共 50 条
- [31] A Practical Method for Minimization of Attack Surfaces in Information Warfare PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2012, : 325 - 329
- [32] Practical Performance Evaluation of Peer-to-peer Internet Telephony using SIP 8TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY WORKSHOPS: CIT WORKSHOPS 2008, PROCEEDINGS, 2008, : 204 - 209
- [33] Evaluation of detection method to mitigate DoS attacks in MANETs 2018 1ST INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS' 2018), 2018,
- [34] An Experimental Evaluation of DoS Attack and Its Impact on Throughput of IEEE 802.11 Wireless Networks INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (08): : 1 - 5
- [35] Identifying DOS and DDOS Attack Origin: IP Traceback Methods Comparison and Evaluation for IoT INTEROPERABILITY, SAFETY AND SECURITY IN IOT, 2017, 190 : 127 - 138
- [36] Survivability Evaluation of Cluster-Based Wireless Sensor Network under DoS Attack INTERNET OF THINGS-BK, 2012, 312 : 126 - 132
- [37] PRACTICAL METHOD OF SUBJECTIVE EVALUATION PROCEEDINGS OF THE AMERICAN ASSOCIATION FOR CANCER RESEARCH, 1974, 15 (MAR): : 180 - 180
- [38] The DoS Attack Risk Calculation Based on the Entropy Method and Critical System Resources Usage 2014 FIRST INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE PROBLEMS OF INFOCOMMUNICATIONS SCIENCE AND TECHNOLOGY (PIC S&T), 2014, : 186 - 187
- [39] Adversarial Attack against DoS Intrusion Detection: An Improved Boundary-Based Method 2019 IEEE 31ST INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI 2019), 2019, : 1288 - 1295
- [40] Practical Evaluation of Adversarial Robustness via Adaptive Auto Attack 2022 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2022), 2022, : 15084 - 15093