How to Avoid the N-1 Attack Without Costly Implementations
International Journal of Network Security & Its Applications
doi 10.5121/ijnsa.2012.4407
Full Text
Open PDFAbstract
Available in full text
Date
July 31, 2012
Authors
Publisher
Academy and Industry Research Collaboration Center (AIRCC)