Author:
Reynolds J.C.,Just J.,Clough L.,Maglich R.
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. - DDoS Detection;DDoS Attacks;2016-04-27
2. Linear Software Models: Decoupled Modules from Modularity Matrix Eigenvectors;International Journal of Software Engineering and Knowledge Engineering;2015-10
3. A Framework for Intrusion Tolerance in Cloud Computing;Advances in Computing and Communications;2011
4. Buffer Overflows: Attacks;Encyclopedia of Information Assurance;2010-12-20
5. LIDF: Layered intrusion detection framework for ad-hoc networks;Ad Hoc Networks;2009-01