Login / Signup

Evaluation of TFTP DDoS amplification attack.

Boris SieklikRichard MacfarlaneWilliam J. Buchanan
Published in: Comput. Secur. (2016)
Keyphrases
  • denial of service attacks
  • ddos attacks
  • evaluation method
  • countermeasures
  • database
  • evaluation criteria
  • evaluation model
  • comparative evaluation
  • databases
  • clustering algorithm
  • xml retrieval