共 50 条
- [1] Distributed Denial of Service: Attack techniques and mitigation [J]. 2017 2ND INTERNATIONAL CONFERENCE ON CIRCUITS, CONTROLS, AND COMMUNICATIONS (CCUBE), 2017, : 226 - 231
- [2] Gradient Techniques to Predict Distributed Denial-Of-Service Attack [J]. Iraqi Journal for Computer Science and Mathematics, 2022, 3 (02): : 55 - 71
- [4] Honeypot Scheme for Distributed Denial-of-Service Attack [J]. INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL : ICACC 2009 - PROCEEDINGS, 2009, : 497 - 501
- [5] Denial-of-service attack-detection techniques [J]. IEEE INTERNET COMPUTING, 2006, 10 (01) : 82 - 89
- [6] Obfuscating Software Puzzle for Denial-of-Service Attack Mitigation [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS (ITHINGS) AND IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) AND IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) AND IEEE SMART DATA (SMARTDATA), 2016, : 115 - 122
- [7] A Comprehensive Review of Distributed Denial-of-Service (DDoS) Attacks: Techniques and Mitigation Strategies [J]. PROCEEDINGS 2024 SEVENTH INTERNATIONAL WOMEN IN DATA SCIENCE CONFERENCE AT PRINCE SULTAN UNIVERSITY, WIDS-PSU 2024, 2024, : 215 - 222
- [8] A BitTorrent-driven distributed denial-of-service attack [J]. 2007 THIRD INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS AND WORKSHOPS, 2007, : 261 - 268
- [9] A survey of Distributed Denial of Service attack [J]. PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO'16), 2016,