Please use this identifier to cite or link to this item:
https://idr.l2.nitk.ac.in/jspui/handle/123456789/13840
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Nagesh H.R. | |
dc.contributor.author | Sekaran K.C. | |
dc.date.accessioned | 2020-03-31T14:15:26Z | - |
dc.date.available | 2020-03-31T14:15:26Z | - |
dc.date.issued | 2010 | |
dc.identifier.citation | Selected Topics in Communication Networks and Distributed Systems, 2010, Vol., pp.731-752 | en_US |
dc.identifier.uri | 10.1142/9789812839442_0025 | |
dc.identifier.uri | http://idr.nitk.ac.in/jspui/handle/123456789/13840 | - |
dc.description.abstract | The enormous growth of the Internet has had a huge impact on users' daily lives, providing us with a wealth of information easily and conveniently.At the same time, this accessibility has made the Internet an easy target for users who wish to disrupt the flow of information or exploit the Web for personal gain. Those who compromise the flow of information or access information in an unauthorized manner are called attackers.Many tools are now available for attackers to test the vulnerability of Internet. © 2010 by World Scientific Publishing Co. Pte. Ltd. All Rights Reserved. | en_US |
dc.title | Proactive models for mitigating internet denial-of-service/distributed denial-of-service attacks | en_US |
dc.type | Book Chapter | en_US |
Appears in Collections: | 3. Book Chapters |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.