Login / Signup
Evaluating security controls against HTTP-based DDoS attacks.
Dimitrios Moustis
Panayiotis Kotzanikolaou
Published in:
IISA (2013)
Keyphrases
</>
ddos attacks
application layer
dos attacks
website
denial of service attacks
network services
forensic analysis
ip address