Login / Signup
Defending against spoofed DDoS attacks with path fingerprint.
Fu-Yuan Lee
Shiuh-Pyng Shieh
Published in:
Comput. Secur. (2005)
Keyphrases
</>
ddos attacks
application layer
dos attacks
network services
denial of service attacks
forensic analysis
distributed denial of service
control system
fingerprint images
ip address