Author:
Fazeldehkordi Elahe,Owe Olaf,Ramezanifarkhani Toktam
Publisher
Springer International Publishing
Reference21 articles.
1. Ashford, W.: DDoS is most common cyber attack on financial institutions (blog post, 2016).
https://www.computerweekly.com/news/4500272230/DDoS-is-most-common-cyber-attack-on-financial-institutions/
2. Boer, F.D., et al.: A survey of active object languages. ACM Comput. Surv. (CSUR) 50(5), 76 (2017)
3. Chang, R., Jiang, G., Ivancic, F., Sankaranarayanany, S., Shmatikov, V.: Inputs of Coma: static detection of denial-of-service vulnerabilities. In: 22nd IEEE Computer Security Foundations Symposium (CSF 2009), pp. 186–199. IEEE Computer Society (2009)
4. Lecture Notes in Computer Science;MA Colóon,2001
5. Din, C.C., Owe, O.: A sound and complete reasoning system for asynchronous communication with shared futures. J. Log. Algebraic Methods Program. 83(5), 360–383 (2014)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献