共 50 条
- [41] Politically Motivated Denial of Service Attacks THE VIRTUAL BATTLEFIELD: PERSPECTIVES ON CYBER WARFARE, 2009, 3 : 163 - 181
- [42] Detecting Denial of Service Attacks in the Cloud 2016 IEEE 14TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 14TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 2ND INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/DATACOM/CYBERSC, 2016, : 309 - 316
- [44] Detecting Denial of Service Attacks in Tor FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2009, 5628 : 273 - 284
- [45] VULNERABILITY OF INSENS TO DENIAL OF SERVICE ATTACKS 2011 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, 2011, : 1896 - 1899
- [46] Denial of Service Attacks Mitigation in the Cloud 2015 9TH INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES AND TECHNOLOGIES (NGMAST 2015), 2015, : 47 - 53
- [47] A SURVEY ON DENIAL OF SERVICE ATTACKS AND PRECLUSIONS PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATICS AND ANALYTICS (ICIA' 16), 2016,
- [48] Analysis of denial-of-service attacks on denial-of-service defensive measures GLOBECOM'03: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-7, 2003, : 1339 - 1343
- [50] Honeypots for distributed Denial of Service Attacks WET ICE 2002: ELEVENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2002, : 109 - 114