共 33 条
[1]
On Evaluating IP Traceback Schemes: A Practical Perspective
[J].
IEEE CS SECURITY AND PRIVACY WORKSHOPS (SPW 2013),
2013,
:127-134
[2]
Akamai, 2015, STAT INT REP
[3]
Amin S. O., 2006, EMERGING DIRECTIONS
[4]
Amin S. O, 2006, 8 INT C ADV COMM TEC, V3, P2139
[5]
[Anonymous], 2014, CYB THREAT INT GET A
[6]
Arbor Networks, 2016, APNIC C
[7]
Cho J.H., 2015, DDoS Prevention System Using Multi-Filtering Method
[8]
Understanding DDoS Attack & Its Effect In Cloud Environment
[J].
PROCEEDINGS OF 4TH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND CONTROL(ICAC3'15),
2015, 49
:202-210
[9]
Farnham G., 2013, Tools and Standards for Cyber Threat Intelligence Projects
[10]
Deterministic and Authenticated Flow Marking for IP Traceback
[J].
2013 IEEE 27TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA),
2013,
:397-404