Exploiting the Transients of Adaptation for RoQ Attacks on Internet Resources.
Mina GuirguisAzer BestavrosIbrahim MattaPublished in: ICNP (2004)
Keyphrases
- resource management
- resource sharing
- security mechanisms
- countermeasures
- information services
- limited resources
- resource allocation
- computer networks
- multi channel
- web resources
- information providers
- identity theft
- case based reasoning
- communication channels
- information resources
- access control
- sharing information
- search engine