共 50 条
- [1] Tracking Attack Sources based on Traceback Honeypot for ICS Network 2017 56TH ANNUAL CONFERENCE OF THE SOCIETY OF INSTRUMENT AND CONTROL ENGINEERS OF JAPAN (SICE), 2017, : 717 - 723
- [2] Architecture for multi-stage network attack traceback LCN 2005: 30TH CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2005, : 776 - 783
- [4] An Effective Traceback Network Attack Procedure for Source Address Verification Wireless Personal Communications, 2021, 118 : 1675 - 1696
- [5] Identification of the Real Source of DDOS Attack by FDPM in IP Traceback System UKSIM-AMSS EIGHTH EUROPEAN MODELLING SYMPOSIUM ON COMPUTER MODELLING AND SIMULATION (EMS 2014), 2014, : 392 - 396
- [7] Analysis of Cyber Attack Traceback Techniques from the Perspective of Network Forensics Ruan Jian Xue Bao/Journal of Software, 2021, 32 (01): : 194 - 217
- [8] An on-line DDoS attack Traceback and Mitigation System based on network performance monitoring 10TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III: INNOVATIONS TOWARD FUTURE NETWORKS AND SERVICES, 2008, : 1467 - +