Login / Signup
Revisiting inter-AS IP spoofing let the protection drive source address validation.
YiHao Jia
Ying Liu
Gang Ren
Lin He
Published in:
IPCCC (2017)
Keyphrases
</>
information systems
data sets
data mining
information retrieval
anomaly detection
machine learning
social networks