Login / Signup
: A scalable system to prevent the DNS water torture attack in 5G-enabled SIoT network.
Lihua Yin
Muyijie Zhu
Wenxin Liu
Xi Luo
Chonghua Wang
Yangyang Li
Published in:
Comput. Commun. (2023)
Keyphrases
</>
network model
network intrusion
massive scale
ddos attacks
attack graphs
network structure
complex networks
network attacks
countermeasures
dos attacks
network management
buffer overflow
denial of service attacks
bayesian networks
computer networks
lightweight
wireless sensor networks