A Targeted Denial of Service Attack on Data Caching Networks
暂无分享,去创建一个
[1] Niloy Ganguly,et al. HPC5: An efficient topology generation mechanism for Gnutella networks , 2009, Comput. Networks.
[2] Dharma P. Agrawal,et al. Mobile Ad hoc Networking , 2002 .
[3] Diomidis Spinellis,et al. A survey of peer-to-peer content distribution technologies , 2004, CSUR.
[4] Mengjun Xie,et al. Enhancing cache robustness for content-centric networking , 2012, 2012 Proceedings IEEE INFOCOM.
[5] Donald F. Towsley,et al. Inferring Military Activity in Hybrid Networks through Cache Behavior , 2013, MILCOM 2013 - 2013 IEEE Military Communications Conference.
[6] Kevin Henry,et al. Official (ISC)2 Guide to the CISSP CBK ((Isc)2 Press Series) , 2006 .
[7] R. Schaller,et al. Moore's law: past, present and future , 1997 .
[8] Igor M. Moraes,et al. Information-Centric Networks: A New Paradigm for the Internet , 2013 .
[9] Johan A. Pouwelse,et al. The Bittorrent P2P File-Sharing System: Measurements and Analysis , 2005, IPTPS.
[10] Steven Hernandez Cissp. Official (ISC)2 Guide to the CISSP CBK , 2012 .
[11] Mauro Conti,et al. A lightweight mechanism for detection of cache pollution attacks in Named Data Networking , 2013, Comput. Networks.
[12] A. Odlyzko,et al. Internet growth: is there a Moore's law for data traffic? , 2000 .
[13] Nishanth R. Sastry,et al. Where is in a Name? A Survey of Mobility in Information-Centric Networks , 2013 .
[14] Pavel Bzoch,et al. Design and Implementation of a Caching Algorithm Applicable to Mobile Clients , 2012, Informatica.