Login / Signup
Defence mechanisms evaluation against RA flood attacks for Linux-victim node.
Samad S. Kolahi
Bashar Barmada
Keysha Mudaliar
Published in:
APSIPA (2017)
Keyphrases
</>
open source
operating system
malicious attacks
security mechanisms
cooperative
terrorist attacks
databases
database systems
source code
database applications
computer networks
evaluation method
evaluation model
black hole
malicious users
defense mechanisms