Author:
Xiao Bin,Chen Wei,He Yanxiang
Publisher
Springer Science and Business Media LLC
Subject
Hardware and Architecture,Information Systems,Theoretical Computer Science,Software
Reference23 articles.
1. Moore D, Voelker G, Savage S (2001) Inferring internet denial of service activity. In Proceedings of USENIX Security Symposium, Washington, DC, USA, pp 9–22
2. Postel J (1981) Transmission Control Protocol: DARPA internet program protocol specification, RFC 793
3. Chen Y (2000) Study on the prevention of SYN flooding by using traffic policing. In: Network Operations and Management Symposium 2000 IEEE/IFIP, pp 593–604
4. Wang H, Zhang D, Shin KG (2002) Detecting SYN flooding attacks. In: Proceedings of Annual Joint Conference of the IEEE Computer and Communications Societies(INFOCOM), vol. 3, pp 1530–1539
5. Jin C, Wang HN, Shin KG (2003) Hop-count filtering: An effective defense against spoofed DDoS traffic. In: Proceedings of the 10th ACM Conference on Computer and Communication Security (CCS), ACM Press, pp 30–41
Cited by
18 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献