Author:
AAMIR Muhammad,ZAIDI Mustafa Ali
Publisher
Graduate School of Information Sciences, Tohoku University
Reference157 articles.
1. 1) Mitrokotsa, A., and Douligeris, C., Denial-of-Service Attacks. Network Security: Current Status and Future Directions, Wiley Online Library, Chapter 8, 117-134 (2006).
2. 2) Zhang, L., Yu, S., Wu, D., and Watters, P., A Survey on Latest Botnet Attack and Defense, Proceedings of IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 53-60 (2011).
3. 3) Mishra, A., Gupta, B. B., and Joshi, R. C., A Comparative Study of Distributed Denial of Service Attacks, Intrusion Tolerance and Mitigation Techniques, Proceedings of IEEE European Intelligence and Security Informatics Conference (EISIC), 286-289 (2011).
4. 4) Ghazali, K. W. M., and Hassan, R., ``Flooding distributed denial of service attacks – A review,'' J. Comput. Sci., 7: 1218-1223 (2011).
5. 5) Beitollahi, H., and Deconinck, G., Denial of Service Attacks: A Tutorial, Electrical Engineering Department (ESAT), University of Leuven, Technical Report: 08-2011-0115 (2011).
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献