Author:
Zhang Jichuan,Zhai Jianhong,Yang Ru,Liu Shuyan
Reference24 articles.
1. Marrison, C.: Understanding the threats to DNS and how to secure it. Netw. Secur. 2015(10), 8–10 (2015)
2. Giggins, T.: Single point of failure and availability. In: Institution of Engineers, Australia (1994)
3. Lecture Notes in Computer Science;S Castro,2010
4. Alieyan, K., Kadhum, M.M., Anbar, M., et al.: An overview of DDoS attacks based on DNS. In: International Conference on Information & Communication Technology Convergence. IEEE (2016)
5. Zargar, S.T., Joshi, J., Tipper, D.: A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Commun. Surv. Tutor. 15(4), 2046–2069 (2013)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. DNS is the Internet Pivotal Basics and Fundamental;International Journal of Advanced Network, Monitoring and Controls;2022-01-01