Login / Signup

A Comparative Analysis of Various Deployment Based DDoS Defense Schemes.

Karanbir SinghNavdeep KaurDeepa Nehra
Published in: QSHINE (2013)
Keyphrases
  • ddos attacks
  • network security
  • case study
  • denial of service attacks
  • real time
  • similarity measure
  • bayesian networks
  • relational databases
  • access control
  • intrusion detection
  • advanced research projects agency