Author:
Ren Xunyi,Wang Ruchuan,Wang Haiyan
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Electronic, Optical and Magnetic Materials
Reference12 articles.
1. Chang R K C. Defending against flooding-based distributed denial-of-service attack: A tutorial. IEEE Comm Magazine, 2002, 40(10): 42–51
2. Lau F, Rubin S H, Smith M H. Distributed denial of service attacks. In: Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics. Nashville, 2000, 2275–2280
3. Sun Qingdong, Zhang Deyun, Gao Peng. Detecting distributed denial of service attacks based on time series analysis. Chinese Journal of Computers, 2005, 28(5): 768–773 (in Chinese)
4. Leland W, Taqqu M, Willinger W. On the self-similar nature of ethernet traffic (Extended Version). IEEE/ACM Trans on Networking, 1994, 2(1): 1–15
5. Paxson V, Floyd S. Wide area traffic: The failure of poison modeling. IEEE/ACM Trans on Networking, 1995, 3(3): 226–244
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献