Login / Signup

Compiling network traffic into rules using soft computing methods for the detection of flooding attacks.

Sanguk NohGihyun JungKyunghee ChoiCheolho Lee
Published in: Appl. Soft Comput. (2008)
Keyphrases