Login / Signup
An Effective Traceback Network Attack Procedure for Source Address Verification.
Sudhakar Balraj
Kavisankar Leelasankar
Ayyasamy Ayyanar
Yesudhas Harold Robinson
Raghvendra Kumar
Hoang Viet Long
Le Hoang Son
Published in:
Wirel. Pers. Commun. (2021)
Keyphrases
</>
ddos attacks
dos attacks
detection mechanism
model checking
network structure
neural network
network model
peer to peer
community structure
computer networks
network resources
formal verification
high quality
data sets
denial of service attacks
attack graph
attack graphs