Citation to this article as recorded by
Bahaman, N., A.S. Prabuwono, M.Z. Mas'ud and M.F. Abdollah, 2012. Effectiveness of security tools to anomalies on tunneled traffic. Inform. Technol. J., 11: 191-199. CrossRefDirect Link |
Citation to this article as recorded by
Effectiveness of Security Tools to Anomalies on Tunneled Traffic Information Technology Journal Vol. 11, Issue 2, 191, 2012 |
How to cite this article
S. Behin Sam, S . Sujatha, A . Kannan and P . Vivekanandan, 2006. Network Topology Against Distributed Denial of Service Attacks. Information Technology Journal, 5: 489-493.
DOI: 10.3923/itj.2006.489.493
URL: https://scialert.net/abstract/?doi=itj.2006.489.493
DOI: 10.3923/itj.2006.489.493
URL: https://scialert.net/abstract/?doi=itj.2006.489.493