Login / Signup
Attack.
Mounita Saha
Dipanwita Roy Chowdhury
Published in:
ICISS (2006)
Keyphrases
</>
countermeasures
malicious users
genetic algorithm
artificial neural networks
database
real world
machine learning
artificial intelligence
website
expert systems
web applications
ddos attacks
detection mechanism
digital watermark
attack scenarios