Author:
Roh Byeong-hee,Kim Ju Wan,Ryu Ki-Yeol,Ryu Jea-Tek
Subject
Law,General Computer Science
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Securing the Future;Advances in IT Standards and Standardization Research;2024-05-31
2. A Fast Matching Method of Trusted Whitelist Based on Bloom Filter;2022 7th International Conference on Signal and Image Processing (ICSIP);2022-07-20
3. D3: Detection and Prevention of DDoS Attack Using Cuckoo Filter;2021 19th OITS International Conference on Information Technology (OCIT);2021-12
4. A Lightweight Detection Using Bloom Filter against Flooding DDoS Attack;IEICE Transactions on Information and Systems;2020-12-01
5. Constructing cascade bloom filters for efficient access enforcement;Computers & Security;2019-03