Login / Signup

Utilizing bloom filters for detecting flooding attacks against SIP based services.

Dimitris GeneiatakisNikos VrakasCostas Lambrinoudakis
Published in: Comput. Secur. (2009)
Keyphrases