共 88 条
- [1] Afanasyev M, 2011, COMMUN ACM, V54, P78, DOI [10.1145/1941487.1841508, 10.1145/1941487.1941508]
- [4] Alhawi OMK, 2018, ADV INFORM SECUR, V70, P93, DOI 10.1007/978-3-319-73951-9_5
- [6] Alsmadi I., 2018, PRACTICAL INFORM SEC, P245, DOI [10.1007/978-3-319-72119-4_11., DOI 10.1007/978-3-319-72119-4_11]
- [7] [Anonymous], 2011, ADV DIGITAL FORENSIC, VVII, P195, DOI [10.1007/978-3-642-24212-0_15., DOI 10.1007/978-3-642-24212-0_15]
- [8] Ansari S, 2002, IEEE POTENTIALS, V21, P17, DOI 10.1109/MP.2002.1166620
- [9] Bellovin S.M., 2000, Icmp traceback messages
- [10] Ben-Asher N., 2015, Proceedings of the Tenth Conference on Semantic Technology for Intelligence, Defense, and Security, P34