Investigation of DDoS Attacks by Hybrid Simulation. Bekeneva, Y., Borisenko, K., Shorov, A., & Kotenko, I. V. In Khalil, I., Neuhold, E., Tjoa, A M., Xu, L. D., & You, I., editors, ICT-EurAsia/CONFENIS, volume 9357, of Lecture Notes in Computer Science, pages 179-189, 2015. Springer.
Link
Paper bibtex @inproceedings{conf/ict-eurasia/BekenevaBSK15,
added-at = {2015-09-25T00:00:00.000+0200},
author = {Bekeneva, Yana and Borisenko, Konstantin and Shorov, Andrey and Kotenko, Igor V.},
biburl = {http://www.bibsonomy.org/bibtex/25f8abcb62b3fa3b2636db41b82a96e7c/dblp},
booktitle = {ICT-EurAsia/CONFENIS},
crossref = {conf/ict-eurasia/2015},
editor = {Khalil, Ismail and Neuhold, Erich and Tjoa, A Min and Xu, Li Da and You, Ilsun},
ee = {http://dx.doi.org/10.1007/978-3-319-24315-3_18},
interhash = {6d2e064ca66131afb6abfbcdaacdb297},
intrahash = {5f8abcb62b3fa3b2636db41b82a96e7c},
isbn = {978-3-319-24314-6},
keywords = {dblp},
pages = {179-189},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
timestamp = {2015-09-26T11:34:07.000+0200},
title = {Investigation of DDoS Attacks by Hybrid Simulation.},
url = {http://dblp.uni-trier.de/db/conf/ict-eurasia/ict-eurasia2015.html#BekenevaBSK15},
volume = 9357,
year = 2015
}
Downloads: 0
{"_id":"sw7vthy2ZrY7RNMQZ","bibbaseid":"bekeneva-borisenko-shorov-kotenko-investigationofddosattacksbyhybridsimulation-2015","downloads":0,"creationDate":"2016-01-22T05:24:53.262Z","title":"Investigation of DDoS Attacks by Hybrid Simulation.","author_short":["Bekeneva, Y.","Borisenko, K.","Shorov, A.","Kotenko, I. V."],"year":2015,"bibtype":"inproceedings","biburl":"http://www.bibsonomy.org/bib/author/Igor Sokolov?items=1000","bibdata":{"bibtype":"inproceedings","type":"inproceedings","added-at":"2015-09-25T00:00:00.000+0200","author":[{"propositions":[],"lastnames":["Bekeneva"],"firstnames":["Yana"],"suffixes":[]},{"propositions":[],"lastnames":["Borisenko"],"firstnames":["Konstantin"],"suffixes":[]},{"propositions":[],"lastnames":["Shorov"],"firstnames":["Andrey"],"suffixes":[]},{"propositions":[],"lastnames":["Kotenko"],"firstnames":["Igor","V."],"suffixes":[]}],"biburl":"http://www.bibsonomy.org/bibtex/25f8abcb62b3fa3b2636db41b82a96e7c/dblp","booktitle":"ICT-EurAsia/CONFENIS","crossref":"conf/ict-eurasia/2015","editor":[{"propositions":[],"lastnames":["Khalil"],"firstnames":["Ismail"],"suffixes":[]},{"propositions":[],"lastnames":["Neuhold"],"firstnames":["Erich"],"suffixes":[]},{"propositions":[],"lastnames":["Tjoa"],"firstnames":["A","Min"],"suffixes":[]},{"propositions":[],"lastnames":["Xu"],"firstnames":["Li","Da"],"suffixes":[]},{"propositions":[],"lastnames":["You"],"firstnames":["Ilsun"],"suffixes":[]}],"ee":"http://dx.doi.org/10.1007/978-3-319-24315-3_18","interhash":"6d2e064ca66131afb6abfbcdaacdb297","intrahash":"5f8abcb62b3fa3b2636db41b82a96e7c","isbn":"978-3-319-24314-6","keywords":"dblp","pages":"179-189","publisher":"Springer","series":"Lecture Notes in Computer Science","timestamp":"2015-09-26T11:34:07.000+0200","title":"Investigation of DDoS Attacks by Hybrid Simulation.","url":"http://dblp.uni-trier.de/db/conf/ict-eurasia/ict-eurasia2015.html#BekenevaBSK15","volume":"9357","year":"2015","bibtex":"@inproceedings{conf/ict-eurasia/BekenevaBSK15,\n added-at = {2015-09-25T00:00:00.000+0200},\n author = {Bekeneva, Yana and Borisenko, Konstantin and Shorov, Andrey and Kotenko, Igor V.},\n biburl = {http://www.bibsonomy.org/bibtex/25f8abcb62b3fa3b2636db41b82a96e7c/dblp},\n booktitle = {ICT-EurAsia/CONFENIS},\n crossref = {conf/ict-eurasia/2015},\n editor = {Khalil, Ismail and Neuhold, Erich and Tjoa, A Min and Xu, Li Da and You, Ilsun},\n ee = {http://dx.doi.org/10.1007/978-3-319-24315-3_18},\n interhash = {6d2e064ca66131afb6abfbcdaacdb297},\n intrahash = {5f8abcb62b3fa3b2636db41b82a96e7c},\n isbn = {978-3-319-24314-6},\n keywords = {dblp},\n pages = {179-189},\n publisher = {Springer},\n series = {Lecture Notes in Computer Science},\n timestamp = {2015-09-26T11:34:07.000+0200},\n title = {Investigation of DDoS Attacks by Hybrid Simulation.},\n url = {http://dblp.uni-trier.de/db/conf/ict-eurasia/ict-eurasia2015.html#BekenevaBSK15},\n volume = 9357,\n year = 2015\n}\n\n","author_short":["Bekeneva, Y.","Borisenko, K.","Shorov, A.","Kotenko, I. V."],"editor_short":["Khalil, I.","Neuhold, E.","Tjoa, A M.","Xu, L. D.","You, I."],"key":"conf/ict-eurasia/BekenevaBSK15","id":"conf/ict-eurasia/BekenevaBSK15","bibbaseid":"bekeneva-borisenko-shorov-kotenko-investigationofddosattacksbyhybridsimulation-2015","role":"author","urls":{"Link":"http://dx.doi.org/10.1007/978-3-319-24315-3_18","Paper":"http://dblp.uni-trier.de/db/conf/ict-eurasia/ict-eurasia2015.html#BekenevaBSK15"},"keyword":["dblp"],"downloads":0},"search_terms":["investigation","ddos","attacks","hybrid","simulation","bekeneva","borisenko","shorov","kotenko"],"keywords":["dblp"],"authorIDs":[],"dataSources":["h2zaCTy5Y74MDBFyN"]}