Author:
Joon Kirti,Agrawal Namrata,Ahmad Hifzan,Yadav Vikash,Sah Dinesh Kumar,Barna Cornel
Publisher
Springer International Publishing
Reference24 articles.
1. Debnath, S., Soni, B., Baruah, U., Sah, D.: Text-dependent speaker verification system: a review. In: 2015 IEEE 9th International Conference on Intelligent Systems and Control (ISCO), pp. 1–7. IEEE (2015)
2. Segura, V., Lahuerta, J.: Modeling the economic incentives of DDoS attacks: Femtocell case study. In: Economics of Information Security and Privacy, pp. 107–119 (2010)
3. Zhang, S., Zhang, X., Ou, X.: After we knew it: empirical study and modeling of cost-effectiveness of exploiting prevalent known vulnerabilities across IaaS cloud. In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, pp. 317–328. ACM (2014)
4. Agrawal, N., Kumar, S., Sah, D., et al.: Prevention of DDoS attack through harmonic homogeneity difference mechanism on traffic flow. In: 2018 4th International Conference on Recent Advances in Information Technology (RAIT), pp. 1–6. IEEE (2018)
5. Sah, D.K., Amgoth, T.: Parametric survey on cross-layer designs for wireless sensor networks. Comput. Sci. Rev. 27, 112–134 (2018)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献