4.3 Article

Countermeasures against large-scale reflection DDoS attacks using exploit IoT devices

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Hardware & Architecture

QoS Prediction for Service Recommendation with Deep Feature Learning in Edge Computing Environment

Yuyu Yin et al.

MOBILE NETWORKS & APPLICATIONS (2020)

Article Automation & Control Systems

Dynamical Resource Allocation in Edge for Trustable Internet-of-Things Systems: A Reinforcement Learning Method

Shuiguang Deng et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Article Computer Science, Information Systems

An intelligent data gathering schema with data fusion supported for mobile sink in wireless sensor networks

Jin Wang et al.

INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2019)

Article Computer Science, Hardware & Architecture

An improved ant colony optimization-based approach with mobile sink for wireless sensor networks

Jin Wang et al.

JOURNAL OF SUPERCOMPUTING (2018)

Article Computer Science, Theory & Methods

Leveraging Content Sensitiveness and User Trustworthiness to Recommend Fine-Grained Privacy Settings for Social Image Sharing

Jun Yu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Computer Science, Information Systems

Dynamic cloud resource management for efficient media applications in mobile computing environments

Gangyong Jia et al.

PERSONAL AND UBIQUITOUS COMPUTING (2018)

Article Computer Science, Theory & Methods

iPrivacy: Image Privacy Protection by Identifying Sensitive Objects via Deep Multi-Task Learning

Jun Yu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Editorial Material Computer Science, Information Systems

Model checking concurrent systems with MSVL

Nan Zhang et al.

SCIENCE CHINA-INFORMATION SCIENCES (2016)

Article Computer Science, Information Systems

Efficient and secure DNS cyber shelter on DDoS attacks

Sunghyuck Hong

JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES (2015)

Article Computer Science, Theory & Methods

Discriminating DDoS Attacks from Flash Crowds Using Flow Correlation Coefficient

Shui Yu et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2012)

Article Metallurgy & Metallurgical Engineering

Influence of Mn content and hot deformation on transformation behavior of C-Mn steels

Li Long et al.

JOURNAL OF IRON AND STEEL RESEARCH INTERNATIONAL (2008)

Article Computer Science, Theory & Methods

Survey of network-based defense mechanisms countering the DoS and DDoS problems

Tao Peng et al.

ACM COMPUTING SURVEYS (2007)

Article Computer Science, Hardware & Architecture

Defense against spoofed IP traffic using hop-count filtering

Haining Wang et al.

IEEE-ACM TRANSACTIONS ON NETWORKING (2007)

Article Engineering, Electrical & Electronic

StackPi: New packet marking and filtering mechanisms for DDoS and IP spoofing defense

Abraham Yaar et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2006)

Article Computer Science, Information Systems

An analysis of using reflectors for distributed denial-of-service attacks

V Paxson

ACM SIGCOMM COMPUTER COMMUNICATION REVIEW (2001)