共 14 条
- [1] Al-Shehari Taher, 2014, International Journal of Computer Theory and Engineering, V6, P57, DOI 10.7763/IJCTE.2014.V6.837
- [2] Alse BK, 2017, J MULTIDISCIP ENG SC, V4, P8310
- [3] Beverly R, 2004, LECT NOTES COMPUT SC, V3015, P158
- [5] Meidan Y., 2017, P S APPL COMP, P506, DOI [10.1145/3019612.3019878, DOI 10.1145/3019612.3019878]
- [6] Peterson LE., 2009, SCHOLARPEDIA, V4, P1883, DOI [DOI 10.4249/SCHOLARPEDIA.1883, 10.4249/scholarpedia.1883]
- [7] Santini Simone, 1995, ACCV, P571
- [8] A study on efficient detection of network-based IP spoofing DDoS and malware-infected Systems [J]. SPRINGERPLUS, 2016, 5