THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Định dạng | |
---|---|
Số trang | 187 |
Dung lượng | 5,62 MB |
Nội dung
Ngày đăng: 09/04/2019, 00:51
Nguồn tham khảo
Tài liệu tham khảo | Loại | Chi tiết | ||
---|---|---|---|---|
[2] B. H. Bloom, “Space/time trade-offs in hash coding with allowable errors,”Communications of the ACM, vol. 13, no. 7, pp. 422–426, 1970 | Sách, tạp chí |
|
||
[6] M. Ester, H.P. Kriegel, J. Sander and X. Xu, “A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise,” in Proceedings of the 2nd International Conference on Knowledge Discovery and Data Mining, 1996 | Sách, tạp chí |
|
||
[1] E. Y. K. Chan et al., Intrusion Detection Routers: Design, implementation and Evaluation Using an Experimental Testbed, IEEE Journal on Selected Areas in Communications, vol. 24, no. 10, pp. 1889 1900, 2006 | Khác | |||
[3] BASKAR ZIMMERMANN (April 1980): "OSI Reference Model—The ISO Model of Architecture for Open Systems Interconnection" | Khác | |||
[4] J. POSTEL: Transmission Control Protocol: DARPA internet program protocolspecification, RFC 793, September 1981 | Khác | |||
[5] CERT. TCP Syn Flooding and IP Spoofing Attacks. Advisory CA-96.21, September1996 | Khác | |||
[7] M.I. MIT, in Darpa Intrusion Detection Evaluation. Retrieved from LincolnLaboratory:https://ww w . l l . m i t . e du / i d e v a l /da t a /1998da t a . h t m l | Khác | |||
[8] K. A. Bradley, S. Cheung, N. Puketza, B. Mukherjee, and R. A. Olsson, Detecting Disruptive Routers: A Distributed Network Monitoring Approach, in Proc. of the 1998 IEEE Symposium on Security and Privacy, May 1998 | Khác | |||
[9] J. Lo et al., An IRC Tutorial, April, 2003, irchelp.com 1997, [online]h tt p: / /ww w . i r c h e l p . o r g/ i r c h e l p / i r c t ut o r i a l . h t ml #p a r t 1 | Khác | |||
[10] B. Hancock, Trinity v3, a DDoS tool, hits the streets, Computers & Security, Vol | Khác | |||
[11] P. Ferguson, and D. Senie, Network Ingress Filtering: Defeating Denial of ServiceAttacks that employ IP source address spoofing, Internet RFC 2827, 2000 | Khác | |||
[12] LIPPMANN: the 1999 DARPA Off-Line Intrusion Detection Evaluation.Computer | Khác |
TỪ KHÓA LIÊN QUAN
TÀI LIỆU CÙNG NGƯỜI DÙNG
TÀI LIỆU LIÊN QUAN