Login / Signup
Identifying DOS and DDOS Attack Origin: IP Traceback Methods Comparison and Evaluation for IoT.
Brian Cusack
Zhuang Tian
Ar Kar Kyaw
Published in:
InterIoT/SaSeIoT (2016)
Keyphrases
</>
ddos attacks
application layer
information systems
management system
data mining techniques
service providers
ip address