Author:
Cui Yunhe,Yan Lianshan,Li Saifei,Xing Huanlai,Pan Wei,Zhu Jian,Zheng Xiaoyang
Subject
Computer Networks and Communications,Computer Science Applications,Hardware and Architecture
Reference39 articles.
1. Angiulli, F., Fassetti, F., 2003. Detecting distance-based outliers in streams of data. In: Proceedings of the Sixteenth ACM Conference on Information and Knowledge Management, ACM, pp. 811–820.
2. Answers about recent ddos attack on spamhaus, 2013. Website. 〈http://www.spamhaus.org/news/article/695〉.
3. Borgnat, P., Dewaele, G., Fukuda, K., Abry, P., Cho, K., 2009. Seven years and one day: sketching the evolution of internet traffic. In: Proceedings of INFOCOM, pp. 711–719.
4. A tool for the generation of realistic network workload for emerging networking scenarios;Botta;Comput. Netw.,2012
5. Braga, R., Mota, E., Passito, A., 2010. A lightweight ddos flooding attack detection using nox/openflow. In: Proceedings of LCN, IEEE, pp. 408–415.
Cited by
135 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献