Login / Signup
Design and Verification of a Security Policy to Defense DDoS Attack for Cloud Robot.
Boyi Liu
Xiangyan Tang
Jieren Cheng
Jiquan Chen
Published in:
ICCCS (2) (2018)
Keyphrases
</>
security policies
network security
ddos attacks
dos attacks
information technology
access control
lightweight
software architecture
data center
security requirements
network services