Publisher
Springer International Publishing
Reference28 articles.
1. Apiecionek, L., Romantowski, M.: Secure IP network model. Comput. Method Sci. Technol. 19(4), 209–213 (2013)
2. Moore, D., Shannon, C., Brown, D.J., Voelker, G.M., Savage, S.: Inferring internet denial-of-service activity. ACM Trans. Comput. Syst. (TOCS) 24(2), 115–139 (2006)
3. Rocky, K., Chang, C.: Defending against flooding-based distributed denial-of-service attacks: a tutorial. IEEE Commun. Mag. pp. 42–51 (2002)
4. Schuba, C.L., Krsul, I., Huhn, M.G., Spafford, E.H., Sundaram, A.: Analysis of a denial of service attack on TCP. Computer Science Technical reports. paper 1327. http://docs.lib.purdue.edu/cstech/1327 (1996)
5. Cert advisory CA-1996-21 TCP SYN flooding and IP spoofing attacks. http://www.cert.org/advisories/CA-1996-21.html
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献