Login / Signup
Using proof-of-work to mitigate spoofing-based denial of service attacks.
Samuel DeLaughter
Karen R. Sollins
Published in:
StudentWorkshop@CoNEXT (2021)
Keyphrases
</>
denial of service attacks
ddos attacks
dos attacks
intrusion detection system
security threats
databases
security issues
end hosts
intrusion detection
end to end
database
real time
anomaly detection
lightweight
network traffic
network security