拒绝服务攻击及防御技术参考文献整理_第1页
拒绝服务攻击及防御技术参考文献整理_第2页
拒绝服务攻击及防御技术参考文献整理_第3页
拒绝服务攻击及防御技术参考文献整理_第4页
拒绝服务攻击及防御技术参考文献整理_第5页
已阅读5页,还剩2页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

拒绝服务攻击及防御技术参考文献整理Gilgor,V.(1983)AnoteontheDenial-of-ServiceProblem.ProceedingsofSymposiumonSecurityandPrivacy(SP,83),Oakland,CA,USA,25-27April,pp.139(149.IEEEComputerSociety,Washington,DC,USA.⑵Morris,R.T.(1985)Aweaknessinthe4.2BSDUnixTCP/IPsoftware.ComputerScienceTechnicalReport117.AT&TBellLabs,MurrayHills,NJ,USA.Shipley,G.(1999)ISSRealSecurepushespastnewerIDSplayers.NetworkComputing,10,95{111.Tuncer,T.andTatar,Y.(2008)DetectionSYN°oodingattacksusingfuzzylogic.ProceedingsofInternationalConferenceonInformationSecurityandAssurance(ISA'08),Washington,DC,USA,24-26April,pp.321{325.IEEEComputerSociety,NewYork,NY,USA.Mirkovic,J.andReiher,P.(2005)D-WARD:Asource-enddefenseagainst°oodingdenial-of-serviceattacks.IEEETransactionsonDependableandSecureComputing,2,216{232.Asosheh,A.,Dr.andRamezani,N.(2008)AcomprehensivetaxonomyofDDoSattacksanddefensemechanismapplyinginasmartclassi"cation.WSEASTransactionsonComputers,7,281{290.Mirkovic,J.,Dietrich,S.,Dittrich,D.,andReiher,P.(2004)InternetDenialofServiceAttackandDefenseMechanisms,1stedition.PrenticeHallPTR,NewJersey,USA.Paxson,V.(2001)Ananalysisofusingre°ectorsfordistributeddenial-of-serviceattacks.ACMSIGCOMMComputerCommunicationReview,31,38{47.Moore,D.,Paxson,V.,Savage,S.,Shannon,C.,Staniford,S.,andWeaver,N.(2003)Insidetheslammerworm.IEEESecurityandPrivacy,1,33{39.Hemenway,K.andCalishain,T.(2003)SpideringHacks.O'Reilly&Associates,Inc.,Sebastopol,CA,USA.Goucher,W.(2009)Thetippingpoint.ComputerFraud&Security,1,11{13.Lesk,M.(2007)Thenewfrontline:Estoniaundercyberassault.IEEESecurityandPrivacy,5,76{79.Jalili,R.,Imani-Mehr,F.,Amini,M.,andShahriari,H.-R.(2005)Detectionofdistributeddenialofserviceattacksusingstatisticalpre-processorandunsupervisedneuralnetworks.LectureNotesinComputerScience,3439,192{203.Gavrilis,D.andDermatas,E.(2005)Real-timedetectionofdistributeddenial-of-serviceattacksusingRBFnetworksandstatisticalfeatures.ComputerNetworksandISDNSystems,48,235{245.Gavrilis,D.,Tsoulos,I.,andDermatas,E.(2004)Featureselectionforrobustdetectionofdistributeddenial-of-serviceattacksusinggeneticalgorithms.LectureNotesinArti~cialIntelligence,3025,276{281.Ng,W.,Chan,A.,Yeung,D.,andTsang,E.(2006)ConstructionofhighprecisionRBFNNwithlowfalsealarmfordetecting°oodingbaseddenialofserviceattacksusingstochasticsensitivitymeasure.LectureNotesinArti~cialIntelligence,3930,851{860.Chan,A.,Ng,W.,D.S,Yeung,andTsang,E.(2005)Multipleclassi"ersystemwithfeaturegroupingforintrusiondetection:Mutualinformationapproach.LectureNotesinArti~cialIntelligence,3683,141{148.Chan,A.,Yeung,D.,Tsang,E.,andNg,W.(2006)EmpiricalstudyonfusionmethodsusingensembleofRBFNNfornetworkintrusiondetection.LectureNotesinArti~cialIntelligence,3930,682{690.Giacinto,G.,Roli,F.,andDidaci,L.(2003)Fusionofmultipleclassi"ersforintrusiondetectionincomputernetworks.PatternRecognitionLetters,24,1795{1803.Mukkamala,S.,Sung,A.H.,andAbraham,A.