[1] |
Chenyang GE, Qinrang LIU, Xue PEI, Shuai WEI, Zhengbin ZHU.
Efficient collaborative defense scheme against distributed denial of service attacks in software defined network
[J]. Journal of Computer Applications, 2023, 43(8): 2477-2485.
|
[2] |
Yingzhi LI, Man LI, Ping DONG, Huachun ZHOU.
Multi‑type application‑layer DDoS attack detection method based on integrated learning
[J]. Journal of Computer Applications, 2022, 42(12): 3775-3784.
|
[3] |
WANG Bo, REN Yingqi, HUANG Dongyan.
H-Algorand:public blockchain consensus mechanism based on multi-block output
[J]. Journal of Computer Applications, 2020, 40(7): 2150-2154.
|
[4] |
LIU Xiangju, LIU Pengcheng, XU Hui, ZHU Xiaojuan.
Distributed denial of service attack detection method based on software defined Internet of things
[J]. Journal of Computer Applications, 2020, 40(3): 753-759.
|
[5] |
MA Lan, CUI Bohua, LIU Xuan, YUE Meng, WU Zhijun.
Hidden semi-Markov model-based approach to detect DDoS attacks in application layer of SWIM system
[J]. Journal of Computer Applications, 2019, 39(7): 1973-1978.
|
[6] |
WU Ruohao, DONG Ping, ZHENG Tao.
Malicious scanning protection technology based on OpenDayLight
[J]. Journal of Computer Applications, 2018, 38(1): 188-193.
|
[7] |
MA Linjin, WAN Liang, MA Shaoju, YANG Ting, YI Huifan.
Distributed denial of service attack recognition based on bag of words model
[J]. Journal of Computer Applications, 2017, 37(6): 1644-1649.
|
[8] |
HAN Dezhi, CHEN Xuguang, LEI Yuxin, DAI Yongtao, ZHANG Xiao.
Real-time data analysis system based on Spark Streaming and its application
[J]. Journal of Computer Applications, 2017, 37(5): 1263-1269.
|
[9] |
LIU Zeyu, XIA Yang, ZHANG Yilong, REN Yuan.
Application-layer DDoS defense model based on Web behavior trajectory
[J]. Journal of Computer Applications, 2017, 37(1): 128-133.
|
[10] |
LI Fangwei, ZHANG Xinyue, ZHU Jiang, ZHANG Haibo.
Network security situational awareness model based on information fusion
[J]. Journal of Computer Applications, 2015, 35(7): 1882-1887.
|
[11] |
SHEN Xueli, SHEN Jie.
Optimization method of tracing distributed denial of service attacks based on autonomous system and dynamic probabilistic packet-marking
[J]. Journal of Computer Applications, 2015, 35(6): 1705-1709.
|
[12] |
CHENG Jian ZHANG Mingqing LIU Xiaohu FAN Tao.
Distributed intrusion detection model based on artificial immune
[J]. Journal of Computer Applications, 2014, 34(1): 86-89.
|
[13] |
GU Xiaoqing WANG Hongyuan NI Tongguang DING Hui.
Detection of application-layer DDoS attack based on time series analysis
[J]. Journal of Computer Applications, 2013, 33(08): 2228-2231.
|
[14] |
YAN Qiao YAO Xi-yan.
Packet marking algorithm with consistency probability based on router interface
[J]. Journal of Computer Applications, 2012, 32(10): 2757-2760.
|
[15] |
YAN Qiao NING Tu-wen.
Traceback of IPv6 based on deterministic linear network coding
[J]. Journal of Computer Applications, 2011, 31(09): 2352-2355.
|