Inproceedings,

Identifying the Attack Source by IP Traceback.

, and .
ICT, volume 101 of Communications in Computer and Information Science, page 292-296. Springer, (2010)

Meta data

Tags

Users

  • @dblp

Comments and Reviews