Login / Signup
Using inherent command and control vulnerabilities to halt DDoS attacks.
Lanier A. Watkins
Kurt Silberberg
Jose Andre Morales
William H. Robinson
Published in:
MALWARE (2015)
Keyphrases
</>
command and control
ddos attacks
situation awareness
dos attacks
information security
countermeasures
critical infrastructure
real time
data management
computer systems
information sharing