[1]
S. Rao T, H. G, K. V, and H. Kumar K, “Dos flooding attack control in information-centric networks”, IJET, vol. 7, no. 1.1, pp. 303–305, Dec. 2017, doi: 10.14419/ijet.v7i1.1.9708.