(2005)Intrusiondetectionusinganensembleofintelligentparadigms.JournalofNetworkandComputerApplications,28,167{182.Noh,S.,Lee,C.,Choi,K.,andJung,G.(2003)Detectingdistributeddenialofservice(DDoS)attacksthroughinductivelearning.LectureNotesinComputerScience,2690,286{295.Oke,G.andLoukas,G.(2007)Adenialofservicedetectorbasedonmaximumlikelihooddetectionandtherandomneuralnetwork.ComputerJournal,50,717{727.Kim,M.,Na,H.,Chae,K.,Bang,H.,andNa,J.(2004)AcombineddataminingapproachforDDoSattackdetection.LectureNotesinComputerScience,3090,943{950.Siaterlis,C.andMaglaris,B.(2004)TowardsmultisensordatafusionforDoSdetection.ProceedingsofsymposiumonAppliedcomputing(SAC'04),Nicosia,Cyprus,14-17March,pp.439{446.ACM,NewYork,NY,USA.He,H.,Luo,X.,andLiu,B.(2005)Detectinganomalousnetworktra±cwithcombinedfuzzy-basedapproaches.LectureNotesinComputerScience,3645,433{442.Lee,S.,Kim,Y.,Lee,B.,Kang,S.,andYoun,C.(2005)Aprobedetectionmodelusingtheanalysisofthefuzzycognitivemaps.LectureNotesinComputerScience,3480,320{328.Wei,W.,Dong,Y.,Lu,D.,andJin,G.(2006)Combiningcross-correlationandfuzzyclassi"cationtodetectdistributeddenial-of-serviceattacks.LectureNotesinComputerScience,3994,57{64.Mukkamala,S.andSung,A.H.(2004)Computationalintelligenttechniquesfordetectingdenialofserviceattacks.ProceedingsofconferenceonInnovationsinAppliedArti~cialIntelligence(IEA/AIE'04),Ottawa,Canada,17-20May,pp.616{624.SpringerVerlag,Berlin,Germany.Sung,A.andMukkamala,S.(2004)Thefeatureselectionandintrusiondetectionproblems.LectureNotesinComputerScience,3321,468{482.Mukkamala,S.,Xu,D.,andSung,A.(2006)Intrusiondetectionbasedonbehaviourminingandmachinelearningtechniques.LectureNotesinArti~cialIntelligence,4031,619{628.Uhlig,S.andBonaventure,O.(2001)Understandingthelong-termself-similarityofinternettra±c.LectureNotesinComputerScience,2156,286{298.Xiang,Y.,Lin,Y.,Lei,W.,andHuang,S.(2004)DetectingDDOSattackbasedonnetworkself-similarity.IEEProceedingsCommunications,151,292{295.Feinstein,L.,Schnackenberg,D.,Balupari,R.,andKindred,D.(2003)StatisticalapproachestoDDoSattackdetectionandresponse.ProceedingsofInformationSurvivabilityConferenceandExposition(DISCEX-III),Washington,DC,22-24April,pp.303{314.DARPA,Arlington,VA,USA.Li,M.,Chi,C.-H.,andLong,D.(2004)Fractionalgaussiannoise:Atoolforcharacterizingtra±cfordetectionpurpose.LectureNotesinComputerScience,3309,94{103.Li,M.(2004)AnapproachtoreliablyidentifyingsignsofDDOS°oodattacksbasedonLRDtra±cpatternrecognition.ComputersandSecurity,23,549{558.Tsybakov,B.andGeorganas,N.(1998)Self-similarprocessesincommunicationsnetworks.IEEETransactionsonInformationTheory,44,1713{1725.Wang,H.,Zhang,D.,andShin,K.(2002)DetectingSYN°oodingattacks.ProceedingsofINFOCOM'02,NewYork,NY,USA,23-27June,pp.1530{1539.IEEECommunicationsSociety,NewYork,NY,USA.Siris,V.andPapagalou,F.(2004)Applicationofanomalydetectionalgorithmsfordetectingsyn°oodingattacks.ProceedingsofGLOBECOM'04,Dallas,TX,USA,29November-3December,pp.2050{2054.Leu,F.andYang,W.