Computer Science
Attack Model
33%
Attack Traffic
66%
Attackers
33%
Botnets
100%
Congestion Control
33%
Control Mechanism
33%
Detection Algorithm
33%
Emerging Threat
33%
Legitimate Traffic
33%
Network Protocols
66%
Spoofing
33%
Voice over Internet Protocol (VoIP)
33%
Keyphrases
Attack Detection System
11%
Attack Mitigation
11%
Attack Model
11%
Attack Rate
11%
Attack Traffic
22%
Attacker
11%
Botnet
33%
Communication Protocol
22%
Congestion Control Algorithm
11%
DDoS Attack
11%
DDoS Detection
22%
Differentiation Method
100%
Emerging Threats
11%
Evade
11%
Human Users
11%
IP Address
11%
IP Address Spoofing
11%
Low-rate DoS Attack
100%
Practical Attack
11%
Router
11%
VoIP Traffic
11%
World Wide Web
44%