暂无分享,去创建一个
[1] Mauro Conti,et al. Poseidon: Mitigating interest flooding DDoS attacks in Named Data Networking , 2013, 38th Annual IEEE Conference on Local Computer Networks.
[2] Gene Tsudik,et al. DoS and DDoS in Named Data Networking , 2012, 2013 22nd International Conference on Computer Communication and Networks (ICCCN).
[3] Priya Mahadevan,et al. Interest flooding attack and countermeasures in Named Data Networking , 2013, 2013 IFIP Networking Conference.
[4] Jerome H. Saltzer,et al. End-to-end arguments in system design , 1984, TOCS.
[5] Miao Zhang,et al. Using phoebus data transfer accelerator in cloud environments , 2015, 2015 IEEE International Conference on Communications (ICC).
[6] Yingdi Yu. Public Key Management in Named Data Networking , 2015 .
[7] Mauro Conti,et al. Cache Privacy in Named-Data Networking , 2013, 2013 IEEE 33rd International Conference on Distributed Computing Systems.
[8] Mauro Conti,et al. A lightweight mechanism for detection of cache pollution attacks in Named Data Networking , 2013, Comput. Networks.
[9] Patrick Crowley,et al. Named data networking , 2014, CCRV.
[10] Katsuyoshi Iida,et al. SAPS: Software Defined Network Aware Pub/Sub -- A Design of the Hybrid Architecture Utilizing Distributed and Centralized Multicast , 2015, 2015 IEEE 39th Annual Computer Software and Applications Conference.
[11] David Clark,et al. Schematizing and Automating Trust in Named Data Networking , 2015 .
[12] Van Jacobson,et al. Networking named content , 2009, CoNEXT '09.
[13] V. Jacobson,et al. Securing Network Content , 2009 .