Author:
Sarla Pushpalatha,Jamalpur Bhavana,Chandhar K.
Reference25 articles.
1. Comptia. What is a ddos attack and how does it work? https://www.comptia.org/content/guides/what-is-addos-attack-how-it-works.
2. Khamooshi, G. P. (2019). The benefits of using web-based applications. https://www.geeks.ltd.uk/insights/the-benefits-ofusing-web-based-applications.
3. Hacking Incidents, 2018. https://en.wikipedia.org/wiki/List_of_security_hacking_incidents. Accessed February 15, 2018.
4. Transformation of DDoS attacks in Global warefare, 2018. https://qz.com/860630/ddos-attacks-have-gonefrom-a-minor-nuisance-to-a-possible-new-form-of-global-warfare/. Accessed January 1, 2018.
5. T. Subbulakshmi et al., ‟A Unified Approach for Detection and Prevention of DDoS Attacks Using Enhanced Support Vector Machine and Filtering Mechanisms‟, ICTACT Journal on CommunicationTechnology, June 2013.