Hierarchy of factors of DDOS-attacks typical implementation scenarios. Volume 2

Saved in:
Bibliographic Details
Date:2018
Main Authors: A. B. Kachynskyi, V. M. Tkach, A. A. Podenko
Format: Article
Language:English
Published: 2018
Series:Mathematical modelling in economy
Online Access:http://jnas.nbuv.gov.ua/article/UJRN-0000960055
Tags: Add Tag
No Tags, Be the first to tag this record!
Journal Title:Library portal of National Academy of Sciences of Ukraine | LibNAS

Institution

Library portal of National Academy of Sciences of Ukraine | LibNAS
id open-sciencenbuvgovua-30829
record_format dspace
spelling open-sciencenbuvgovua-308292024-02-27T22:02:45Z Hierarchy of factors of DDOS-attacks typical implementation scenarios. Volume 2 A. B. Kachynskyi V. M. Tkach A. A. Podenko 2409-8876 2018 en Mathematical modelling in economy http://jnas.nbuv.gov.ua/article/UJRN-0000960055 Article
institution Library portal of National Academy of Sciences of Ukraine | LibNAS
collection Open-Science
language English
series Mathematical modelling in economy
spellingShingle Mathematical modelling in economy
A. B. Kachynskyi
V. M. Tkach
A. A. Podenko
Hierarchy of factors of DDOS-attacks typical implementation scenarios. Volume 2
format Article
author A. B. Kachynskyi
V. M. Tkach
A. A. Podenko
author_facet A. B. Kachynskyi
V. M. Tkach
A. A. Podenko
author_sort A. B. Kachynskyi
title Hierarchy of factors of DDOS-attacks typical implementation scenarios. Volume 2
title_short Hierarchy of factors of DDOS-attacks typical implementation scenarios. Volume 2
title_full Hierarchy of factors of DDOS-attacks typical implementation scenarios. Volume 2
title_fullStr Hierarchy of factors of DDOS-attacks typical implementation scenarios. Volume 2
title_full_unstemmed Hierarchy of factors of DDOS-attacks typical implementation scenarios. Volume 2
title_sort hierarchy of factors of ddos-attacks typical implementation scenarios. volume 2
publishDate 2018
url http://jnas.nbuv.gov.ua/article/UJRN-0000960055
work_keys_str_mv AT abkachynskyi hierarchyoffactorsofddosattackstypicalimplementationscenariosvolume2
AT vmtkach hierarchyoffactorsofddosattackstypicalimplementationscenariosvolume2
AT aapodenko hierarchyoffactorsofddosattackstypicalimplementationscenariosvolume2
first_indexed 2025-07-17T16:06:54Z
last_indexed 2025-07-17T16:06:54Z
_version_ 1850414345665642496