共 50 条
- [33] Why Bother Securing DNS? (Transcript of Discussion) [J]. SECURITY PROTOCOLS XXII, 2014, 8809 : 9 - 17
- [34] Towards securing cloud computing from DDOS attacks [J]. International Journal of Advanced Computer Science and Applications, 2020, 11 (08): : 615 - 622
- [36] Securing MAODV: Attacks and countermeasures [J]. 2005 SECOND ANNUAL IEEE COMMUNICATIONS SOCIETY CONFERENCE ON SENSOR AND AD HOC COMMUNICATIONS AND NETWORKS, 2005, : 521 - 532
- [37] Reducing DNS Cache Poisoning Attacks [J]. ICACCS 2015 PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION SYSTEMS, 2015,
- [38] An Overview of DDoS attacks based on DNS [J]. 2016 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC 2016): TOWARDS SMARTER HYPER-CONNECTED WORLD, 2016, : 276 - 280
- [39] Mitigation Process for DNS Flood Attacks [J]. 2019 16TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2019,
- [40] Securing Docker Containers from Denial of Service (DoS) Attacks [J]. PROCEEDINGS 2016 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING (SCC 2016), 2016, : 856 - 859