Author:
Rajpoot Chour Singh,Bairwa Amit Kumar,Sharma Vijay Kumar
Reference28 articles.
1. Yan Q, Gong Q, Deng F-A (2016) Detection of DDoS attacks against wireless SDN controllers based on the fuzzy synthetic evaluation decision-making model. Ad Hoc Sens Wirel Netw 33:275299
2. Zargar ST, Joshi J, Tipper D (2013) A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Commun Surv Tutor 15(4):2046–2068
3. Chang RKC (2002) Defending against flooding-based distributed denial-of-service attacks: a tutorial. IEEE Commun Magaz 42-51
4. Spyridopoulos T, Karanikas G, Tryfonas T, Oikonomou G (2013) A game theoretic defense framework against DoS / DDoS cyber-attacks. Comput Sec 38:39–50
5. Srivatsa M, Iyengar A, Yin J, Liu L (2008) Mitigating application-level denial of service attacks on Web servers: a client-transparent approach, ACM Trans Web (TWEB) 2(3)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献