共 50 条
[31]
Information Security and Distributed Denial of Service Attacks: A Survey
[J].
2017 INTERNATIONAL CONFERENCE ON ELECTRICAL AND COMPUTING TECHNOLOGIES AND APPLICATIONS (ICECTA),
2017,
:685-690
[32]
A Review on Detection Approaches for Distributed Denial of Service Attacks
[J].
PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTELLIGENT SUSTAINABLE SYSTEMS (ICISS 2019),
2019,
:323-327
[33]
Research on the Detection of Distributed Denial of Service Attacks Based on the Characteristics of IP Flow
[J].
NETWORK AND PARALLEL COMPUTING,
2008, 5245
:86-93
[34]
Optimal cloud assistance policy of end-edge-cloud ecosystem for mitigating edge distributed denial of service attacks
[J].
Journal of Cloud Computing,
10
[35]
Optimal cloud assistance policy of end-edge-cloud ecosystem for mitigating edge distributed denial of service attacks
[J].
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS,
2021, 10 (01)
[36]
Economics-Based Risk Management of Distributed Denial of Service Attacks: A Distance Learning Case Study
[J].
PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2018),
2018,
:343-352
[37]
Combating Distributed Denial of Service Attacks Using Load Balanced Hadoop Clustering in Cloud Computing Environment
[J].
PROCEEDINGS OF 2018 2ND INTERNATIONAL CONFERENCE ON DIGITAL TECHNOLOGY IN EDUCATION (ICDTE 2018),
2018,
:77-81
[38]
Detection of Distributed Denial of Service Attacks Using Snort Rules in Cloud Computing & Remote Control Systems
[J].
2018 IEEE 5TH INTERNATIONAL CONFERENCE ON METHODS AND SYSTEMS OF NAVIGATION AND MOTION CONTROL (MSNMC),
2018,
:283-288
[39]
A Distributed Denial of Service Attack Sources Detection Technology for Cloud Computing
[J].
2017 4TH INTERNATIONAL CONFERENCE ON SYSTEMS AND INFORMATICS (ICSAI),
2017,
:660-664