Old Web
English
Sign In
Acemap
>
authorDetail
>
Terence K. T. Law
Terence K. T. Law
Real-time computing
Pre-play attack
Graph theory
Application layer DDoS attack
Distributed computing
1
Papers
59
Citations
0.00
KQI
Citation Trend
Filter By
Interval:
1900~2024
1900
2024
Author
Papers (1)
Sort By
Default
Most Recent
Most Early
Most Citation
No data
Journal
Conference
Others
You can run, but you can't hide: an effective statistical methodology to trace back DDoS attackers
2005
IEEE Transactions on Parallel and Distributed Systems
Terence K. T. Law
John C. S. Lui
David K. Y. Yau
Show All
Source
Cite
Save
Citations (59)
1