Sign in

Fundamental Scaling Laws of Covert DDoS Attacks.

Amir Reza RamtinPhilippe NainDaniel Sadoc MenaschéDon TowsleyEdmundo de Souza e Silva
Published in: SIGMETRICS Perform. Evaluation Rev. (2022)
Keyphrases
  • ddos attacks
  • dos attacks
  • application layer
  • information flow
  • denial of service attacks
  • forensic analysis
  • network services
  • network analysis
  • information systems
  • data acquisition
  • distributed denial of service