Login / Signup

An IP Traceback Protocol using a Compressed Hash Table, a Sinkhole Router and Data Mining based on Network Forensics against Network Attacks.

Eun-Hee JeongByung kwan Lee
Published in: Future Gener. Comput. Syst. (2014)
Keyphrases