共 12 条
[1]
[Anonymous], 1987, PROTOTYPE IDES REAL
[2]
E-mail bombs and countermeasures: Cyber attacks on availability and brand integrity
[J].
IEEE NETWORK,
1998, 12 (02)
:10-17
[3]
Bauer D. S., 1988, Proceedings of the Computer Networking Symposium (Cat. No.88CH2547-8), P98, DOI 10.1109/CNS.1988.4983
[5]
Hall D. L., 1992, MATH TECHNIQUES MULT
[6]
Heberlein L. T., 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.90CH2884-5), P296, DOI 10.1109/RISP.1990.63859
[7]
HOCHBERG, 1993, COMPUTERS SECURITY, P235
[9]
SNAPP S, 1991, P IEEE COMPCOM MAR, P170
[10]
Varshney P., 1995, DISTRIBUTED DETECTIO

