[1] |
Feiyang LIU, Kun LI, Fei SONG, Huachun ZHOU.
Construction of DDoS attacks malicious behavior knowledge base construction
[J]. Telecommunications Science, 2021, 37(11): 17-32.
|
[2] |
Huifang HOU,Xuefang LI,Jie PAN,Zhigang DING.
5G carrier network data collection and security management evolution ideas
[J]. Telecommunications Science, 2020, 36(9): 154-159.
|
[3] |
Weiyu JIANG, Bingyang LIU, Chuang WANG.
Network architecture with intrinsic security
[J]. Telecommunications Science, 2019, 35(9): 20-28.
|
[4] |
HE Yusheng.
Research on C&C traffic detection of DDoS BotNet in internet of things
[J]. Telecommunications Science, 2019, 35(6): 96-101.
|
[5] |
Jiaxuan FEI,Tao ZHANG,Yuanyuan MA,Cheng ZHOU.
Efficient detection technology of DDoS attacks based onBF-DT-CUSUM algorithm in smart grid industrial control system
[J]. Telecommunications Science, 2015, 31(Z1): 106-112.
|
[6] |
Mingxin Wang,Huachun Zhou,Jia Chen,Hongke Zhang.
An Entropy Based Anomaly Traffic Detection Approach in SDN
[J]. Telecommunications Science, 2015, 31(9): 83-89.
|
[7] |
Zhiqiang Luo,Jun Shen,Huamin Jin.
Detection and Control Technology of Distributed DNS Reflective DDoS Attack
[J]. Telecommunications Science, 2015, 31(10): 1-196.
|
[8] |
Xiaoyan Hu,Jian Gong.
Exploring the Roles of In-Network Caching in ICN
[J]. Telecommunications Science, 2014, 30(3): 67-74.
|
[9] |
Xi Ye,Wushao Wen,Yiru Ye.
An OTP-Based Mechanism for Defending Application Layer DDoS Attacks
[J]. Telecommunications Science, 2012, 28(10): 88-93.
|
[10] |
Ou Liang,Ruan Ke,Zhu Yongqing and Zou Jie.
Study on Integrated Self-Assignment Technologies in Ultra-Broadband Network
[J]. Telecommunications Science, 2012, 28(1): 17-21.
|
[11] |
Liu Guorong,Liu Dongxin,Shen Jun and Jin Huamin.
Technology Analysis of Abnormal Traffic Detection and Defense in Ultra-Broadband Network
[J]. Telecommunications Science, 2012, 28(1): 22-25.
|
[12] |
Liang Ou,Ke Ruan,Yongqing Zhu,Jie Zou.
Study on Integrated Self-Assignment Technologies in Ultra-Broadband Network
[J]. Telecommunications Science, 2012, 28(1): 21-25.
|
[13] |
Chuan Xu,Cheng Du,Hong Tang.
A Survey of Detection Research on DDoS Attack
[J]. Telecommunications Science, 2011, 27(3): 85-89.
|
[14] |
Song Yang,Zonglin Li.
DDoS Attack Detection Algorithm
[J]. Telecommunications Science, 2010, 26(9): 106-110.
|
[15] |
Chen Zhonghua,Zhang Lianying and Wang Xiaoming.
Research on Detection Methods of CC Attack
[J]. Telecommunications Science, 2009, 25(5): 62-65.
|