Login / Signup
Parallel systems under two sequential attacks with imperfect detection of the first attack outcome.
Gregory Levitin
Kjell Hausken
Published in:
J. Oper. Res. Soc. (2012)
Keyphrases
</>
attack detection
distributed denial of service attacks
countermeasures
cyber attacks
malicious attacks
malicious users
computer systems
detection algorithm
detection method
computer security
normal traffic
detect malicious