Mitigating distributed denial-of-service attacks using network connection control charts
暂无分享,去创建一个
[1] Lawrence A. Gordon,et al. Managing Cybersecurity Resources (The Mcgraw-Hill Homeland Security Series) , 2005 .
[2] Kamil Saraç,et al. IP traceback based on packet marking and logging , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.
[3] Michèle Basseville,et al. Detection of abrupt changes: theory and application , 1993 .
[4] Md. Safi Uddin,et al. Statistical-Based SYN-Flooding Detection Using Programmable Network Processor , 2005, Third International Conference on Information Technology and Applications (ICITA'05).
[5] Rami G. Melhem,et al. Honeypot back-propagation for mitigating spoofing distributed Denial-of-Service attacks , 2006, J. Parallel Distributed Comput..