Login / Signup

Assessing the vulnerability of replicated network services.

George Dean BissiasBrian Neil LevineRamesh K. Sitaraman
Published in: CoNEXT (2010)
Keyphrases
  • network services
  • application level
  • agent technology
  • network resources
  • telecommunication networks
  • mobile technologies
  • mobile networks
  • computing environments
  • ddos attacks
  • intelligent agents