[1]
G. D. Dhanalakshmi and G. Velmayil, “An Effective Detection of Real Source Attack Using Extended IP Traceback Mechanism”, theijst, vol. 2, no. 12, Nov. 2014.