Login / Signup

An effective DDoS attack mitigation strategy for IoT using an optimization-based adaptive security model.

Saurav KumarAjit Kumar Keshri
Published in: Knowl. Based Syst. (2024)
Keyphrases
  • security model
  • ddos attacks
  • security requirements
  • access control
  • security analysis
  • information technology