Publisher
Springer Nature Singapore
Reference16 articles.
1. Boutilier, C., Dean, T., Hanks, S.: Decision-theoretic planning: structural assumptions and computational leverage. J. Artif. Int. Res. 11(1), 1–94 (1999)
2. Gao, Y., Feng, Y., Kawamoto, J., Sakurai, K.: A Machine learning based approach for detecting DRDoS attacks and its performance evaluation. In: 11th Asia Joint Conference on Information Security, AsiaJCIS 2016, Fukuoka, Japan, 4–5 August 2016, pp. 80–86. IEEE Computer Society (2016). https://doi.org/10.1109/AsiaJCIS.2016.24
3. Gmytrasiewicz, P.J., Doshi, P.: A framework for sequential planning in multi-agent settings. J. Artif. Int. Res. 24(1), 49–79 (2005)
4. Griffioen, H., Oosthoek, K., van der Knaap, P., Doerr, C.: Scan, test, execute: adversarial tactics in amplification ddos attacks. In: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, pp. 940–954. CCS 2021, Association for Computing Machinery, New York, NY, USA (2021). https://doi.org/10.1145/3460120.3484747
5. Jin, C., Wang, H., Shin, K.G.: Hop-count filtering: an effective defense against spoofed ddos traffic. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, pp. 30–41. Association for Computing Machinery, New York, NY, USA (2003). https://doi.org/10.1145/948109.948116
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献