Cited By
View all- Lee YBaik NKim CYang C(2018)Study of detection method for spoofed IP against DDoS attacksPersonal and Ubiquitous Computing10.1007/s00779-017-1097-y22:1(35-44)Online publication date: 1-Feb-2018
- Wang LBayhan SOtt JKangasharju JSathiaseelan ACrowcroft JSolis ICarzaniga ARamakrishnan K(2015)Pro-DiluvianProceedings of the 2nd ACM Conference on Information-Centric Networking10.1145/2810156.2810162(9-18)Online publication date: 30-Sep-2015
- Jenq-Shiou Leu Jheng-Huei Chen Kuen-Han Li (2015)Hybrid Search Scheme for Social Networks Supported by Dynamic Weighted Distributed Label ClusteringIEEE Transactions on Computers10.1109/TC.2014.237825464:9(2586-2594)Online publication date: 1-Sep-2015
- Show More Cited By