共 50 条
- [21] Mempool Optimization for Defending Against DDoS Attacks in PoW-based Blockchain Systems [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN AND CRYPTOCURRENCY (ICBC), 2019, : 285 - 292
- [22] A new perspective in defending against DDoS [J]. 10TH IEEE INTERNATIONAL WORKSHOP ON FUTURE TRENDS OF DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2004, : 186 - 190
- [23] Defending application DDoS with constraint random request attacks [J]. 2005 ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS (APCC), VOLS 1& 2, 2005, : 620 - 624
- [24] Using adaptive bandwidth allocation approach to defend DDoS attacks [J]. MUE: 2008 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND UBIQUITOUS ENGINEERING, PROCEEDINGS, 2008, : 176 - 181
- [25] IDR: An intrusion detection router for defending against Distributed Denial-of-Service (DDoS) attacks [J]. I-SPAN 2004: 7TH INTERNATIONAL SYMPOSIUM ON PARALLEL ARCHITECTURES, ALGORITHMS AND NETWORKS, PROCEEDINGS, 2004, : 581 - 586
- [27] Defending Cloud Computing Environment Against the Challenge of DDoS Attacks Based on Software Defined Network [J]. ADVANCES IN INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL 1, 2017, 63 : 285 - 292
- [28] Defending Against DDOS Attacks on IoT Network Throughput: A Trust-Stackelberg Game Model [J]. 2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 6259 - 6264
- [30] Adaptive Early Packet Filtering for Defending Firewalls against DoS Attacks [J]. IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5, 2009, : 2437 - +