Subject
Hardware and Architecture,Modelling and Simulation,Software
Reference43 articles.
1. Modelling and simulation of a defense strategy to face indirect DDoS flooding attacks;Furfaro,2014
2. Using virtual environments for the assessment of cybersecurity issues in IoT scenarios;Furfaro;Simul. Modell. Pract. Theory,2017
3. Evaluating critical security issues of the iot world: present and future challenges;Frustaci;IEEE Internet Things J.,2018
4. A cloud-based platform for the emulation of complex cybersecurity scenarios;Furfaro;Future Gener. Comput. Syst.,2018
5. Verisign, DDos trends report,2018
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献