Login / Signup
Evaluating the Functionality of the Token Filtering Technique in Filtering Denial of Service Packets Using a New Formal Evaluation Model.
Mohammed A. Alhabeeb
Phu Dung Le
Bala Srinivasan
Published in:
ISPA (2011)
Keyphrases
</>
evaluation model
dos attacks
fuzzy theory
bp neural network
network security
evaluation method
neural network
access control
model selection
analytic hierarchy process
fuzzy comprehensive evaluation
artificial immune network
analytical hierarchy process
fuzzy analytic hierarchy process