Author:
Moore David,Voelker Geoffrey M.,Savage Stefan
Publisher
Defense Technical Information Center
Cited by
174 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Risks to cybersecurity from data localization, organized by techniques, tactics and procedures;Journal of Cyber Policy;2024-08-26
2. How to Operate a Meta-Telescope in your Spare Time;Proceedings of the 2023 ACM on Internet Measurement Conference;2023-10-24
3. Fifteen Months in the Life of a Honeyfarm;Proceedings of the 2023 ACM on Internet Measurement Conference;2023-10-24
4. Mining classification algorithms to identify flooding attacks through the HTTP/3 protocol;2023 IEEE International Conference on Communications Workshops (ICC Workshops);2023-05-28
5. An Overview of Defense Techniques Against DoS Attacks;2022 9th International Conference on Internet of Things: Systems, Management and Security (IOTSMS);2022-11-29