Login / Signup
A Comparative Analysis of Various Deployment Based DDoS Defense Schemes.
Karanbir Singh
Navdeep Kaur
Deepa Nehra
Published in:
QSHINE (2013)
Keyphrases
</>
ddos attacks
network security
case study
denial of service attacks
real time
similarity measure
bayesian networks
relational databases
access control
intrusion detection
advanced research projects agency