Sign in

Fundamental scaling laws of covert DDoS attacks.

Amir Reza RamtinPhilippe NainDaniel Sadoc MenaschéDon TowsleyEdmundo de Souza e Silva
Published in: Perform. Evaluation (2021)
Keyphrases
  • ddos attacks
  • application layer
  • network services
  • denial of service attacks
  • forensic analysis
  • distributed denial of service
  • information technology
  • information flow
  • dos attacks
  • ip address