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS (ITNG), 2014, : 307 - 312
- [32] An Analysis of DDoS Attacks in a Smart Home Networks PROCEEDINGS OF THE CONFLUENCE 2020: 10TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE & ENGINEERING, 2020, : 272 - 276
- [33] Simulation Analysis of DDoS Attack in IoT Environment 4TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS AND CONNECTED TECHNOLOGIES (ICIOTCT), 2019: INTERNET OF THINGS AND CONNECTED TECHNOLOGIES, 2020, 1122 : 77 - 87
- [34] An alert analysis approach to DDoS attack detection 2016 INTERNATIONAL CONFERENCE ON ACCESSIBILITY TO DIGITAL WORLD (ICADW), 2016, : 33 - 38
- [35] An Explanation of the LSTM Model Used for DDoS Attacks Classification APPLIED SCIENCES-BASEL, 2023, 13 (15):
- [37] Analysis of SCADA System Vulnerabilities to DDoS Attacks 2013 11TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS IN MODERN SATELLITE, CABLE AND BROADCASTING SERVICES (TELSIKS), VOLS 1 AND 2, 2013, : 591 - 594
- [39] Revealing Protocol Architecture's Design Patterns in the Volumetric DDoS Defense Design Space IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2025, 27 (01): : 353 - 371
- [40] Efficient DDoS Attack Detection through Lightweight Deep Learning Model in Cloud Computing Environment 2024 IEEE 24TH INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND INTERNET COMPUTING WORKSHOPS, CCGRIDW 2024, 2024, : 208 - 212