Efficacy of Coordinated Distributed Multiple Attacks (A Proactive Approach to Cyber Defense)
暂无分享,去创建一个
Andrew H. Sung | Srinivas Mukkamala | Patrick Defibaugh-Chavez | A. Sung | P. Defibaugh-Chavez | Srinivas Mukkamala
[1] Seth E. Webster. The development and analysis of intrusion detection algorithms , 1998 .
[2] Vern Paxson,et al. How to Own the Internet in Your Spare Time , 2002, USENIX Security Symposium.
[3] Clay Shields,et al. What do we mean by Network Denial of Service , 2002 .
[4] Qi Shi,et al. Requirements for a general framework for response to distributed denial-of-service , 2001, Seventeenth Annual Computer Security Applications Conference.
[5] Peter Reiher,et al. A taxonomy of DDoS attack and DDoS defense mechanisms , 2004, CCRV.
[6] Timothy J. Draelos,et al. Distributed Denial-of-Service Characterization , 2003 .
[7] Kristopher Kendall,et al. A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems , 1999 .
[8] Kevin J. Houle,et al. Trends in Denial of Service Attack Technology , 2001 .