Identifying Legitimate Clients under Distributed Denial-of-Service Attacks | IEEE Conference Publication | IEEE Xplore