共 50 条
- [21] Defending Against Evolving DDoS Attacks: A Case Study Using Link Flooding Incidents [J]. SECURITY PROTOCOLS XXIV, 2017, 10368 : 47 - 57
- [22] Defending Against Meek DDoS Attacks By IP Traceback-based Rate Limiting [J]. GLOBECOM 2006 - 2006 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2006,
- [23] A multilevel thrust filtration defending mechanism against DDoS attacks in cloud computing environment [J]. Iyengar, N. Ch. Sriman Narayana, 1600, Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (05):
- [24] Mempool Optimization for Defending Against DDoS Attacks in PoW-based Blockchain Systems [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN AND CRYPTOCURRENCY (ICBC), 2019, : 285 - 292
- [25] A new perspective in defending against DDoS [J]. 10TH IEEE INTERNATIONAL WORKSHOP ON FUTURE TRENDS OF DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2004, : 186 - 190
- [26] Defending application DDoS with constraint random request attacks [J]. 2005 ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS (APCC), VOLS 1& 2, 2005, : 620 - 624
- [27] IDR: An intrusion detection router for defending against Distributed Denial-of-Service (DDoS) attacks [J]. I-SPAN 2004: 7TH INTERNATIONAL SYMPOSIUM ON PARALLEL ARCHITECTURES, ALGORITHMS AND NETWORKS, PROCEEDINGS, 2004, : 581 - 586
- [28] Defending Against DDOS Attacks on IoT Network Throughput: A Trust-Stackelberg Game Model [J]. 2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 6259 - 6264
- [30] Using adaptive bandwidth allocation approach to defend DDoS attacks [J]. MUE: 2008 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND UBIQUITOUS ENGINEERING, PROCEEDINGS, 2008, : 176 - 181