共 15 条
[1]
Boutaba R(2004)Active networks as a developing and testing environment for network protocols Ann Telecommun 59 505-524
[2]
Polyrakis A(2010)Towards real-time anomalies monitoring for QoE indicators Ann Telecommun 65 59-71
[3]
Casani A(2004)Community aware network security and a DDoS response system Ann Telecommun 59 525-542
[4]
Guyard F(2012)When should I use network emulation? Ann Telecommun 67 247-255
[5]
Beker S(2010)Toward credible evaluation of anomaly-based intrusion-detection methods IEEE Trans Syst Man Cybern Part C Appl Rev 40 516-524
[6]
Karnouskos S(2013)A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks IEEE Commun Surv Tutor 15 2046-2069
[7]
Lochin E(undefined)undefined undefined undefined undefined-undefined
[8]
Prennou T(undefined)undefined undefined undefined undefined-undefined
[9]
Dairaine L(undefined)undefined undefined undefined undefined-undefined
[10]
Tavallaee M(undefined)undefined undefined undefined undefined-undefined