![]() |
Volumn 6, Issue 2, 2002, Pages 20-26
|
Tracing network attacks to their sources
a a |
Author keywords
[No Author keywords available]
|
Indexed keywords
INTERNET CONTROL MESSAGE PROTOCOL;
INTERNET KEY EXCHANGE;
INTERNET PROTOCOL;
INTRUSION DETECTION SYSTEMS;
ALGORITHMS;
COMPUTER SYSTEM FIREWALLS;
DATA COMMUNICATION SYSTEMS;
INTERNET;
NETWORK PROTOCOLS;
PACKET NETWORKS;
PATTERN MATCHING;
ROUTERS;
TELECOMMUNICATION TRAFFIC;
WEB BROWSERS;
SECURITY OF DATA;
|
EID: 0036329754
PISSN: 10897801
EISSN: None
Source Type: Journal
DOI: 10.1109/4236.991439 Document Type: Article |
Times cited : (83)
|
References (9)
|