Login / Signup

Identifying Legitimate Clients under Distributed Denial-of-Service Attacks.

Steven SimpsonAdam T. LindsayDavid Hutchison
Published in: NSS (2010)
Keyphrases
  • email
  • neural network
  • social networks
  • web services
  • software architecture
  • data sets
  • mobile phone
  • client server
  • central server
  • distributed denial of service attacks