Login / Signup
Identifying Application-Layer DDoS Attacks Based on Request Rhythm Matrices.
Huan Lin
Shoufeng Cao
Jiayan Wu
Zhenzhong Cao
Fengyu Wang
Published in:
IEEE Access (2019)
Keyphrases
</>
application layer
ddos attacks
ip address
network layer
end to end
cross layer
transport layer
video streaming
ip addresses