共 50 条
- [21] Intrusion detection of distributed denial of service attack in cloud [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 5): : 10615 - 10623
- [22] Characterization and Comparison of Distributed Denial of Service Attack Tools [J]. 2015 INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT), 2015, : 1139 - 1145
- [23] Distributed Denial of Service attack on Cloud: Detection and Prevention [J]. 2015 INTERNATIONAL CONFERENCE AND WORKSHOP ON COMPUTING AND COMMUNICATION (IEMCON), 2015,
- [25] Detecting and Reacting against Distributed Denial of Service Attacks [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-12, 2006, : 2394 - 2399
- [26] Detecting denial of service attacks using Support Vector Machines [J]. PROCEEDINGS OF THE 12TH IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS, VOLS 1 AND 2, 2003, : 1231 - 1236
- [27] AN OVERVIEW OF DISTRIBUTED DENIAL OF SERVICE TRAFFIC DETECTION APPROACHES [J]. PROMET-TRAFFIC & TRANSPORTATION, 2019, 31 (04): : 453 - 464
- [28] A Novel Model for Distributed Denial of Service Attack Analysis and Interactivity [J]. SYMMETRY-BASEL, 2021, 13 (12):
- [29] Implementation of Honeypot to Detect and Prevent Distributed Denial of Service Attack [J]. 2016 3RD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, COMPUTER, AND ELECTRICAL ENGINEERING (ICITACEE), 2016, : 345 - 350
- [30] Modeling Distributed Denial of Service Attack in Advanced Metering Infrastructure [J]. 2015 IEEE POWER & ENERGY SOCIETY INNOVATIVE SMART GRID TECHNOLOGIES CONFERENCE (ISGT), 2015,