1. Design and implementation of resource exhaustion DoS attack situation assessment technology[D];Yuhua,2012
2. Huawei Anti-DDoS Technology Talk;Jiao,2018
3. Game Optimization for Internal DDoS Attack Detection in Cloud Computing[J];Yichuan,2015
4. Authenticity Analysis on DDoS Attack Detection for IDS[J];Li Panhui,2017
5. DDoS Attacks Detection and Control Mechanisms[J];Yongzheng;Journal of Software,2012