Login / Signup

Identifying DOS and DDOS Attack Origin: IP Traceback Methods Comparison and Evaluation for IoT.

Brian CusackZhuang TianAr Kar Kyaw
Published in: InterIoT/SaSeIoT (2016)
Keyphrases
  • ddos attacks
  • application layer
  • information systems
  • management system
  • data mining techniques
  • service providers
  • ip address