Login / Signup
Hash Based AS Traceback against DoS Attack.
Sharmin Aktar
Abdullah Yasin Nur
Published in:
CommNet (2021)
Keyphrases
</>
dos attacks
ddos attacks
denial of service
denial of service attacks
transitive closure
security vulnerabilities
network security
hash functions
lightweight
index tree
locality sensitive hashing
machine learning
join algorithms
social networks
intrusion detection