參考文獻:
[1]Cisco visual networking index: global mobile data traffic forecast update 2013-2017 [R/OL]. [2009-11-17].
[2]XYLOMENOS G, VERVERIDIS C, SIRIS V, et al. A survey of informationcentric networking research[J]. IEEE Communications Surveys and Tutorials, 2014, 16(2): 1024-1049.
[3]CHAABANE A, CRISTOFARO E D, KAAFAR M A, et al. Privacy in contentoriented networking: threats and countermeasures [J]. ACM SIGCOMM Computer Communication Review, 2013, 43(3): 25-33.
[4]LAUINGER T. Security and scalability of contentcentric networking [D]. Darmstadt: Technische Universitt Darmstadt, 2010.
[5]AFANASYEV A, MAHADEVAN P, MOISEENKO I, et al. Interest flooding attack and countermeasures in named data networking [C]// Proceedings of the 2013 IFIP Networking Conference. Piscataway: IEEE, 2013: 1-9.
[6]KIM Y, YEOM I. Performance analysis of innetwork caching for contentcentric networking [J]. Computer Networks, 2013, 57(13): 2465-2482.
[7]CONTI M, GASTI P, TEOLI M. A lightweight mechanism for detection of cache pollution attacks in named data networking [J]. Computer Networks, 2013, 57(16): 3178-3191.
[8]PARK H, WIDJAJA I, LEE H. Detection of cache pollution attacks using randomness checks [C]// Proceedings of the 2012 IEEE International Conference on Communications. Piscataway: IEEE, 2012: 1096-1100.
[9]XIE M, WIDJAJA I, WANG H. Enhancing cache robustness for contentcentric networking [C]// 2012 Proceedings IEEE INFOCOM. Piscataway: IEEE, 2012: 2426-2434.