Login / Signup
Using a History-based Profile to Detect and Respond to DDoS Attacks.
Negar Mosharraf
Anura P. Jayasumana
Indrakshi Ray
Published in:
SECRYPT (2017)
Keyphrases
</>
ddos attacks
application layer
network services
normal traffic
user profiles
dos attacks
denial of service attacks
information technology
forensic analysis