• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

Identifying Legitimate Clients under Distributed Denial-of-Service Attacks.

Steven SimpsonAdam T. LindsayDavid Hutchison
Published in: NSS (2010)
Keyphrases
  • email
  • neural network
  • social networks
  • web services
  • software architecture
  • data sets
  • mobile phone
  • client server
  • central server
  • distributed denial of service attacks