Login / Signup
Evaluation of TFTP DDoS amplification attack.
Boris Sieklik
Richard Macfarlane
William J. Buchanan
Published in:
Comput. Secur. (2016)
Keyphrases
</>
denial of service attacks
ddos attacks
evaluation method
countermeasures
database
evaluation criteria
evaluation model
comparative evaluation
databases
clustering algorithm
xml retrieval