A graph-based methodology for analyzing IP spoofing attack | IEEE Conference Publication | IEEE Xplore