共 26 条
[1]
[Anonymous], 1979, Computers and Intractablity: A Guide to the Theoryof NP-Completeness
[2]
[Anonymous], 2000, P 2000 ACM SIGCOMM C
[3]
[Anonymous], 2000, Building Internet Firewalls
[4]
Banga G, 1999, USENIX ASSOCIATION PROCEEDINGS OF THE THIRD SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION (OSDI '99), P45
[5]
BELLOVIN S, 2000, ICMP TRACEBACK MESS
[6]
Burch H, 2000, USENIX ASSOCIATION PROCEEDINGS OF THE FOURTEENTH SYSTEMS ADMINISTRATION CONFERENCE (LISA XIV), P319
[7]
Faloutsos M, 1999, COMP COMM R, V29, P251, DOI 10.1145/316194.316229
[8]
Ferguson Paul, 2000, Network Ingress Filtering: Defeating Denial of Service Attacks Which Employ IP Source Address Spoofing, DOI [10.17487/rfc2827, 10.17487/RFC2827]
[9]
GARBER L, 2000, DENIAL OF SERVICE AT, P12
[10]
GOVINDAN R, 1997, P IEEE INFOCOM 97