Author:
Andrysiak Tomasz,Saganowski Łukasz,Choraś Michał
Publisher
Springer Berlin Heidelberg
Reference24 articles.
1. Mirkovic, J., Reiher, P.: A Taxonomy of DDoS Attack and DDoS Defense Mechanisms. In: ACM SIGCOMM CCR (2004)
2. Champagne, D., Lee, R.B.: Scope of DDoS Countermeasures: Taxonomy of Proposed Solutions and Design Goals for Real-World Deployment. In: 8th International Symposium on Systems and Information Security, SSI 2006 (2006)
3. Bin, X., Wei, C.: Y. He: A Novel approach to detecting DDoS attacks at an early Stage. Springer Science + Business Media LLC (2006)
4. Teodoro, P.G., Verdejo, J.D., Fernandez, G.M., Vazquez, E.: Anomaly-based network intrusion detection: Techniques, systems and challenges. Computer and Security 28(1-2), 18–28 (2008)
5. Troop, J.A.: Greed is Good: Algorithmic Results for Sparse Approximation. IEEE Transactions on Information Theory, 50(10) (2004)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献