Article Comments

Contributions from readers on our articles are very welcome. This form will let us retrieve the current data in the database and allows us to consider your comments.

Detect DDoS flooding attacks in mobile ad hoc networks
Yinghua Guo, Sylvie Perreau
International Journal of Security and Networks (IJSN), 2010 Vol.5 No.4, pp.259 - 269
16 + 4 =

Thank you for your feedback.