Maintaining Suspicious Flows using Cache Replacement under Flooding Attacks
碩士 === 國立臺灣科技大學 === 資訊管理系 === 103 === Network monitoring approaches have been popularly applied into networksproposed and developed throughout the years. However, the packet-based approach cannot easily be easily performed in at high-speeds networks, so . Therefore, researchers focusedstarted on inv...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2015
|
Online Access: | http://ndltd.ncl.edu.tw/handle/67987822495899340514 |