DoS attacks and defense mechanisms in wireless networks
暂无分享,去创建一个
[1] Adi Shamir,et al. Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.
[2] Jonathan B. Postel. Internet control message protocol (icmp) , 1981 .
[3] Elizabeth D. Zwicky,et al. Building internet firewalls , 1995 .
[4] Percival Merritt,et al. IV. In Conclusion , 1927 .
[5] Matthew M. Williamson,et al. Throttling viruses: restricting propagation to defeat malicious mobile code , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..
[6] Stefan Axelsson,et al. Intrusion Detection Systems: A Survey and Taxonomy , 2002 .
[7] David Wetherall,et al. Preventing Internet denial-of-service with capabilities , 2004, Comput. Commun. Rev..
[8] Peter Reiher,et al. A taxonomy of DDoS attack and DDoS defense mechanisms , 2004, CCRV.
[9] Jianyi Lin,et al. Computer crime and security survey , 2002 .