Back to Search
Start Over
You can run, but you can't hide: an effective methodology to traceback DDoS attackers.
- Source :
- Proceedings 10th IEEE International Symposium on Modeling, Analysis & Simulation of Computer & Telecommunications Systems; 2002, p433-440, 8p
- Publication Year :
- 2002
Details
- Language :
- English
- ISBNs :
- 9780769518404
- Database :
- Complementary Index
- Journal :
- Proceedings 10th IEEE International Symposium on Modeling, Analysis & Simulation of Computer & Telecommunications Systems
- Publication Type :
- Conference
- Accession number :
- 81256927
- Full Text :
- https://doi.org/10.1109/MASCOT.2002.1167105