共 50 条
- [2] Optimal Load Distribution for the Detection of VM-Based DDoS Attacks in the Cloud [J]. Wahab, O.A. (o_abul@encs.concordia.ca), 1600, Institute of Electrical and Electronics Engineers Inc., United States (13): : 114 - 129
- [5] A new approach of network buffer overflow detection based on code execution simulation [J]. Harbin Gongye Daxue Xuebao/Journal of Harbin Institute of Technology, 2007, 39 (09): : 1436 - 1439
- [6] A framework for detecting network-based code injection attacks targeting windows and UNIX [J]. 21st Annual Computer Security Applications Conference, Proceedings, 2005, : 41 - 50
- [7] A Network Coding Against Wiretapping Attacks of the Physical Layer Security Based on LDPC Code [J]. INTELLIGENT COMPUTING AND INTERNET OF THINGS, PT II, 2018, 924 : 429 - 440
- [9] Attacks against computer network: Formal grammar-based framework and simulation tool [J]. RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2002, 2516 : 219 - 238