Login / Signup
Optimizing the Pulsing Denial-of-Service Attacks.
Xiapu Luo
Rocky K. C. Chang
Published in:
DSN (2005)
Keyphrases
</>
denial of service attacks
dos attacks
security threats
intrusion detection system
ddos attacks
end hosts
database
intrusion detection