Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Safety, Risk, Reliability and Quality,Information Systems,Software
Reference64 articles.
1. Ahmad, A., Idris, N.B., Kama, M.N.: Cloudids: cloud intrusion detection model inspired by dendritic cell mechanism. Int. J. Commun. Netw. Inf. Secur. (IJCNIS) 9(1), 1–5 (2017)
2. Alidoosti, M., Nowroozi, A., Nickabadi, A.: Evaluating the web-application resiliency to business-layer DoS attacks. ETRI J. 42, 433–445 (2020)
3. Ambedkar, Ch., Kishore Babu, V.: Detection of probe attacks using machine learning techniques. Int. J. Res. Stud. Comput. Sci. Eng. (IJRSCSE) 2(3), 25–29 (2015)
4. Barik, M.S., Sengupta, A., Mazumdar, C.: Attack graph generation and analysis techniques. Defence Sci. J. 66(6), (2016)
5. Buragohain, C., Medhi, N.: Flowtrapp: an SDN based architecture for ddos attack detection and mitigation in data centers. In: 2016 3rd International Conference on Signal Processing and Integrated Networks (SPIN), pp. 519–524. IEEE, (2016)
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献