Login / Signup
Identifying Legitimate Clients under Distributed Denial-of-Service Attacks.
Steven Simpson
Adam T. Lindsay
David Hutchison
Published in:
NSS (2010)
Keyphrases
</>
email
neural network
social networks
web services
software architecture
data sets
mobile phone
client server
central server
distributed denial of service attacks