共 41 条
[2]
Alqarni AA, 2022, J CYBER SECUR MOBIL, DOI [10.13052/jcsm2245-1439.1126, https://doi.org/10.13052/jcsm2245-1439.1126, DOI 10.13052/JCSM2245-1439.1126]
[3]
Ansari M.D., 2021, ICCCE 2020 P 3 INT C, V698, P1419, DOI 10.1007/978-981-15-7961-5_129
[9]
Department of Computer Science & Engineering Madan Mohan Malaviya University Of Technology Gorakhpur U.P. India, 2022, International Journal of Computer Systems & Software Engineering, V8, P69, DOI [10.15282/ijsecs.8.1.2022.7.0097, 10.15282/ijsecs.8.1.2022.7.0097, DOI 10.15282/IJSECS.8.1.2022.7.0097]
[10]
Understanding DDoS Attack & Its Effect In Cloud Environment
[J].
PROCEEDINGS OF 4TH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND CONTROL(ICAC3'15),
2015, 49
:202-210