Related references
Note: Only part of the references are listed.Enhanced resource allocation in mobile edge computing using reinforcement learning based MOACO algorithm for IIOT
S. Vimal et al.
COMPUTER COMMUNICATIONS (2020)
Fast attack detection system using log analysis and attack tree generation
Duhoe Kim et al.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2019)
MTPKM: Multipart Trust Based Public Key Management Technique to Reduce Security Vulnerability in Mobile Ad-Hoc Networks
Y. Harold Robinson et al.
WIRELESS PERSONAL COMMUNICATIONS (2019)
Mitigating attacks in software defined networks
Kallol Krishna Karmakar et al.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2019)
Deployment and validation of out of band IP traceback approach (OBTA) in wireless mesh network
Mouna Gassara et al.
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2018)
HPSIPT: A high-precision single-packet IP traceback scheme
Vijayalakshmi Murugesan et al.
COMPUTER NETWORKS (2018)
FACT: A Framework for Authentication in Cloud-Based IP Traceback
Long Cheng et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)
Denial of service attacks, defences and research challenges
Vinko Zlomislic et al.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2017)
IP traceback with sparsely-tagged fragment marking scheme under massively multiple attack paths
Kichang Kim et al.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2013)
RIHT: A Novel Hybrid IP Traceback Scheme
Ming-Hour Yang et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2012)
A hybrid scheme using packet marking and logging for IP traceback
S. Malliga et al.
INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY (2010)
On the State of IP Spoofing Defense
Toby Ehrenkranz et al.
ACM TRANSACTIONS ON INTERNET TECHNOLOGY (2009)
A more practical approach for single-packet IP traceback using packet logging and marking
Chao Gong et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2008)
On IP traceback
A Belenky et al.
IEEE COMMUNICATIONS MAGAZINE (2003)
IP traceback with deterministic packet marking
A Belenky et al.
IEEE COMMUNICATIONS LETTERS (2003)