×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [attack graph]
Hash-Based IP Traceback Best Student Paper ACM SIGCOMM’01
224 views
P REDICTING ZERO - DAY SOFTWARE VULNERABILITIES THROUGH DATA MINING Su Zhang Department of Computing and Information Science Kansas State University 1
213 views
Optimal Allocation of Filters against DDoS Attacks Advisor: Frank, Y.S. Lin Present by C.Y. Hsu 1
221 views
Research in Security and Dependable Computing Shambhu Upadhyaya Computer Science and Engineering University at Buffalo
[email protected]
August 28,
218 views
Optimal Allocation of Filters against DDoS Attacks
44 views
Predicting zero-day software vulnerabilities through data mining
29 views