Login / Signup
Self-similarity based DDoS attack detection using Hurst parameter.
Rup Kumar Deka
Dhruba K. Bhattacharyya
Published in:
Secur. Commun. Networks (2016)
Keyphrases
</>
attack detection
multistage
intrusion detection system
product recommendation
intrusion detection
information systems
attack scenarios
cyber attacks