《战场》——生存者的游戏
摘要
游戏架构在中古神话世纪,内容述说在黑布列斯这块大陆上,两个国家之间因宗教信仰的不同而引发的战争。
出处
《网络与信息》
2002年第8期86-86,共1页
Network & Information
二级参考文献10
-
1Ferguson P, Senie D. Network ingress filtering: Defeating denial of service attack which employ IP source address spoofing. RFC 2817, 2000
-
2Oliver S, Larry P. Defending against denial of service attacks in scout. In: Proceeding of the 1999 USENIX/ACM Symposium on Operating System Design and Implementation, Monterey, California, USA, 1999. 59~72
-
3Robert Stone. CenterTrack: An IP overlay network for tracking DoS floods. In: Proceedings of 2000 USENIX Security Symposium, Denver, Colorado, USA, 2000.199~212
-
4Burch H, Cheswick B. Tracing anonymous packets to their approximate source. In: Proceedings of 2000 USENIX LISA Conference, Seattle, Washington, USA, 2000.319~327
-
5Sager G. Security fun with OCxmon and cflowd. Presentation at the Internet 2Working Group, 1998
-
6Bellovin S. ICMP traceback messages. Internet Draft: draft-bellovin-itrace-00.txt, Network Working Group Bellovin Internet Draft AT&T Labs, 2000
-
7Dean D, Franklin M, Stubblefield A. An algebraic approach to IP traceback. In: Proceedings of 2001 Network and Distributed System Security Symposium, Sand Diego, California, USA, 2001.3~12
-
8Savage S, Wetherall D. Network support for IP traceback. IEEE/ACM Transactions on Networking, 2001, 9(3):226~237
-
9Song D, Perrig A. Advanced and authenticated marking schemes for IP traceback. In:Proceedings of the IEEE INFOCOM, Anchorage, Alaska USA, 2001,2:878~886
-
10Stoica I, Zhang H. Providing guaranteed services without per flow management. In:Proceedings of the ACM SIGCOMM'99, Cambridge, MA, USA, 1999. 81~94
共引文献8
-
1李冬静,李学宝.基于包头压缩的概率性包标记[J].计算机与现代化,2005(9):89-93.
-
2倪彤光,杨长春,顾晓清.基于概率包标记算法的安全技术研究[J].江苏工业学院学报,2006,18(2):22-25.
-
3顾晓清,倪彤光,刘渊.非强制性包标记算法[J].计算机工程与应用,2007,43(5):140-142. 被引量:1
-
4周曜,徐长江,徐佳,刘凤玉.基于随机包标记方案的IP追踪性能分析[J].计算机科学,2007,34(12):78-81. 被引量:2
-
5周曜,刘耀宗,蒋道霞,刘凤玉.移动IPv6中的攻击源追踪问题研究[J].计算机应用研究,2008,25(3):903-905. 被引量:3
-
6徐劲松.一种改进的路由包标记追踪方案[J].计算机应用,2009,29(5):1316-1320. 被引量:5
-
7吴哲,谢冬青.基于随机包标记的不重复标记追踪模型[J].计算机应用研究,2009,26(12):4744-4746.
-
8田关伟,周德荣.网络入侵后攻击路径标志技术研究与仿真[J].计算机仿真,2014,31(12):292-295. 被引量:5
-
1有钱人.《战场》钱途[J].网迷,2002(12):146-147.
-
2于翔.我的《战场》故事[J].大众电脑,2003(2):124-124.
-
3精彩国战在《战场》[J].软件世界(PC任我行),2003(2):105-106.
-
4Y.Z.《战场》三职业辨析[J].电脑时空,2003(1):125-125.
-
5阿神.《战场》陪伴的日子[J].网络与信息,2002,16(10):77-77.
-
6郎敏.不上《战场》,怎称“悍将”[J].计算机与网络,2003,29(7):4-4.
-
7李乐.为国而战——《战场》[J].电脑爱好者,2002(19):98-98.
-
8战场完全手册之魔法篇[J].网迷,2003(1):64-65.
-
9北京小新.走进《战场》[J].网络与信息,2002,16(11):82-82.
-
10亲亲的说.亲临《战场》国战[J].网络与信息,2002,16(12):78-78.