Login / Signup
Computers under attack.
Harold Joseph Highland
Published in:
Comput. Secur. (1991)
Keyphrases
</>
computer systems
computer technology
ddos attacks
turing test
web services
network traffic
personal computer
human beings
real time
data sets
lightweight
computer programs
dos attacks
detection mechanism
attack graph
key exchange protocol