Author:
Jamali Shahram,Shaker Gholam
Subject
Computational Mathematics,Computational Theory and Mathematics,Modelling and Simulation
Reference19 articles.
1. L.A. Gordon, M.P. Loeb, W. Lucyshyn, R. Richardson, CSI/FBI computer crime and security survey, Computer Security Institute, 2005.
2. Survey of network security systems to counter SIP-based denial-of-service attacks;Ehlert;Computers & Security,2010
3. C.F. Yu, V.D. Gligor, A formal specification and verification method for the prevention of denial of service, in: IEEE Symposium on Security and Privacy, 1988.
4. B.P.C. Warrender, S. Forrest, Detecting intrusions using system calls: altemative data models, in: IEEE Symposium on Security and Privacy, 1999.
5. A. Hussain, J. Heidemann, C. Papadopoulos, A framework for classifying denial of service attacks, USC Information Sciences Institute, 2003.
Cited by
16 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献