Login / Signup
Modelling and simulations for DDoS attacks mitigation in identifier-locator split network.
Ying Liu
Yang Sun Lee
Hongke Zhang
Tin Yu Wu
Chi-Hsiang Lo
Published in:
Int. J. Comput. Math. (2013)
Keyphrases
</>
ddos attacks
network services
application layer
denial of service attacks
network topologies
forensic analysis
dos attacks
network layer
computer networks
network management
distributed denial of service
network structure
complex networks
ip addresses
information systems
peer to peer