Author:
Farhana Noor,Firdaus Ahmad,Darmawan Mohd Faaizie,Ab Razak Mohd Faizal
Subject
Management Science and Operations Research,Computer Science Applications,Information Systems
Reference52 articles.
1. O. Rahman, M. A. G. Quraishi, and C. H. Lung, “DDoS attacks detection and mitigation in SDN using machine learning,” Proceedings - 2019 IEEE World Congress on Services, SERVICES 2019, vol. 2642–939X, pp. 184–189, 2019, doi: 10.1109/SERVICES.2019.00051.
2. E. Ranjan, S., Swaminathan, R., Uysal, M., & Knightly, “DDoS-Resilient Scheduling to Counter Application Layer Attacks under Imperfect Detection,” in Proceedings IEEE INFOCOM. 25TH IEEE International Conference on Computer Communications, 2006, pp. 1–13. [Online]. Available: https://doi.org/10.1109/INFOCOM.2006.127.
3. A. Karimazad, R., & Faraahi, “An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks,” in International Conference on Network and Electronics Engineering , 2011, vol. 11, pp. 44–48.
4. D. Zargar, S. T., Joshi, J., & Tipper, “A survey of defense mechanisms against distributed denial of service (DDOS) flooding attacks,” in in IEEE Communications Surveys & Tutorials, 2013, vol. 15(4), pp. 2046–2069. [Online]. Available: https://doi.org/10.1109/SURV.2013.031413.00127.
5. A. Srivastava, B. B. Gupta, A. Tyagi, Anupama Sharma, and Anupama Mishra, “A recent survey on DDoS attacks and defense mechanisms,” in International Conference on Parallel Distributed Computing Technologies and Applications, 2011, pp. 570–580.
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献