Release Time:2022-10-09 Hits:
Date of Publication: 2022-10-05
Journal: IASTED International Conference on Modelling, Identification and Control, MIC 2014
Page Number: 95-98
ISSN: 1025-8973
Prev One:An adaptive method for source-end detection of pulsing DoS attacks
Next One:A Probabilistic Drop Scheme for Mitigating SYN Flooding Attacks