Login / Signup
Improvements on the WTLS protocol to avoid denial of service attacks.
Ruishan Zhang
Kefei Chen
Published in:
Comput. Secur. (2005)
Keyphrases
</>
denial of service attacks
dos attacks
intrusion detection system
security threats
end hosts
ddos attacks
intrusion detection
distributed systems
network security
databases