共 60 条
[1]
Ashok P., Hallur G., Wireless broadband unleashed: Charting regulatory pathways for broadband development, Proc. 2nd World Conf. Commun. Comput. (WCONF), pp. 1-6, (2024)
[2]
Kim Y., Hakak S., Ghorbani A., Detecting distributed denial-ofservice (DDoS) attacks that generate false authentications on electric vehicle (EV) charging infrastructure, Comput. Secur., 144, (2024)
[3]
Ahmed S., Ahmad N., Shah N.A., Mustafa Abro G.E., Wijayanto A., Hirsi A., Altaf A.R., Lightweight AES design for IoT applications: Optimizations in FPGA and ASIC with DFA countermeasure strategies, IEEE Access, 13, pp. 22489-22509, (2025)
[4]
Huang H., Sun B., Hu L., A task offloading approach based on risk assessment to mitigate edge DDoS attacks, Comput. Secur., 140, (2024)
[5]
Nguyen P.S., Huy T.N., Tuan T.A., Trung P.D., Long H.V., Hybrid feature extraction and integrated deep learning for cloud-based malware detection, Comput. Secur., 150, (2025)
[6]
Birthriya S.K., Ahlawat P., Jain A.K., Detection and prevention of spear phishing attacks: A comprehensive survey, Comput. Secur., 151, (2025)
[7]
Crespo-Martinez I.S., Campazas-Vega A., Guerrero-Higueras A.M., Riego-Delcastillo V., Alvarez-Aparicio C., Fernandez-Llamas C., SQL injection attack detection in network flow data, Comput. Secur., 127, (2023)
[8]
Hirsi A., Alhartomi M.A., Audah L., Salh A., Sahar N.M., Ahmed S., Ansa G.O., Farah A., Comprehensive analysis of DDoS anomaly detection in software-defined networks, IEEE Access, 13, pp. 23013-23071, (2025)
[9]
Zhao Z., Li Z., Zhou Z., Yu J., Song Z., Xie X., Zhang F., Zhang R., DDoS family: A novel perspective for massive types of DDoS attacks, Comput. Secur., 138, (2024)
[10]
Harada R., Shibata N., Kaneko S., Honda K., Terada J., Ishida Y., Akashi K., Miyachi T., Quick suppression of DDoS attacks by frame priority control in IoT backhaul with construction of miraibased attacks, IEEE Access, 10, pp. 22392-22399, (2022)