Study of Network-Based DoS Attacks
暂无分享,去创建一个
[1] S. M. Bhaskar,et al. Policy and Law: Denial of Service Threat , 2011 .
[2] George M. Mohay,et al. Detection and Mitigation of High-Rate Flooding Attacks , 2011 .
[3] C. Pandu Rangan,et al. Cryptographic Approaches to Denial-of-Service Resistance , 2011 .
[4] David Starobinski,et al. Protocol-Compliant DoS Attacks on CAN: Demonstration and Mitigation , 2016, 2016 IEEE 84th Vehicular Technology Conference (VTC-Fall).
[5] Raja Ettiane,et al. Protection mechanisms for signaling DoS attacks on 3G mobile networks: Comparative study and future perspectives , 2016, 2016 4th IEEE International Colloquium on Information Science and Technology (CiSt).
[6] Izzat Alsmadi,et al. Identifying DoS attacks on software defined networks: A relation context approach , 2016, NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium.
[7] Bülent Sankur,et al. Detection of (D)DOS attacks based on online change point analysis , 2016, 2016 24th Signal Processing and Communication Application Conference (SIU).