共 50 条
- [43] Spanning tree search model to traceback DDoS attack using netflow SAM'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, VOLS 1 AND 2, 2003, : 330 - 333
- [44] Improved technique of IP address fragmentation strategies for DoS attack traceback COMPUTER SCIENCE - THEORY AND APPLICATIONS, 2006, 3967 : 427 - 437
- [45] The Traceback Method about DoS Attack in Open Grid Computing Environment FGCN: PROCEEDINGS OF THE 2008 SECOND INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION AND NETWORKING, VOLS 1 AND 2, 2008, : 389 - +
- [46] Identification of the Real Source of DDOS Attack by FDPM in IP Traceback System UKSIM-AMSS EIGHTH EUROPEAN MODELLING SYMPOSIUM ON COMPUTER MODELLING AND SIMULATION (EMS 2014), 2014, : 392 - 396
- [47] Analysis of Cyber Attack Traceback Techniques from the Perspective of Network Forensics Ruan Jian Xue Bao/Journal of Software, 2021, 32 (01): : 194 - 217
- [48] TOPO: A topology-aware single packet attack traceback scheme 2006 SECURECOMM AND WORKSHOPS, 2006, : 269 - +
- [49] Traceback-based Bloomfilter IPS in Defending SYN flooding attack 2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4589 - 4594
- [50] Detection of Wormhole Attack and Secure Path Selection in Wireless Sensor Network Wireless Personal Communications, 2020, 114 : 329 - 345