Security with IP Address Assignment and Spoofing for Smart IOT Devices
暂无分享,去创建一个
[1] Dhvani Shah,et al. IoT Based Biometrics Implementation on Raspberry Pi , 2016 .
[2] Ayman I. Kayssi,et al. IP Spoofing Detection Using Modified Hop Count , 2014, 2014 IEEE 28th International Conference on Advanced Information Networking and Applications.
[3] Kevin Benton,et al. Filtering IP source spoofing using feasible path reverse path forwarding with SDN , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).
[4] Anat Bremler-Barr,et al. Spoofing prevention method , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[5] Jianping Wu,et al. LAS: An effective anti-spoofing method using existing information , 2014, 2014 23rd International Conference on Computer Communication and Networks (ICCCN).
[6] Shashikala Tapaswi,et al. A Lightweight Approach to Detect the Low/High Rate IP Spoofed Cloud DDoS Attacks , 2017, 2017 IEEE 7th International Symposium on Cloud and Service Computing (SC2).
[7] C Fancy,et al. A dedicated setup to identify spoofing via IP-traceback , 2017, 2017 International Conference on Intelligent Sustainable Systems (ICISS).
[8] Sameer Seth,et al. TCP/IP architecture, design, and implementation in Linux , 2008 .
[9] Vijay Katkar,et al. Light weight approach for IP-ARP spoofing detection and prevention , 2011, 2011 Second Asian Himalayas International Conference on Internet (AH-ICI).
[10] M. Sedano Reynolds. Next generation DDoS Web based attacks , 2003, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003..
[11] Kang G. Shin,et al. Defense Against Spoofed IP Traffic Using Hop-Count Filtering , 2007, IEEE/ACM Transactions on Networking.
[12] Douglas E. Comer,et al. Internetworking with TCP/IP - Principles, Protocols, and Architectures, Fourth Edition , 1988 .
[13] Charles Kozierok,et al. The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference , 2005 .