AbstractIn this paper, we describe a new class of highly distributed coordinated attacks and methods used for tracking down their sources.
Search terms:Information Protection, Auditing, Trojan Horses, Distributed Computation, Coordinated Attacks, Distributed Coordinated Attacks |