Author:
Zhang Shijun,Li Shuo,Zeng Jing
Publisher
Springer Nature Singapore
Reference22 articles.
1. https://www.100ec.cn/home/detail--6608634.html [EB/OL] (2022)
2. Brigid, G., Candid, W., Dick, B.: Symantec internet security threat report 2019[EB/OL] (2019)
3. Gasti, P., Tsudik, G., Uzun, E., et al.: DoS and DDoS in named data networking. In: 2013 22nd International Conference on Computer Communication and Networks (ICCCN), pp. 1–7. IEEE (2013)
4. Lee, C.B., Roedel, C., Silenok, E.: Detection and characterization of port scan attacks. Department of Computer Science and Engineering, Univeristy of California (2003)
5. Yang, B., Zhang, X., Yu, T., et al.: Grouped grey wolf optimizer for maximum power point tracking of doubly-fed induction generator based wind turbine. Energy Convers. Manage. 133, 427–443 (2017)