Login / Signup
IP traceback through (authenticated) deterministic flow marking: an empirical evaluation.
Vahid Aghaei Foroushani
A. Nur Zincir-Heywood
Published in:
EURASIP J. Inf. Secur. (2013)
Keyphrases
</>
flow patterns
key exchange protocol
flow field
neural network
empirical evaluation
black box
information flow
application layer
fluid flow
wireless access networks
finite state automaton
relaxation algorithm
randomized algorithms
ip address
ddos attacks
website
computer vision
search engine