(2005)IntrusiondetectionwithCUSUMforTCP-basedDDoS.LectureNotesinComputerScience,3823,1255{1264.Gu,R.,Yan,P.,Zou,T.,andGuo,C.(2005)Anautomaticandgenericearly-birdsystemforinternetbackbonebasedontra±canomalydetection.LectureNotesinComputerScience,3420,740{748.Kulkarni,A.andBush,S.(2006)Detectingdistributeddenialofserviceattacksusingkolmogorovcomplexitymetrics.JournalofNetworkandSystemsManagement,14(1),69{80.Furuya,F.,Matsuzaki,T.,andMatsuura,K.(2005)DetectionofunknownDoSattacksbyKolmogorov-complexity°uctuation.LectureNotesinComputerScience,3822,395{406.Lee,K.,Kim,J.,Kwon,K.H.,Han,Y.,andKim,S.(2008)DDoSattackdetectionmethodusingclusteranalysis.ExpertSystemswithApplications,34,1659{1665.Li,L.andLee,G.(2005)DDoSattackdetectionandwavelets.TelecommunicationSystems,28(3),435{451.Yang,X.,Liu,Y.,Zeng,M.,andShi,Y.(2004)AnovelDDoSattackdetectingalgorithmbasedonthecontinu-ouswavelettransform.ProceedingsofAdvancedWork-shoponContentComputing(AWCC,04),ZhenJiang,JiangSu,China,15-17November,pp.173{181.Lu,W.andGhorbani,A.A.(2009)Networkanomalydetectionbasedonwaveletanalysis.EURASIPJournalOnAdvancesInSignalProcessing,2009,1{16.Kim,S.S.andReddy,A.L.N.(2008)Statisticaltechniquesfordetectingtra±canomaliesthroughpacketheaderdata.IEEE/ACMTransactionsonNetworking,16,562{575.Peng,T.,Leckie,C.,andRamamohanarao,K.(2003)Detectingdistributeddenialofserviceattacksbysharingdistributedbelief.LectureNotesinComputerScience,2727,214{225.Cetnarowicz,K.andRojek,G.(2004)Behaviorbaseddetectionofunfavourableresource.LectureNotesinComputerScience,3038,607{614.Seo,H.S.andCho,T.H.(2002)Modelingandsimulationfordetectingadistributeddenialofserviceattack.ProceedingsofAustralianJointConferenceonArti~cialIntelligence(AI'02),16-21September.Gelenbe,E.(1993)Learningintherecurrentrandomneuralnetwork.NeuralComputation,5,154{164.Hussain,A.,Heidemann,J.,andPapadopoulos,C.(2003)Aframeworkforclassifyingdenialofser-viceattacks.ProceedingsofconferenceonAppli-cations,technologies,architectures,andprotocolsforcomputercommunications(SIGCOMM'03),Karlsruhe,Germany,25-29August,pp.99{110.ACM,NewYork,NY,USA.Gelenbe,E.,Lent,R.,andNunez,A.(2004)Self-awarenetworksandQoS.ProceedingsoftheIEEE,92,1478{1489.Jing,S.,Wang,H.,andShin,K.(2003)Hop-count"lteringane®ectivedefenseagainstspoofedtra±c.ProceedingsofInternationalConferenceonComputerandCommunicationsSecurity(CCS'03),Washington,DC,USA,27-30October,pp.30{41.ACM,NewYork,NY,USA.Kim,Y.,Lau,W.,Chuah,M.,andChao,H.(2006)PacketScore:Astatistics-basedpacket"lteringschemeagainstdistributeddenial-of-serviceattacks.IEEETransactionsonDependableandSecureComputing,3(2),141(155.Ayres,P.,Sun,H.,Chao,H.,andLau,W.(2006)ALPi:aDDoSdefencesystemforhigh-speednetworks.IEEEJournalofSelectedAreasinCommunications,24(10),1864(1876.Sisalem,D.,Kuthan,J.,andEhlert,S.(2006)Denialofserviceattackstargetingasipvoipinfrastructure:attackscenariosandpreventionmechanisms.IEEENetwork,20,26{31.Jung,J.,Krishnamurthy,B.,andRabinovich,M.