Login / Signup

Revisiting inter-AS IP spoofing let the protection drive source address validation.

YiHao JiaYing LiuGang RenLin He
Published in: IPCCC (2017)
Keyphrases
  • information systems
  • data sets
  • data mining
  • information retrieval
  • anomaly detection
  • machine learning
  • social networks