Use of access characteristics to distinguish legitimate user traffic from DDoS attack traffic
Crossref DOI link: https://doi.org/10.1007/s10015-019-00527-z
Published Online: 2019-01-31
Published Print: 2019-09
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Aburada, Kentaro
Arikawa, Yuki
Usuzaki, Shotaro
Yamaba, Hisaaki
Katayama, Tetsuro
Park, Mirang
Okazaki, Naonobu
Text and Data Mining valid from 2019-01-31
Article History
Received: 9 April 2018
Accepted: 10 December 2018
First Online: 31 January 2019