Identifying legitimate user in DDoS attack using Petri net
暂无分享,去创建一个
[1] P. Chinnasamy,et al. Detection of Distributed Denial of Service Attacks in SDN using Machine learning techniques , 2021, 2021 International Conference on Computer Communication and Informatics (ICCCI).
[2] P. Chinnasamy,et al. Analysis of Intruder Detection in Big Data Analytics , 2021, 2021 International Conference on Computer Communication and Informatics (ICCCI).
[3] Gwanggil Jeon,et al. Hybrid Approach for IP Traceback Analysis in Wireless Networks , 2020, Wirel. Pers. Commun..
[4] V. Praveena,et al. Complementary place transformation in Petri nets , 2018, 2018 International Conference on Soft-computing and Network Security (ICSNS).
[5] Tan Hanh,et al. FAST DETECTION OF DDOS ATTACKS USING NON -ADAPTIVE GROUP TESTING , 2013 .
[6] N. Kiruthika,et al. New Mitigating Technique to Overcome DDOS Attack , 2008 .
[7] Aikaterini Mitrokotsa,et al. DDoS attacks and defense mechanisms: classification and state-of-the-art , 2004, Comput. Networks.
[8] Tadao Murata,et al. Petri nets: Properties, analysis and applications , 1989, Proc. IEEE.
[9] James L. Peterson,et al. Petri Nets , 1977, CSUR.
[10] Ihsan Ali,et al. Optimal Deep Reinforcement Learning for Intrusion Detection in UAVs , 2022, Computers, Materials & Continua.
[11] Devesh C. Jinwala,et al. Automated Analysis of Internet Key Exchange Protocol v2 for Denial of Service Attacks , 2015, Int. J. Netw. Secur..
[12] Divya Kuriakose V.Praveena. A Survey on DDoS Attacks and DefenseApproaches , 2013 .
[13] Gregory J. D'Angelo. Tutorial on petri nets , 1983, SIML.