لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
A.M. Lonea, D.E. Popescu and H. Tianfield, "Detecting DDoS Attacks ...
C. Douligeri and A. Mitrokotsa, "DDoS attacks and defense mechanisms: ...
C. K. H. K.-S. T. Mou Cheng, "Use of Spectral ...
D. Moore, C. Shannon, D. Brown, G. Voelker and S ...
E. Cole, Hackers Beware, David Dwyer, _ ...
F. Lee and S. Shieh, "Defending against spoofed DDoS attacks ...
G. Zhang and M. Parashar, "Cooperative defence against DDoS attacks, ...
H. Wang, C. Jin and K., Shin, "Defense against spoofed ...
H. Wang, C. Jin and K., Shin, "Defense against spoofed ...
J. Mirkovic, J. Martin and P Reiher, "A taxonomy of ...
J. Mirkovic, P. Reiher and D-WARD, "a source-end defense against ...
J. Mosla, "Mitigating denial of service attacks, " Journal of ...
K. Park and H. Lee, "On the effectiveness of route-based ...
K. Lakshmin arayanan, D. Adkins, A. Perrig and I. Stoi, ...
_ Garber, "Demial-of- service attacks rip the internet, " IEEE ...
L. Chen, T.A. Longstaff and K.M. Carley, _ Charac terization ...
R. Boorks, "Denial of Service Attack Detection Techniques, " Computing, ...
R. Mahajan, S.M. Bellovin and . Floyd, "Controlling high bandwidth ...
R. , P. S. , J. D. Jhaveri, "DoS Attacks ...
S. Savage, D. Wetherall, A.R. Karlin and T.E Anderso, "Network ...
Trends in Denial of Service Attack Technology, usa, 2001. ...
T. Peng, C. Leckie and K. Ramamohan _ , "Survey ...
Upma Goyal, Gayatri Bhatti and Sandeep, " A Dual mechanism ...
WanchunDon a, Qi Chena and JinjunChenb, " A confidence-bas ed ...
_ T. L. Ling, Adaptive Response System for Distributed Denial ...
نمایش کامل مراجع