Login / Signup

Optimizing the Pulsing Denial-of-Service Attacks.

Xiapu LuoRocky K. C. Chang
Published in: DSN (2005)
Keyphrases
  • denial of service attacks
  • dos attacks
  • security threats
  • intrusion detection system
  • ddos attacks
  • end hosts
  • database
  • intrusion detection