共 13 条
[1]
Borgatti S., 1994, Connections, V17, P78
[2]
JIN C., 2003, CCS '03, P30
[3]
Jung J., 2002, Proc. of the International World Wide Web Conference, P252
[4]
Kantardzic M., 2002, DATA MINING CONCEPTS
[5]
Lakhina Anukool, 2005, SIGCOMM 05 AUG 21 26
[6]
Limwiwatkul L, 2004, IEEE INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES 2004 (ISCIT 2004), PROCEEDINGS, VOLS 1 AND 2, P605
[7]
Attacking DDoS at the source
[J].
10TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS, PROCEEDINGS,
2002,
:312-321
[8]
Oikonomou G, 2009, P 3 INT C COMM DRESD, P14
[9]
Park K., 2006, Proceedings of the annual conference on USENIX 06 Annual Technical Conference, P23
[10]
Peng T, 2003, 2003 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-5, P482