Login / Signup
Emulating AQM from end hosts.
Sumitha Bhandarkar
A. L. Narasimha Reddy
Yueping Zhang
Dmitri Loguinov
Published in:
SIGCOMM (2007)
Keyphrases
</>
end hosts
network security
denial of service attacks
intrusion detection
ip addresses
computer networks
intrusion detection system
dos attacks
traffic analysis
campus network
data mining
information security
node failures
computer systems
traffic data