个性化文献订阅>期刊> IEEE Transactions on Computers
 

Localization Attacks to Internet Threat Monitors: Modeling and Countermeasures

  作者 Yu, W; Zhang, N; Fu, XW; Bettati, R; Zhao, W  
  选自 期刊  IEEE Transactions on Computers;  卷期  2010年59-12;  页码  1655-1668  
  关联知识点  
 

[摘要]Internet Threat Monitoring (ITM) systems are a widely deployed facility to detect, analyze, and characterize dangerous Internet threats such as worms and distributed denial-of-service (DDoS) attacks. Nonetheless, an ITM system can also become the target o

 
      被申请数(0)  
 

[全文传递流程]

一般上传文献全文的时限在1个工作日内