Login / Signup
Towards Defeating the Crossfire Attack using SDN.
Dimitrios Gkounis
Vasileios Kotronis
Xenofontas A. Dimitropoulos
Published in:
CoRR (2014)
Keyphrases
</>
countermeasures
formal specification
data sets
genetic algorithm
information retrieval
social networks
website
case study
multistage
detection mechanism
security risks
power analysis
attack detection
malicious users