Login / Signup
Toward Identifying the Attack Source by Deterministic Packet Marking.
Nirwan Ansari
Published in:
ICETE (Invited Speakers) (2004)
Keyphrases
</>
destination node
data sets
countermeasures
normal traffic
steady state