Please use this identifier to cite or link to this item: http://idr.nitk.ac.in/jspui/handle/123456789/13840
Full metadata record
DC FieldValueLanguage
dc.contributor.authorNagesh H.R.
dc.contributor.authorSekaran K.C.
dc.date.accessioned2020-03-31T14:15:26Z-
dc.date.available2020-03-31T14:15:26Z-
dc.date.issued2010
dc.identifier.citationSelected Topics in Communication Networks and Distributed Systems, 2010, Vol., pp.731-752en_US
dc.identifier.uri10.1142/9789812839442_0025
dc.identifier.urihttp://idr.nitk.ac.in/jspui/handle/123456789/13840-
dc.description.abstractThe enormous growth of the Internet has had a huge impact on users' daily lives, providing us with a wealth of information easily and conveniently.At the same time, this accessibility has made the Internet an easy target for users who wish to disrupt the flow of information or exploit the Web for personal gain. Those who compromise the flow of information or access information in an unauthorized manner are called attackers.Many tools are now available for attackers to test the vulnerability of Internet. © 2010 by World Scientific Publishing Co. Pte. Ltd. All Rights Reserved.en_US
dc.titleProactive models for mitigating internet denial-of-service/distributed denial-of-service attacksen_US
dc.typeBook Chapteren_US
Appears in Collections:3. Book Chapters

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.