Login / Signup
DDoS Attack Mitigation Based on Traffic Scheduling in Edge Computing- Enabled TWDM-PON.
Yajie Li
Yingqi Zhao
Jun Li
Xiaosong Yu
Yongli Zhao
Jie Zhang
Published in:
IEEE Access (2021)
Keyphrases
</>
ddos attacks
dos attacks
denial of service attacks
network layer
application layer
distributed denial of service
flow control
network services
scheduling problem
defense mechanisms
scheduling algorithm
edge detection
ip address
resource constraints
risk management
network traffic
normal traffic
privacy preserving