共 50 条
- [11] A detection design for distributed denial of service attack 6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL I, PROCEEDINGS: INFORMATION SYSTEMS DEVELOPMENT I, 2002, : 78 - 82
- [12] An analysis and fingerprinting of a distributed denial of service attack 6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL VIII, PROCEEDINGS: CONCEPTS AND APPLICATIONS OF SYSTEMICS, CYBERNETICS AND INFORMATICS II, 2002, : 274 - 279
- [13] Collaborative Blockchain Based Distributed Denial of Service Attack Mitigation Approach with IP Reputation System DATABASE SYSTEMS FOR ADVANCED APPLICATIONS. DASFAA 2022 INTERNATIONAL WORKSHOPS, 2022, 13248 : 91 - 103
- [14] An Empirical Study of Denial of Service Mitigation Techniques PROCEEDINGS OF THE SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS, 2008, : 115 - +
- [15] Implementation and comparison of denial of service attack techniques 8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL III, PROCEEDINGS: COMMUNICATION AND NETWORK SYSTEMS, TECHNOLOGIES AND APPLICATIONS, 2004, : 336 - 341
- [16] Distributed Detection and Response for the Mitigation of Distributed Denial of Service Attacks 2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2018, : 495 - 497
- [17] A Comprehensive Review of Distributed Denial-of-Service (DDoS) Attacks: Techniques and Mitigation Strategies PROCEEDINGS 2024 SEVENTH INTERNATIONAL WOMEN IN DATA SCIENCE CONFERENCE AT PRINCE SULTAN UNIVERSITY, WIDS-PSU 2024, 2024, : 215 - 222
- [18] Honeypot Scheme for Distributed Denial-of-Service Attack INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL : ICACC 2009 - PROCEEDINGS, 2009, : 497 - 501
- [19] Intrusion detection of distributed denial of service attack in cloud Cluster Computing, 2019, 22 : 10615 - 10623
- [20] Modeling and simulation for detecting a distributed denial of service attack AL 2002: ADVANCES IN ARTIFICIAL INTELLIGENCE, 2002, 2557 : 179 - 190