共 50 条
- [42] Lightweight wireless intrusion detection systems against DDoS attack COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 5, 2006, 3984 : 294 - 302
- [43] SYN Flooding Attack Detection Based on Entropy Computing GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 1079 - 1084
- [44] SD-OVS: SYN Flooding Attack Defending Open vSwitch for SDN INFORMATION SECURITY APPLICATIONS, WISA 2016, 2017, 10144 : 29 - 41
- [45] Achieving resist against DHCP man-in-the-middle attack scheme based on key agreement Tongxin Xuebao/Journal on Communications, 2021, 42 (08): : 103 - 110
- [46] Effective Detection and Mitigation of SYN Flooding Attack in SDN ISCIT 2019: PROCEEDINGS OF 2019 19TH INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES (ISCIT), 2019, : 300 - 305
- [47] Analog Man-in-the-Middle Attack Against Link-Based Packet Source Identification MOBIHOC '16: PROCEEDINGS OF THE 17TH ACM INTERNATIONAL SYMPOSIUM ON MOBILE AD HOC NETWORKING AND COMPUTING, 2016, : 331 - 340
- [49] Detecting Man-in-the-Middle Attack in Fog Computing for Social Media CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 69 (01): : 1159 - 1181
- [50] Mitigating Man-In-The-Middle Attack Using Quantum Key Distribution 2023 IEEE LONG ISLAND SYSTEMS, APPLICATIONS AND TECHNOLOGY CONFERENCE, LISAT, 2023,