Login / Signup
Stellar: network attack mitigation using advanced blackholing.
Christoph Dietzel
Georgios Smaragdakis
Matthias Wichtlhuber
Anja Feldmann
Published in:
CoNEXT (2018)
Keyphrases
</>
ddos attacks
computer networks
network design
attack graph
response time
intrusion detection
network traffic
network management
network intrusion
attack graphs