| 1 |
Petr Dzurenda, Zdenek Martinasek, “Lukas MalinaNetwork Protection Against DDoS Attacks”,International Journal of Advances in Telecommunications, Electrotechnics, Signals and Systems, Vol. 4, No. 1 (2015) |
미소장 |
| 2 |
Yeon-ho Lee, Beom-Jae Kim, Nam-Yong Lee, Jong-Bae Kim, “The framework to develop main criteria for a DDoS correspondence”, Journal of Digital Contents Society Vol. 11 No. 1 ,pp. 79-89 (2010) |
미소장 |
| 3 |
D.DeepthiRani,T.V.SaiKrishna,G.Dayanandam, Dr.T.V.Rao, "TCP Syn Flood Attack detection Prevention", IJCTT Vol.4 Issue 10 (2013) |
미소장 |
| 4 |
Mitko Bogdanoski ,"Analysis of the SYN Flood Dos Attack", I.J. Computer Network Information Security DOI: 10.5815/ijcnis. August (2013) |
미소장 |
| 5 |
The effect of backlog queue and load-building processing in a multi-echelon inventory network  |
미소장 |
| 6 |
Keun-Heui Kim, Young-Mo Kang,Mi-Ran Han, Jong-Bae Kim ,”A Study on the Dos Prevention System for SPT-based Sync Flooding Protection",IJSIA Vol.9, No.12, pp.57-66 (2015) |
미소장 |
| 7 |
Choehongjin ,“Distributed Denial of Service attacks and countermeasures Status”,Korea Information Assurance Society, pp. 6-17, http://www.earticle.net/article.aspx?sn=169108 (2008) |
미소장 |
| 8 |
Lee, Joonbok, “A Comparative Legal Study for the prevention of 7.7 DDoS(Distributed Denial of Service) case”, Korean Studies Information Service System (KISS), ISSN:229~254, pp.26 (2010) |
미소장 |
| 9 |
TCP with header checksum option for wireless links: An analytical approach towards performance evaluation  |
미소장 |
| 10 |
A taxonomy of DDoS attack and DDoS defense mechanisms  |
미소장 |
| 11 |
Bellaiche, Martine, Gregoire, Jean-Charles "Avoiding DDoS with active management of backlog queues", 5th International Conference on Network and System Security, pp310-315 (2011) |
미소장 |