![Computing / Routing algorithms / Cyberwarfare / Concurrent computing / Denial-of-service attack / Denial-of-service attacks / Internet Relay Chat / Computer network / Multipath routing / Botnet / Routing / Crowds Computing / Routing algorithms / Cyberwarfare / Concurrent computing / Denial-of-service attack / Denial-of-service attacks / Internet Relay Chat / Computer network / Multipath routing / Botnet / Routing / Crowds](https://www.pdfsearch.io/img/f7a8b9c1569b470da281f968de1f2374.jpg) Date: 2016-04-22 11:14:02Computing Routing algorithms Cyberwarfare Concurrent computing Denial-of-service attack Denial-of-service attacks Internet Relay Chat Computer network Multipath routing Botnet Routing Crowds | | On the Interplay of Link-Flooding Attacks and Traffic Engineering Dimitrios Gkounis1 , Vasileios Kotronis2 , Christos Liaskos3 , Xenofontas Dimitropoulos3∗ 1 NEC 2 ETH Zurich, SwitzerlandAdd to Reading ListSource URL: inspire.edu.grDownload Document from Source Website File Size: 629,09 KBShare Document on Facebook
|