共 13 条
- [1] Al-Haidari F., 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), P1167, DOI 10.1109/TrustCom.2012.146
- [2] Alosaimi W., 2013, Proceedings of the 14th Annual Post Graduates Symposium on the convergence of Telecommunication, Networking and Broadcasting (PGNet), P116
- [3] Cook DL, 2003, ICON 2003: 11TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS, P461
- [4] Hoff C., 2008, RATIONAL SURVIVABILI
- [5] Kandula S, 2005, USENIX Association Proceedings of the 2nd Symposium on Networked Systems Design & Implementation (NSDI '05), P287
- [6] Kumar M. N., 2012, 2012 4th International Conference on Computational Intelligence and Communication Networks (CICN 2012), P535, DOI 10.1109/CICN.2012.149
- [8] Research on DoS Attack and Detection Programming [J]. 2009 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION, VOL 1, PROCEEDINGS, 2009, : 207 - 210
- [9] Morein WilliamG., 2003, Proceedings of the 10th ACM conference on Computer and communications security, P8
- [10] Raju B., 2011, INT J, V1, P128