CORC

浏览/检索结果: 共6条,第1-6条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
Shoot at a pigeon and kill a crow: On strike precision of link flooding attacks 会议论文
作者:  Peng, Jiahao;  Ma, Xiaobo;  Li, Jianfeng;  Xue, Lei;  Hu, Wenjun
收藏  |  浏览/下载:7/0  |  提交时间:2019/11/19
A Probabilistic Drop Scheme for Mitigating SYN Flooding Attacks 会议论文
International Conference on Networks Security, Wireless Communications and Trusted Computing, Wuhan, PEOPLES R CHINA, 2009-04-25
作者:  Ming, Yu
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/24
Network Traffic Analysis using Refined Bayesian Reasoning to Detect Flooding and Fort Scan Attacks 会议论文
作者:  Liu, Dai-ping;  Li, Tao;  Zhang, Ming-wei
收藏  |  浏览/下载:1/0  |  提交时间:2019/12/05
Resisting flooding attacks in ad hoc networks 会议论文
作者:  Yi, P;  Dai, ZL;  Zhong, YP;  Zhang, SY
收藏  |  浏览/下载:1/0  |  提交时间:2019/12/27
An improved algorithm for detecting SYN flooding attacks based on network processor (EI收录) 会议论文
Proceedings - 2010 International Conference on Anti-Counterfeiting, Security and Identification, 2010 ASID, Chengdu, China, July 18, 2010 - July 20, 2010
作者:  Fu, Yuli[1];  Lai, Yune[1]
收藏  |  浏览/下载:0/0  |  提交时间:2019/04/16
Crime  
Shapelets-Based Intrusion Detection for Protection Traffic Flooding Attacks 会议论文
Database Systems for Advanced Applications. DASFAA 2018 International Workshops: BDMS, BDQM, GDMA, and SeCoP, Gold Coast, QLD, Australia, 2018
作者:  Yunbin Kim;  Jaewon Sa;  Sunwook Kim;  Sungju Lee
收藏  |  浏览/下载:0/0  |  提交时间:2019/12/25


©版权所有 ©2017 CSpace - Powered by CSpace