Hierarchy of factors of DDOS-attacks typical implementation scenarios. Volume 2

Збережено в:
Бібліографічні деталі
Дата:2018
Автори: A. B. Kachynskyi, V. M. Tkach, A. A. Podenko
Формат: Стаття
Мова:English
Опубліковано: 2018
Назва видання:Mathematical modelling in economy
Онлайн доступ:http://jnas.nbuv.gov.ua/article/UJRN-0000960055
Теги: Додати тег
Немає тегів, Будьте першим, хто поставить тег для цього запису!

Репозиторії

Library portal of National Academy of Sciences of Ukraine | LibNAS
id open-sciencenbuvgovua-30829
record_format dspace
spelling open-sciencenbuvgovua-308292024-02-27T22:02:45Z Hierarchy of factors of DDOS-attacks typical implementation scenarios. Volume 2 A. B. Kachynskyi V. M. Tkach A. A. Podenko 2409-8876 2018 en Mathematical modelling in economy http://jnas.nbuv.gov.ua/article/UJRN-0000960055 Article
institution Library portal of National Academy of Sciences of Ukraine | LibNAS
collection Open-Science
language English
series Mathematical modelling in economy
spellingShingle Mathematical modelling in economy
A. B. Kachynskyi
V. M. Tkach
A. A. Podenko
Hierarchy of factors of DDOS-attacks typical implementation scenarios. Volume 2
format Article
author A. B. Kachynskyi
V. M. Tkach
A. A. Podenko
author_facet A. B. Kachynskyi
V. M. Tkach
A. A. Podenko
author_sort A. B. Kachynskyi
title Hierarchy of factors of DDOS-attacks typical implementation scenarios. Volume 2
title_short Hierarchy of factors of DDOS-attacks typical implementation scenarios. Volume 2
title_full Hierarchy of factors of DDOS-attacks typical implementation scenarios. Volume 2
title_fullStr Hierarchy of factors of DDOS-attacks typical implementation scenarios. Volume 2
title_full_unstemmed Hierarchy of factors of DDOS-attacks typical implementation scenarios. Volume 2
title_sort hierarchy of factors of ddos-attacks typical implementation scenarios. volume 2
publishDate 2018
url http://jnas.nbuv.gov.ua/article/UJRN-0000960055
work_keys_str_mv AT abkachynskyi hierarchyoffactorsofddosattackstypicalimplementationscenariosvolume2
AT vmtkach hierarchyoffactorsofddosattackstypicalimplementationscenariosvolume2
AT aapodenko hierarchyoffactorsofddosattackstypicalimplementationscenariosvolume2
first_indexed 2024-03-30T08:32:57Z
last_indexed 2024-03-30T08:32:57Z
_version_ 1796880487629717504