共 50 条
[31]
Statistical signatures for early detection of flooding denial-of-service attacks
[J].
SECURITY AND PRIVACY IN THE AGE OF UBIQUITOUS COMPUTING,
2005, 181
:327-341
[32]
Measuring the Impact of Denial-of-Service Attacks on Wireless Sensor Networks
[J].
2014 IEEE 39TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN),
2014,
:296-304
[34]
IP Address-Based Mitigation Against Denial-of-Service Flooding Attacks
[J].
INFORMATION AND COMMUNICATION TECHNOLOGY FOR INTELLIGENT SYSTEMS, ICTIS 2018, VOL 2,
2019, 107
:377-389
[37]
Quantifying the Spectrum of Denial-of-Service Attacks through Internet Backscatter
[J].
PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017),
2017,
[39]
Intrusion Prevention Against Distributed Denial-of-Service(DDoS) on the cloud
[J].
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY,
2016, 16 (04)
:90-96