Hierarchy of factors of DDOS-attacks typical implementation scenarios. Volume 1

Saved in:
Bibliographic Details
Date:2017
Main Authors: A. B. Kachynskyi, V. M. Tkach, A. A. Podenko
Format: Article
Language:English
Published: 2017
Series:Mathematical modelling in economy
Online Access:http://jnas.nbuv.gov.ua/article/UJRN-0000844038
Tags: Add Tag
No Tags, Be the first to tag this record!
Journal Title:Library portal of National Academy of Sciences of Ukraine | LibNAS

Institution

Library portal of National Academy of Sciences of Ukraine | LibNAS
id open-sciencenbuvgovua-41663
record_format dspace
spelling open-sciencenbuvgovua-416632024-02-29T11:55:24Z Hierarchy of factors of DDOS-attacks typical implementation scenarios. Volume 1 A. B. Kachynskyi V. M. Tkach A. A. Podenko 2409-8876 2017 en Mathematical modelling in economy http://jnas.nbuv.gov.ua/article/UJRN-0000844038 Article
institution Library portal of National Academy of Sciences of Ukraine | LibNAS
collection Open-Science
language English
series Mathematical modelling in economy
spellingShingle Mathematical modelling in economy
A. B. Kachynskyi
V. M. Tkach
A. A. Podenko
Hierarchy of factors of DDOS-attacks typical implementation scenarios. Volume 1
format Article
author A. B. Kachynskyi
V. M. Tkach
A. A. Podenko
author_facet A. B. Kachynskyi
V. M. Tkach
A. A. Podenko
author_sort A. B. Kachynskyi
title Hierarchy of factors of DDOS-attacks typical implementation scenarios. Volume 1
title_short Hierarchy of factors of DDOS-attacks typical implementation scenarios. Volume 1
title_full Hierarchy of factors of DDOS-attacks typical implementation scenarios. Volume 1
title_fullStr Hierarchy of factors of DDOS-attacks typical implementation scenarios. Volume 1
title_full_unstemmed Hierarchy of factors of DDOS-attacks typical implementation scenarios. Volume 1
title_sort hierarchy of factors of ddos-attacks typical implementation scenarios. volume 1
publishDate 2017
url http://jnas.nbuv.gov.ua/article/UJRN-0000844038
work_keys_str_mv AT abkachynskyi hierarchyoffactorsofddosattackstypicalimplementationscenariosvolume1
AT vmtkach hierarchyoffactorsofddosattackstypicalimplementationscenariosvolume1
AT aapodenko hierarchyoffactorsofddosattackstypicalimplementationscenariosvolume1
first_indexed 2025-07-17T19:57:42Z
last_indexed 2025-07-17T19:57:42Z
_version_ 1837925633669201920