共 23 条
[1]
Anderson JP, 1980, TECHNICAL REPORT
[2]
Ardjani F., 2010, INT J MOD ED COMPUT, V2, P32, DOI [10.5815/ijmecs.2010.02.05, DOI 10.5815/IJMECS.2010.02.05]
[3]
Bhuyan MH, 2012, PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI'12), P533
[5]
Chiu CY, 2010, LECT NOTES ARTIF INT, V6171, P595, DOI 10.1007/978-3-642-14400-4_46
[6]
Denis Petrussenko, 2009, CS200902 FLOR I TECH
[7]
Ektefa Mohammadreza, 2010, Proceedings of the 2010 International Conference on Information Retrieval and Knowledge Management (CAMP 2010), P200, DOI 10.1109/INFRKM.2010.5466919
[8]
Fu Z, 2011, P 2011 ACM S APPL CO, P520
[9]
Off The Wall: Lightweight Distributed Filtering to Mitigate Distributed Denial of Service Attacks
[J].
2012 31ST INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS 2012),
2012,
:207-212