搜索历史记录选项已关闭,请开启搜索历史记录选项。
作者: Yi Xie , Shun-Zheng Yu
DOI: 10.1109/TNET.2008.925628
关键词:
摘要: … Traditionally, DDoS attacks are carried out at the network layer, such as ICMP flooding, SYN … are called Net-DDoS attacks in this paper. The intent of these attacks is to consume the …
international conference on advanced computing,2011, 引用: 2
,2013, 引用: 5
IJCA Special Issue on Advanced Computing and Communication Technologies for HPC Applications,2012, 引用: 1
Communications in Computer and Information Science,2011, 引用: 1
international conference on distributed computing and internet technology,2014, 引用: 21
Foundations and Practice of Security,2013, 引用: 5
workshop on information security applications,2012, 引用: 21
International Conference on Security in Computer Networks and Distributed Systems,2014, 引用: 13
workshop on information security applications,2012, 引用: 5
Network and System Security,2013, 引用: 2