Publisher
Springer Science and Business Media LLC
Reference49 articles.
1. Easttom, W.: Network Defence and Countermeasures: Principles and Practices. Pearson IT Certification (2013).
2. Tanenbaum, A.: Computer Networks. Prentice Hall, Hoboken (2002).
3. Bisson, D.: The 5 most significant DDoS attacks of 2016. url: https://www.tripwire.com/state-of-security/security-data-protection/cyber-security/5-significant-ddos-attacks-2016/.
4. Geneiatakis, D.; Portokalidis, G.; Keromytis, A. D.: A multilayer overlay network architecture for enhancing IP services availability against DoS. In: International Conference on Information Systems Security, vol. 7093. (2011).
5. Liu, X.; Yang, X.; Lu, Y.: To filter or to authorize: Network-layer DoS defense against multimillion-node botnets. In: ACM SIGCOMM 2008 Conference on Data Communication, SIGCOMM’08, pp. 195–206 (2008).
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献