Author:
Kwon Jonghoon,Seo Dongwon,Kwon Minjin,Lee Heejo,Perrig Adrian,Kim Hyogon
Subject
Computer Networks and Communications
Reference88 articles.
1. R. Beverly, A. Berger, Y. Hyun, K. Claffy, Understanding the efficacy of deployed internet source address validation filtering, in: Proceedings of ACM SIGCOMM IMC, 2009.
2. On the state of IP spoofing defense;Ehrenkranz;ACM Trans. Internet Technol.,2009
3. Comparative evaluation of spoofing defenses;Mirkovic;IEEE Trans. Defendable Secure Comput.,2011
4. CERT, TCP SYN Flooding and IP Spoofing Attacks, Advisory CA-96.21, September 1996.
5. Inferring internet denial-of-service activity;Moore;ACM Trans. Comput. Syst. (TOCS).,2006
Cited by
15 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献