共 50 条
- [41] RootkitDet: Practical End-to-End Defense against Kernel Rootkits in a Cloud Environment COMPUTER SECURITY - ESORICS 2014, PT II, 2014, 8713 : 475 - 493
- [42] A practical method to detect spoofed DDoS traffic and its source on the enterprise network WMSCI 2006: 10TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS, 2006, : 291 - +
- [43] A Blind Detection Method for Tracing the Real Source of DDoS Attack Packets by Cluster Matching PROCEEDINGS OF 2016 8TH IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN 2016), 2016, : 551 - 555
- [44] Collaborative Defense Method Against DDoS Attacks on SDN-Architected Cloud Servers ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PT IV, ICIC 2024, 2024, 14865 : 362 - 370
- [45] Enhanced Mixup Training: a Defense Method Against Membership Inference Attack INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2021, 2021, 13107 : 32 - 45
- [46] Intrusion Detection System-An Efficient way to Thwart against Dos/DDos Attack in the Cloud Environment 2014 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN INFORMATION TECHNOLOGY (ICRTIT), 2014,
- [47] A Dynamic Evolutionary Game-based Defense Method for Mining Pools against DDoS Attacks 2024 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS, NANA 2024, 2024, : 299 - 304
- [49] A Cost-effective Shuffling Method against DDoS Attacks using Moving Target Defense PROCEEDINGS OF THE 6TH ACM WORKSHOP ON MOVING TARGET DEFENSE, MTD 2019, 2019, : 57 - 66
- [50] An Efficient Defense Scheme Against SIP DoS Attack in SDN Using Cloud SFW 2014 NINTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIA JCIS), 2014, : 52 - 55