Login / Signup
Defending against flooding-based distributed denial-of-service attacks: a tutorial.
Rocky K. C. Chang
Published in:
IEEE Commun. Mag. (2002)
Keyphrases
</>
distributed denial of service attacks
database
ddos attacks
neighboring nodes
real time
data sets
learning algorithm
search engine
information systems
association rules
operating system
denial of service attacks