Author:
Xu Xiaojia,Wang Yongcai,Zhang Yu,Li Deying
Publisher
Springer International Publishing
Reference21 articles.
1. Chen, A., Cao, J., Bu, T.: Network Tomography: Identifiability and Fourier Domain Estimation, December 2007
2. Chiu, C.C., He, T.: Stealthy DGoS attack: degrading of service under the watch of network tomography. In: IEEE INFOCOM 2020 - IEEE Conference on Computer Communications, pp. 367–376. IEEE Press, Toronto, ON, Canada, July 2020
3. Constantin, L.: Attackers slip rogue, backdoored firmware onto Cisco routers | PCWorld. https://www.pcworld.com/article/2984084/attackers-install-highly-persistent-malware-implants-on-cisco-routers.html
4. Duffield, N., Presti, F.L., Paxson, V., Towsley, D.: Network loss tomography using striped unicast probes. IEEE/ACM Trans. Networking 14(4), 697–710 (2006). Conference name: IEEE/ACM Transactions on Networking
5. Erdös, P., Rényi, A.: On the evolution of random graphs. Publ. Mah. Inst. Hung. Acad. Sci 5, 17–60 (1960)