(2002)Flashcrowdsanddenialofserviceattacks:characterizationandimplicationsforCDNsandwebsites.ProceedingsofconferenceonWorldWideWeb(WWW'02),Honolulu,Hawaii,USA,7-11May,pp.553{561.ACM,NewYork,NY,USA.Morein,W.G.,Stavrou,A.,Cook,D.L.,Keromytis,A.D.,Misra,V.,andRubenstein,D.(2003)UsinggraphicturingteststocounterautomatedDDoSattacksagainstwebservers.ProceedingsofConferenceonComputerandCommunicationsSecurity(CCS'03),Washington,DC,USA,27-30October,pp.8{19.ACM,NewYork,NY,USA.Kandula,S.,Katabi,D.,Jacob,M.,andBerger,A.(2005)Botz-4-sale:survivingorganizedDDoSattacksthatmimic°ashcrowds.ProceedingsofSymposiumonNetworkedSystemsDesign&Implementation(NDSI'05),Houston,TX,USA,4-6April,pp.287{300.USENIXAssociation,Berkeley,CA,USA.Mori,G.andMalik,J.(2003)Recognizingobjectsinadversarialclutter-breakingavisualcaptcha.ProceedingsofConferenceonComputerVisionandPatternRecognition(CVPR'03),Madison,Wisconsin,USA,16-22June,pp.134{141.Gao,Z.andAnsari,N.(2006)Di®erentiatingmaliciousDDoSattacktra±cfromnormalTCP°owsbyproactivetests.CommunicationLetters,10(11),793{795.Thomas,R.,Mark,B.,Johnson,T.,andCroall,J.(2003)Netbouncer:client-legitimacy-basedhigh-performanceDDoS"ltering.ProceedingsofInformationSurvivabilityConferenceandExposition(DISCEX-III),Washington,DC,USA,22-24April,pp.14{25.DARPA,Arlington,VA,USA.Juels,A.andBrainard,J.(1999)Clientpuzzles:Acryptographiccountermeasureagainstconnectiondepletionattacks.ProceedingsofNetworkandDistributedSystemSecuritySymposium(NDSS'99),SanDiego,CA,USA,February,pp.151{165.TheInternetSociety,Washington,DC,USA.Aura,T.,Nikander,P.,andLeiwo,J.(2001)DOS-resistantauthenticationwithclientpuzzles.LectureNotesinComputerScience,2133,170{177.Wang,X.andReiter,M.K.(2003)Defendingagainstdenial-of-serviceattackswithpuzzleauctions.ProceedingsofSymposiumonSecurityandPrivacy(SP'03),Washington,DC,USA,pp.78{92.IEEEComputerSociety,NewYork,NY,USA.Wang,X.andReiter,M.K.(2008)Amulti-layerframeworkforpuzzle-baseddenial-of-servicedefense.InternationalJournalofInformationSecurity,7,243{263.Khattab,S.,Gobriel,S.,Melhem,R.,andMosse,D.(2008)Livebaitingforservice-leveldosattackers.ProceedingsofINFOCOM,08,Dublin,Ireland,13-19April,pp.171{175.IEEECommunicationsSociety,NewYork,NY,USA.Dobson,S.,Denazis,S.,Fernandez,A.,Gaiti,D.,Gelenbe,E.,Massacri,F.,Nixon,P.,Sa®re,F.,Schmidt,N.,andZambonelli,F.(2006)Asurveyofautonomiccommunications.ACMTrans.Auton.Adapt.Syst.,1,223(259.Mahajan,R.,Bellovin,S.M.,Floyd,S.,Ioannidis,J.,Paxson,V.,andShenker,S.(2002)Controllinghighbandwidthaggregatesinthenetwork.ACMSIGCOMMComputerCommunicationReview,32,62{73.Ioannidis,J.andBellovin,S.(2002)Implementingpushback:Router-baseddefenseagainstDDoSattacks.ProceedingsofNetworkandDistributedSystemSecuritySymposium(NDSS'02),SanDiego,California,USA,6-8February,pp.1{12.TheInternetSociety,Washing-ton,DC,USA.Keromytis,A.D.,Misra,V.,andRubenstein,D.(2002)SOS:secureoverlayservices.Proceedingsofconfer-enceonApplications,technologies,architectures,andprotocolsforcomputercommunicationsSIGCOMM'02,Pittsburgh,Pennsylvania,USA,19-23August,pp.61{72.ACM,NewYork,NY,USA.Andersen,D.