Citation to this article as recorded by
Bahaman, N., A.S. Prabuwono, M.Z. Mas'ud and M.F. Abdollah, 2012. Effectiveness of security tools to anomalies on tunneled traffic. Inform. Technol. J., 11: 191-199. CrossRefDirect Link |
Rasheed, M.M., O. Ghazali and R. Budiarto, 2012. Fast detection of stealth and slow scanning worms in transmission control protocol. J. Applied Sci., 12: 2156-2163. CrossRefDirect Link |
Citation to this article as recorded by
Effectiveness of Security Tools to Anomalies on Tunneled Traffic Information Technology Journal Vol. 11, Issue 2, 191, 2012 |
How to cite this article
S. Meenakshi and S.K. Srivatsa, 2007. A Distributed Framework with less False Positive Ratio Against Distributed Denial of Service Attack. Information Technology Journal, 6: 1139-1145.
DOI: 10.3923/itj.2007.1139.1145
URL: https://scialert.net/abstract/?doi=itj.2007.1139.1145
DOI: 10.3923/itj.2007.1139.1145
URL: https://scialert.net/abstract/?doi=itj.2007.1139.1145