共 50 条
- [31] Space-time encoding scheme for DDoS attack traceback GLOBECOM '05: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6: DISCOVERY PAST AND FUTURE, 2005, : 1842 - 1846
- [32] Reflector attack traceback system with pushback based iTrace mechanism INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2004, 3269 : 236 - 248
- [34] Internet attack traceback - Cross-Validation and pebble tracing 2008 IEEE CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY, VOLS 1 AND 2, 2008, : 378 - 383
- [35] Tracking Attack Sources based on Traceback Honeypot for ICS Network 2017 56TH ANNUAL CONFERENCE OF THE SOCIETY OF INSTRUMENT AND CONTROL ENGINEERS OF JAPAN (SICE), 2017, : 717 - 723
- [36] Accurate ICMP traceback model under DoS/DDoS attack ADCOM 2007: PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATIONS, 2007, : 441 - +
- [37] An Effective Traceback Network Attack Procedure for Source Address Verification Wireless Personal Communications, 2021, 118 : 1675 - 1696
- [38] Hybrid Multilayer Network Traceback to the Real Sources of Attack Devices IEEE ACCESS, 2020, 8 : 201087 - 201097
- [40] ISP and egress path selection for multihomed networks 25TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-7, PROCEEDINGS IEEE INFOCOM 2006, 2006, : 2314 - 2325