Login / Signup
A Proposal for Cyber-Attack Trace-Back Using Packet Marking and Logging.
Pengfei Li
Yaokai Feng
Junpei Kawamoto
Kouichi Sakurai
Published in:
IMIS (2016)
Keyphrases
</>
cyber attacks
cyber security
cyber defense
attack detection
security policies
intrusion detection system
countermeasures
critical infrastructure
intrusion detection
dos attacks
security mechanisms
privacy issues