Login / Signup
Tracing Technique for Blaster Attack
S. Siti Rahayu
Y. Robiah
S. Shahrin
M. A. Faizal
M. Mohd Zaki
R. Irda
Published in:
CoRR (2009)
Keyphrases
</>
countermeasures
computer vision
database
artificial intelligence
secret key
dos attacks
denial of service attacks
attack detection
malicious users
data corruption
key exchange protocol