Login / Signup

Using inherent command and control vulnerabilities to halt DDoS attacks.

Lanier A. WatkinsKurt SilberbergJose Andre MoralesWilliam H. Robinson
Published in: MALWARE (2015)
Keyphrases
  • command and control
  • ddos attacks
  • situation awareness
  • dos attacks
  • information security
  • countermeasures
  • critical infrastructure
  • real time
  • data management
  • computer systems
  • information sharing