Login / Signup
Protection system against overload and distributed denial of service attacks.
Ervin Tóth
Zoltán Hornák
Gergely Tóth
Published in:
Int. J. Crit. Comput. Based Syst. (2010)
Keyphrases
</>
distributed denial of service attacks
protection scheme
denial of service attacks
information security
privacy protection
data sets
data mining
response time
low cost
data protection