Date: 2005-07-01 17:41:22Cyberwarfare Computer security Denial-of-service attack Internet Relay Chat Transmission Control Protocol IP address spoofing SYN flood Traffic flow Packet loss Computer network security Denial-of-service attacks Computing | | 1 D-WARD: A Source-End Defense Against Flooding Denial-of-Service Attacks Jelena Mirkovic, Member, IEEE, and Peter Reiher, Member, IEEEAdd to Reading ListSource URL: www.eecis.udel.eduDownload Document from Source Website File Size: 218,84 KBShare Document on Facebook
|