共 50 条
- [41] Detecting SYN flooding attacks [J]. IEEE INFOCOM 2002: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-3, PROCEEDINGS, 2002, : 1530 - 1539
- [42] On Detecting Code Reuse Attacks [J]. AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2020, 54 (07) : 573 - 583
- [43] Detecting BGP Routing Anomalies Using Machine Learning: A Review [J]. FORTHCOMING NETWORKS AND SUSTAINABILITY IN THE AIOT ERA, VOL 1, FONES-AIOT 2024, 2024, 1035 : 145 - 164
- [44] Detecting BGP Instability Using Recurrence Quantification Analysis (RQA) [J]. 2015 IEEE 34TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2015,
- [45] Detecting Sybil attacks in VANETs [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2013, 73 (06) : 746 - 756
- [46] LDC: Detecting BGP Prefix Hijacking by Load Distribution Change [J]. 2012 IEEE 26TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS & PHD FORUM (IPDPSW), 2012, : 1197 - 1203
- [48] Early detection of BGP instabilities resulting from Internet worm attacks [J]. GLOBECOM '04: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6, 2004, : 2266 - 2270
- [49] Modular Platform for Customer-Side Detection of BGP Redirection Attacks [J]. ICISSP: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, : 199 - 206