相似文献/References:
[1]尚占锋 章登义.DDoS防御机制研究[J].计算机技术与发展,2008,(01):7.
SHANG Zhan-feng,ZHANG Deng-yi.Research of DDoS Defense Mechanism[J].,2008,(12):7.
[2]吴姗姗 李俊.基于移动agent的DDoS攻击协同防范技术研究[J].计算机技术与发展,2006,(04):230.
WU Shan-shan,LI Jun.Cooperative Detection to DDoS Attacks Based on Mobile Agent[J].,2006,(12):230.
[3]罗淇方 钟诚 李智 杨锋 冯艳华.基于合作过滤机制的ICMP回溯DDoS攻击源方法[J].计算机技术与发展,2006,(09):240.
LUO Oi-fang,ZHONG Cheng,LI Zhi,et al.An ICMP Traceback Method of DDoS Attack Source Based on Cooperative Filtering Mechanism[J].,2006,(12):240.
[4]李道全,张玉霞,魏艳婷.无线传感器网络源位置隐私保护路由协议[J].计算机技术与发展,2019,29(07):88.[doi:10. 3969 / j. issn. 1673-629X. 2019. 07. 018]
LI Dao-quan,ZHANG Yu-xia,WEI Yan-ting.A Source-location Privacy Protection Routing Protocol for Wireless Sensor Networks[J].,2019,29(12):88.[doi:10. 3969 / j. issn. 1673-629X. 2019. 07. 018]
[5]赵雪阳,岳延奇,王海晨.基于多资源协同优化的虚拟机整合方法[J].计算机技术与发展,2023,33(04):46.[doi:10. 3969 / j. issn. 1673-629X. 2023. 04. 007]
ZHAO Xue-yang,YUE Yan-qi,WANG Hai-chen.Virtual Machine Consolidation Method Based on Multi-resource Collaborative Optimization[J].,2023,33(12):46.[doi:10. 3969 / j. issn. 1673-629X. 2023. 04. 007]