Policy Based DDoS Attack Mitigation Methodology
Vol. 43, No. 5, pp. 596-605, May 2016
Abstract
Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.
|
Cite this article
[IEEE Style]
H. J. Kim, D. H. Lee, D. H. Kim, M. K. Ahn, Y. H. Kim, "Policy Based DDoS Attack Mitigation Methodology," Journal of KIISE, JOK, vol. 43, no. 5, pp. 596-605, 2016. DOI: .
[ACM Style]
Hyuk Joon Kim, Dong Hwan Lee, Dong Hwa Kim, Myung Kil Ahn, and Yong Hyun Kim. 2016. Policy Based DDoS Attack Mitigation Methodology. Journal of KIISE, JOK, 43, 5, (2016), 596-605. DOI: .
[KCI Style]
김혁준, 이동환, 김동화, 안명길, 김용현, "정책기반의 분산서비스거부공격 대응방안 연구," 한국정보과학회 논문지, 제43권, 제5호, 596~605쪽, 2016. DOI: .
[Endnote/Zotero/Mendeley (RIS)] Download
[BibTeX] Download
Search

Journal of KIISE
- ISSN : 2383-630X(Print)
- ISSN : 2383-6296(Electronic)
- KCI Accredited Journal
Editorial Office
- Tel. +82-2-588-9240
- Fax. +82-2-521-1352
- E-mail. chwoo@kiise.or.kr