Login / Signup
An effective DDoS attack mitigation strategy for IoT using an optimization-based adaptive security model.
Saurav Kumar
Ajit Kumar Keshri
Published in:
Knowl. Based Syst. (2024)
Keyphrases
</>
security model
ddos attacks
security requirements
access control
security analysis
information technology