Shielding security sensitive parts of mobile agent
暂无分享,去创建一个
[1] Raouf Boutaba,et al. FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks , 2012, IEEE/ACM Transactions on Networking.
[2] Jugal K. Kalita,et al. Detecting Distributed Denial of Service Attacks: Methods, Tools and Future Directions , 2014, Comput. J..
[3] Saswati Sarkar,et al. A Statistical Framework for Intrusion Detection in Ad Hoc Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[4] Wei Wei,et al. A Rank Correlation Based Detection against Distributed Reflection DoS Attacks , 2013, IEEE Communications Letters.
[5] A. L. Narasimha Reddy,et al. Identifying Long-Term High-Bandwidth Flows at a Router , 2001, HiPC.
[6] R. Asokan,et al. An Efficient Detection Mechanism for Distributed Denial of Service (DDoS) Attack , 2013, ArXiv.
[7] R. Asokan,et al. Distributed Denial of Service (DDoS) Attacks Detection Mechanism , 2012, ArXiv.