Subject
Computer Networks and Communications
Reference27 articles.
1. An analysis of using reflectors for distributed denial-of-service attacks;Paxson;ACM SIGCOMM Comput. Commun. Rev.,2001
2. A rank correlation based detection against distributed reflection DoS attacks;Wei;Comput. Commun.,2013
3. Reflected attacks abusing honeypots;Husk,2013
4. Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems;Arun;Comput. Commun.,2012
5. E. Kline, M. Beaumont-Gay, J. Mirkovic, P. Reiher, RAD: reflector attack defense using message authentication codes, in: Proceedings of Computer Security Applications Conference, 2009, pp. 269–278.
Cited by
17 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献