Defending Wireless Infrastructure Against the Challenge of DDoS Attacks
暂无分享,去创建一个
[1] Yi-Bing Lin,et al. Demand re‐registration for PCS database restoration , 2000, Mob. Networks Appl..
[2] Jim Boyle,et al. Accept-Ranges : bytes Content-Length : 55967 Connection : close Content-Type : text / plain Internet Draft , 2012 .
[3] Andrew B. Whinston,et al. The economics of network management , 1999, CACM.
[4] Mahmoud Naghshineh,et al. Issues in Wireless Access Broadband Networks , 1996 .
[5] Sajal K. Das,et al. A call admission and control scheme for quality‐of‐service (QoS) provisioning in next generation wireless networks , 2000, Wirel. Networks.
[6] Andrew M. Odlyzko,et al. Internet Pricing and the History of Communications , 2001, Comput. Networks.
[7] Roch Guérin,et al. A Framework for Policy-based Admission Control , 2000, RFC.
[8] Andrew B. Whinston,et al. Defeating distributed denial of service attacks , 2000 .
[9] Dogan Kesdogan,et al. Analysis of Security and Privacy in Mobile-IP , 1996 .