Login / Signup
Flooding Attacks by Exploiting Persistent Forwarding Loops.
Jianhong Xia
Lixin Gao
Teng Fei
Published in:
Internet Measurement Conference (2005)
Keyphrases
</>
countermeasures
real time
terrorist attacks
overlay network
malicious attacks
social networks
watermarking algorithm
computer security
security risks