共 100 条
- [1] Zhu SX, Chen ZG, Zhang XS, Chen RD., Traceback Cyber Attacks, pp. 102-131, (2015)
- [2] Khan S, Gani A, Wahab AWA, Shiraz M, Ahmad I., Network forensics: Review, taxonomy, and open challenges, Journal of Network and Computer Applications, 66, pp. 214-235, (2016)
- [3] Ding LP., Network forensics and theory research of computer forensics, Netinfo Security, 10, 12, pp. 38-41, (2010)
- [4] Chen ZG, Pu S, Hao Y, Huang C., Levels analysis of network attack traceback, Computer Systems Applications, 23, 1, pp. 1-7, (2014)
- [5] Jiang JG, Wang JZ, Kong B, Hu B, Liu JQ., On the survey of network attack source traceback, Journal of Cyber Security, 3, 1, pp. 111-131, (2018)
- [6] Singh K, Singh P, Kumar K., A systematic review of IP traceback schemes for denial of service attacks, Computers & Security, 56, pp. 111-139, (2016)
- [7] Al-Duwairi B, Govindarasu M., Novel hybrid schemes employing packet marking and logging for IP traceback, IEEE Trans. on Parallel and Distributed Systems, 17, 5, pp. 403-418, (2006)
- [8] A road map for digital forensics research, (2001)
- [9] Mai YH., Digital Forensic Judicial Practice, pp. 26-45, (2012)
- [10] Ding LP., Research on the models, policies and implement of real-time forensics operating system, (2006)