暂无分享,去创建一个
[1] Yuan Tian,et al. Resistance Is Not Futile: Detecting DDoS Attacks without Packet Inspection , 2013, WISA.
[2] Virgil D. Gligor,et al. CoDef: collaborative defense against large-scale link-flooding attacks , 2013, CoNEXT.
[3] Dimitrios Gkounis. Cross-domain DoS link-flooding attack detection and mitigation using SDN principles , 2014 .
[4] Ellen W. Zegura,et al. Interactions of Intelligent Route Control with TCP Congestion Control , 2007, Networking.
[5] Jennifer Rexford,et al. BGP routing policies in ISP networks , 2005, IEEE Network.
[6] Virgil D. Gligor,et al. The Crossfire Attack , 2013, 2013 IEEE Symposium on Security and Privacy.
[7] Nick McKeown,et al. A network in a laptop: rapid prototyping for software-defined networks , 2010, Hotnets-IX.
[8] Adrian Perrig,et al. The Coremelt Attack , 2009, ESORICS.