Author:
Liu Weijiang,Qu Wenyu,He Xiaona,Liu Zhaobin
Publisher
Springer Science and Business Media LLC
Subject
Hardware and Architecture,Information Systems,Theoretical Computer Science,Software
Reference21 articles.
1. El-Atawy A, Al-Shaer E, Tran T, Boutaba R (2009) Adaptive early packet filtering for protecting firewalls against DoS attacks. In: IEEE INFOCOM 2009, April, pp 2437–2445
2. Moore D, Paxson V, Savage S, Shannon C, Staniford S, Weaver N (2003) Inside the slammer worm. Secur Privacy Mag 2(4):33–39
3. Goodrich MT (2008) Probabilistic packet marking for large-scale IP traceback. IEEE/ACM Trans Netw 16(1):15–24
4. Xiang Y, Zhou W, Guo M (2009) Flexible deterministic packet marking: an IP traceback system to find the real source of attacks. IEEE Trans Parallel Distrib Syst 20(4):567–580. doi: 10.1109/TPDS.2008.132
5. Roesch M (1999) Snort-lightweight intrusion detection for network. In: Proc USENIX systems administration conference, pp 228–238
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献