共 50 条
- [41] Optimal Specifications for a Protective Framework Against HTTP-based DoS and DDoS Attacks 2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2014, : 263 - 267
- [43] Cloud autoscaling for HTTP/2 workloads PROCEEDINGS OF 2017 3RD INTERNATIONAL CONFERENCE OF CLOUD COMPUTING TECHNOLOGIES AND APPLICATIONS (CLOUDTECH), 2017, : 166 - 171
- [44] Are HTTP/2 Servers Ready Yet? 2017 IEEE 37TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2017), 2017, : 1661 - 1671
- [45] Exploitation of HTTP/2 Proxies for Cryptojacking Communications in Computer and Information Science, 2020, 1208 CCIS : 298 - 308
- [46] Recent progress of HTTP/2 standardization Ohtsu, Shigeki, 1600, Institute of Electronics Information Communication Engineers (97):
- [48] Mitigating HTTP Flooding Attacks with Meta-data Analysis 2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS), 2015, : 1406 - 1411
- [49] Request Smuggling Via HTTP/2 Cleartext in the Wild: Empirical Testing with Differential Fuzzing 2023 11TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: IOT AND SMART CITY, ITIOTSC 2023, 2023, : 203 - 206
- [50] Creation of a DDOS attack using HTTP-GET Flood with the Cyber Kill Chain methodology REVISTA ITECKNE, 2019, 16 (01): : 41 - 47