(2004)Mayday:DistributedDoS"lteringforinternetservices.ACMSIGCOMMComputerCommunicationReview,34,39{44.Mankins,D.,Krishnan,R.,Boyd,C.,Zao,J.,andFrentz,M.(2001)Mitigatingdistributeddenialofserviceattackswithdynamicresourcepricing.ProceedingsofAnnualComputerSecurityApplicationsConference(ACSAC'01),Washington,DC,USA,10-14December,pp.411{421.IEEEComputerSociety,NewYork,NY,USA.Garg,A.andReddy,A.N.(2004)MitigationofDoSattacksthroughqosregulation.MicroprocessorsandMicrosystems,28,521{530.Brustoloni,J.(2002)Protectingelectroniccommercefromdistributeddenial-of-serviceattacks.ProceedingsofconferenceonWorldWideWeb(WWW'02),Honolulu,Hawaii,USA,7-11May,pp.553{561.ACM,NewYork,NY,USA.Khattab,S.,Sangpachatanaruk,C.,Znati,T.,Melhern,R.,andMosse,D.(2003)Proactiveserverroamingformitigatingdenial-of-serviceattacks.ProceedingsofConferenceonInformationTechnologyResearchandEducation(ITRE'03),10-13August,pp.1{5.Khattab,S.,Sangpachatanaruk,C.,Moss,D.,Melhem,R.,andZnati,T.(2004)Roaminghoneypotsformitigatingservice-leveldenial-of-serviceattacks.ProceedingsofInternationalConferenceonDistributedComputingSystems(ICDCS'04),Washington,DC,USA,pp.328{337.IEEEComputerSociety,NewYork,NY,USA.Mirkovic,J.,Reiher,P.,andRobinson,M.(2003)FormingallianceforDDoSdefense.ProceedingsofNewSecurityParadigmsWorkshop,CentroStefanoFrancini,Ascona,Switzerland.Papadopoulos,C.,Lindell,R.,Mehringer,J.,Hussain,A.,andGovindan,R.(2003)COSSACK:Coordinatedsuppressionofsimultaneousattacks.ProceedingsofInformationSurvivabilityConferenceandExposition(DISCEX-III),Washington,DC,USA,22-24April,pp.2{13.DARPA,Arlington,VA,USA.Kuzmanovic,A.andKnightly,E.W.(2006)Low-ratetcp-targeteddenialofserviceattacksandcounterstrategies.IEEE/ACMTransactionsonNetworking,14,683{696.Shevtekar,A.,Anantharam,K.,andAnsari,N.(2005)Low-rateTCPdenial-of-serviceattackdetectionatedgerouters.IEEECommunicationsLetters,9,363{365.Sarat,S.andTerzis,A.(2005)Onthee®ectofrouterbu®ersizesonlow-ratedenialofserviceattacks.ProceedingsofInternationalConferenceonComputerCommunicationsandNetworks(ICCCN,05),SanDiego,California,17-19October.IEEEComputerSociety,Washington,DC,USA.Chen,Y.andHwang,K.(2006)Collaborativedetectionand-IteringofshrewDDoSattacksusingspectralanalysis.JournalofParallelandDistributedComputing,66,1137(1151.Ranjan,S.,Swaminathan,R.,Uysal,M.,Nucci,A.,andKnightly,E.(2009)DDoS-shield:DDoS-resilientschedulingtocounterapplicationlayerattacks.IEEE/ACMTransactionsonNetworking,17,26{39.Gelenbe,E.(2005)Usersandservicesinintelligentnetworks.LectureNotesinComputerScience,3837,30{45.Gelenbe,E.,Lent,R.,andXu,Z.(2001)Measurementandperformanceofacognitivepacketnetwork.JournalofComputerNetworks,37,691{701.Sakellari,G.(2009)Thecognitivepacketnetwork:Asurvey.TheComputerJournal:SpecialIssueonRandomNeuralNetworks,toappear.Gelenbe,E.,Lent,R.,Montuori,A.,andXu,乙(2002)Cognitivepacketnetworks:Qosandperformance.ProceedingsoftheIEEEInternationalSymposiumonModelling,AnalysisandSimulationofComputerandTelecommunicationSystems(MASCOTS'02),Ft.Worth,TX,USA,October,pp.3{12.IEEE,NewYork,NY,USA.Sakellari,G.andGelenbe,E.