共 50 条
- [21] Honeypots for distributed Denial of Service Attacks [J]. WET ICE 2002: ELEVENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2002, : 109 - 114
- [22] A Taxonomy of Distributed Denial of Service Attacks [J]. 2017 INTERNATIONAL CONFERENCE ON INFORMATION SOCIETY (I-SOCIETY 2017), 2017, : 100 - 107
- [23] An Examination of Distributed Denial of Service Attacks [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON ELECTRO/INFORMATION TECHNOLOGY (EIT), 2015, : 274 - 279
- [24] Using transient behavior of TCP in mitigation of distributed denial of service attacks [J]. PROCEEDINGS OF THE 41ST IEEE CONFERENCE ON DECISION AND CONTROL, VOLS 1-4, 2002, : 1422 - 1427
- [25] Distributed Denial of Service Attacks Detection Using Support Vector Machine [J]. INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2011, 14 (01): : 127 - 134
- [26] A Coordinated Detection and Response Scheme for Distributed Denial-of-Service Attacks [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-12, 2006, : 2165 - 2170
- [27] DeepDetect: Detection of Distributed Denial of Service Attacks Using Deep Learning [J]. COMPUTER JOURNAL, 2020, 63 (07): : 983 - 994
- [28] Distributed Denial of Service (DDoS) Attacks Detection: A Machine Learning Approach [J]. APPLIED SOFT COMPUTING AND COMMUNICATION NETWORKS, 2021, 187 : 75 - 87
- [29] DeepDetect: Detection of distributed denial of service attacks using deep learning [J]. Asim, Muhammad (muhammad.asim@nu.edu.pk), 1600, Oxford University Press (63): : 983 - 994