Search by keyword: "hash addressing method"
Comparative analysis of methods of searching signatures of computer attacks in the dictionary of symbols
Authors: Cheredanova E.M., Pechkurova I.R., Pechkurova V.R., Mamchenko E.A. | Published: 09.08.2018 |
Published in issue: #8(25)/2018 | |
DOI: DOI: 10.18698/2541-8009-2018-8-359 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: signature method, DDoS attack, feature dictionary, iteration, hash-function, sequential method, iterative method, hash addressing method |