Login / Signup
Mitigation of Unsolicited Traffic across Domains with Host Identities and Puzzles.
Miika Komu
Sasu Tarkoma
Andrey Lukyanenko
Published in:
NordSec (2010)
Keyphrases
</>
network traffic
email
application domains
real world
spam filtering
real time
machine learning
constraint satisfaction
traffic flow
traffic conditions
traffic volume
ip addresses
traffic control
atm networks
traffic accidents
learning algorithm
neural network