- 年份
- 2018(1)
- 学科
- 基金
- 2009(1)
- 2009cb320501(1)
- 2014(1)
- 21051(1)
- 320500(1)
- 320501(1)
- 61402257(1)
- 61772307(1)
- 973(1)
- basic(1)
- cb(1)
- china(1)
- determined(1)
- development(1)
- foundation(1)
- grant(1)
- key(1)
- national(1)
- natural(1)
- no.2014z21051(1)
- nos(1)
- nos.2009cb320500(1)
- nos.61772307(1)
- program(1)
- project(1)
- research(1)
- science(1)
- self(1)
- self-determined(1)
- supported(1)
共检索到1条记录
发布时间倒序
- 发布时间倒序
- 相关度优先
文献计量分析
- 结果分析(前20)
- 结果分析(前50)
- 结果分析(前100)
- 结果分析(前200)
- 结果分析(前500)
[期刊] Tsinghua Science and Technology
[作者]
Yihao Jia Ying Liu Gang Ren Lin He
IP source address spoofing is regarded as one of the most prevalent components when launching an anonymous invasion,especially a Distributed Denial-of-Service(DDoS) attack.Although Source Address Validations(SAVs) at the access network level are standardi
文献操作()
导出元数据
文献计量分析
导出文件格式:WXtxt
删除
推荐搜索
An Attribute-Based Encryption Scheme Based on Unrecognizable Trapdoors
Framework to Identify Protein Complexes Based on Similarity Preclustering
Trajectory Planning for Automated Driving Based on Ordinal Optimization
Fast Community Detection Based on Distance Dynamics
Parallel ADR Detection Based on Spark and BCPNN
A Memory-Related Vulnerability Detection Approach Based on Vulnerability Features
Propagation History Ranking in Social Networks:A Causality-Based Approach
Balance Resource Allocation for Spark Jobs Based on Prediction of the Optimal Resource
Cloud Virtual Machine Lifecycle Security Framework Based on Trusted Computing
SinoPedia: An unified Chinese terminology service platform based on Linked Data