(2009)Adaptiveresilienceofthecognitivepacketnetworkthepresenceofnetworkworms.ProceedingsoftheNATOSymposiumonC3IforCrisis,EmergencyandConsequenceManagement,Bucharest,Romania,11-12May.NATOResearch&TechnologyOrganisation.Sakellari,G.,Gelenbe,E.,andD'Arienzo,M.(2008)AdmissionofQoSawareusersasmartnetwork.ACMTransactionsonAutonomousandAdaptiveSystems,,3,4:1{28.Sakellari,G.andGelenbe,E.(2008)Amultiplecrite-ria,measurement-basedadmissioncontrolmechanismforself-awarenetworks.ProceedingsofthethirdInter-nationalConferenceonCommunicationsandNetwork-ingChina(CHINACOM'08),Hangzhou,China,25-27August,pp.1060{1064.IEEE,NewYork,NY,USA.Gelenbe,E.,Gellman,M.andLoukas,G.(2004)Defendingnetworksagainstdenialofserviceattacks.ProceedingsofConferenceonOptics/PhotonicsinSecurityandDefence(SPIE'04),London,UK,25October,vol.5611,pp.233{243.SPIE,BellinghamWA,USA.Gelenbe,E.,Gellman,M.andLoukas,G.(2005)AnAutonomicApproachtoDenialofServiceDefence.ProceedingsofWoWMoMWorkshoponAutonomicCommunicationsandComputing(WoW-MoM/ACC'05),Taormina,Italy,13-16June,pp.537{541.IEEEComputerSociety,NewYork,NY,USA.Gelenbe,E.andLoukas,G.(2007)Self-awareapproachtodenialofservicedefence.ComputerNetworks,51(5),1299{1314.Ferguson,P.andSenie,D.(2000)Networkingress"ltering:DefeatingdenialofserviceattackswhichemployIPsourceaddressspoo"ng.RFC2827.InternetEngineeringTaskForce,USA.Savage,S.,Wetherall,D.,Karlin,A.,andAnderson,T.(2000)PracticalnetworksupportforIPtraceback.ProceedingsofconferenceonApplications,Technolo-gies,Architectures,andProtocolsforComputerCom-munication(SIGCOMM'00),Stockholm,Sweden,28August-1September,pp.295{306.ACM,NewYork,NY,USA.Song,D.andPerrig,A.(2001)AdvancedandauthenticatedmarkingschemesforIPtraceback.ProceedingsofINFOCOM,01,Anchorage,Alaska,USA,22-26April,pp.878(886.IEEECommunicationsSociety,NewYork,NY,USA.Snoeren,A.C.(2001)Hash-basedIPtraceback.Pro-ceedingsofconferenceonApplications,technologies,architectures,andprotocolsforcomputercommunica-tions(SIGCOMM'01),SanDiego,California,UnitedStates,27-31August,pp.3{14.ACM,NewYork,NY,USA.Dean,D.,Franklin,M.,andStubble"eld,A.(2002)AnalgebraicapproachtoIPtraceback.ACMTransactionsonInformationandSystemSecurity,5,119{137.Snoeren,A.C.,Partridge,C.,Sanchez,L.A.,Jones,C.E.,Tchakountio,F.,Schwartz,B.,Kent,S.T.,andStrayer,W.T.(2002)Single-packetIPtraceback.IEEE/ACMTransactionsonNetworking,10,721{734.Sung,M.andXu,J.(2002)IPtraceback-basedintelligentpacket"ltering:AnoveltechniquefordefendingagainstinternetDDoSattacks.ProceedingsofInternationalConferenceonNetworkProtocols(ICNP'02),Paris,France,12-15November,pp.302{311.IEEEComputerSociety,Washington,DC,USA.Aljifri,H.(2003)IPtraceback:Anewdenial-of-servicedeterrent?IEEESecurityandPrivacy,1,24{31.Burch,H.(2000)Tracinganonymouspacketstotheirapproximatesource.ProceedingsofconferenceonSystemadministration(LISA'00),NewOrlean

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论