共 28 条
[1]
Ahmed E., 2010, P 25 INT INF SEC C S
[2]
[Anonymous], 2009, P 2009 IEEE S COMP I
[3]
Arlitt M., 1998, World Cup Web Site Access Logs
[4]
Current Developments in DETER Cybersecurity Testbed Technology
[J].
CATCH 2009: CYBERSECURITY APPLICATIONS AND TECHNOLOGY CONFERENCE FOR HOMELAND SECURITY, PROCEEDINGS,
2009,
:57-70
[5]
BHATIA S, 2012, NETW COMP APPL NCA 2, P79
[6]
Analyzing interaction between distributed denial of service attacks and mitigation technologies
[J].
DARPA INFORMATION SURVIVABILITY CONFERENCE AND EXPOSITION, VOL I, PROCEEDINGS,
2003,
:26-36
[8]
Buchanan W. J., 2011, METHODOLOGY EVALUATE
[9]
Calvet J., 2010, P VIR B C SEPT 2010, P241
[10]
Hettich S., 1999, The UCI KDD Archive