Author:
Lee Yong-Joon,Baik Nam-Kyun,Kim Cheonshik,Yang Ching-Nung
Publisher
Springer Science and Business Media LLC
Subject
Management Science and Operations Research,Computer Science Applications,Hardware and Architecture
Reference28 articles.
1. Xu T, Wendt JB, Potkonjak M (2014) Security of IoT systems: design challenges and opportunities. In: Proceedings of the 2014 IEEE/ACM international conference on computer-aided design (ICCAD ’14), pp 417–423
2. Hee KN (2014) Standard technology trends for internet security of things. J Korean Inst Commun Sci 31 (9):40–45
3. Peng T, Leckie C, Ramamohanarao K (2007) Survey of network-based defense mechanisms countering the DoS and DDoS problems. ACM Comput Surv (CSUR) 39(1):1–42
4. Ryba FJ, Orlinski M, Wählisch M, Rossow C, Schmidt TC (2015) Amplification and DRDoS attack defense—a survey and new perspectives. arXiv preprint, arXiv:1505.07892, pp 1–26
5. Saboor A, Aslam B (2015) Analyses of flow based techniques to detect distributed denial of service attacks. In: Proceedings of applied sciences and technology, pp 354–362
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Network Intrusion Detection in Internet of Blended Environment Using Ensemble of Heterogeneous Autoencoders (E-HAE);Computer Systems Science and Engineering;2023
2. A deterministic approach for extracting network security intents;Computer Networks;2022-09
3. A Hybrid Approach to Protect Server from IP Spoofing Attack;2022 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES);2022-07-15
4. Layer-based examination of cyber-attacks in IoT;2022 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA);2022-06-09
5. Towards a secure Software Defined Network with Adaptive Mitigation of DDoS attacks by Machine Learning Approaches;2022 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI);2022-01-28