Login / Signup
Flooding attacks to internet threat monitors (ITM): Modeling and counter measures using botnet and honeypots
K. Munivara Prasad
A. Rama Mohan Reddy
M. Ganesh Karthik
Published in:
CoRR (2012)
Keyphrases
</>
countermeasures
information security
cyber attacks
security measures
power analysis
email
forensic analysis
databases
information systems
peer to peer