Found: 2109
Select item for more details and to access through your institution.
AI in the Detection and Prevention of Distributed Denial of Service (DDoS) Attacks.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 10, p. 23
- By:
- Publication type:
- Article
Modelling a Constructive Approach For Predicting Attacks Over IoT Network Environment.
- Published in:
- Journal of Intelligent Systems & Internet of Things, 2025, v. 14, n. 1, p. 102, doi. 10.54216/JISIoT.140108
- By:
- Publication type:
- Article
A Robust Model for Predicting Abnormal Behavior in Vehicular Networks using AdaBoost and Chi-Square.
- Published in:
- Wireless Personal Communications, 2024, v. 138, n. 4, p. 2583, doi. 10.1007/s11277-024-11615-0
- By:
- Publication type:
- Article
A Secure and Fast Handover Authentication Scheme for 5G-Enabled IoT Using Blockchain Technology.
- Published in:
- Wireless Personal Communications, 2024, v. 138, n. 4, p. 2155, doi. 10.1007/s11277-024-11559-5
- By:
- Publication type:
- Article
Securing the Edge: CatBoost Classifier Optimized by the Lyrebird Algorithm to Detect Denial of Service Attacks in Internet of Things-Based Wireless Sensor Networks.
- Published in:
- Future Internet, 2024, v. 16, n. 10, p. 381, doi. 10.3390/fi16100381
- By:
- Publication type:
- Article
Cyber War and Deterrence: Applying a General Theoretical Framework.
- Published in:
- Air & Space Power Journal, 2018, v. 32, n. 2, p. 74
- By:
- Publication type:
- Article
Securing blockchain-based crowdfunding platforms: an integrated graph neural networks and machine learning approach.
- Published in:
- Electronic Commerce Research, 2024, v. 24, n. 1, p. 497, doi. 10.1007/s10660-023-09702-8
- By:
- Publication type:
- Article
How to handle reliability of (software) systems that fulfill critical roles in society?
- Published in:
- Quality & Reliability Engineering International, 2013, v. 29, n. 4, p. 463, doi. 10.1002/qre.1532
- By:
- Publication type:
- Article
Adaptive event‐triggered control and observer design for discrete‐time nonlinear Markov jump systems with DoS attacks using policy iteration‐based adaptive dynamic programming.
- Published in:
- Optimal Control - Applications & Methods, 2024, v. 45, n. 5, p. 2153, doi. 10.1002/oca.3142
- By:
- Publication type:
- Article
An adaptive observer design for denial‐of‐service attack detection in platoon.
- Published in:
- Optimal Control - Applications & Methods, 2023, v. 44, n. 4, p. 2148, doi. 10.1002/oca.2975
- By:
- Publication type:
- Article
Quantized data‐based iterative learning control under denial‐of‐service attacks.
- Published in:
- Optimal Control - Applications & Methods, 2023, v. 44, n. 3, p. 1185, doi. 10.1002/oca.2769
- By:
- Publication type:
- Article
Load frequency predictive control for power systems concerning wind turbine and communication delay.
- Published in:
- Optimal Control - Applications & Methods, 2023, v. 44, n. 1, p. 205, doi. 10.1002/oca.2955
- By:
- Publication type:
- Article
Quantum-Enhanced Representation Learning: A Quanvolutional Autoencoder Approach against DDoS Threats.
- Published in:
- Machine Learning & Knowledge Extraction, 2024, v. 6, n. 2, p. 944, doi. 10.3390/make6020044
- By:
- Publication type:
- Article
命名数据网络中基于重构完全随机森林的兴趣包 泛洪攻击检测方法.
- Published in:
- Journal of South-Central Minzu University (Natural Science Edition), 2024, v. 43, n. 5, p. 637, doi. 10.20056/j.cnki.ZNMDZK.20240509
- By:
- Publication type:
- Article
Black Hole Attack Detection in Wireless Sensor Networks Using Hybrid Optimization Algorithm.
- Published in:
- UHD Journal of Science & Technology, 2024, v. 8, n. 1, p. 142, doi. 10.21928/uhdjst.v8n1y2024.pp142-150
- By:
- Publication type:
- Article
Design and Implementation of Distributed Identity and Access Management Framework for Internet of Things (IoT) Enabled Distribution Automation.
- Published in:
- Tanzania Journal of Science, 2022, v. 48, n. 1, p. 34, doi. 10.4314/tjs.v48i1.4
- By:
- Publication type:
- Article
Resistance Mechanism of Slag-High Belite Sulfate-Aluminate Cement to Sulfate Attack.
- Published in:
- Bulletin of the Chinese Ceramic Society, 2023, v. 42, n. 8, p. 2683
- By:
- Publication type:
- Article
汽车CAN 网络的入侵检测模型及装置研究.
- Published in:
- Experimental Technology & Management, 2022, v. 39, n. 3, p. 126, doi. 10.16791/j.cnki.sjg.2022.03.023
- By:
- Publication type:
- Article
Espace et asservissement dans La route d’Altamont de Gabrielle Roy.
- Published in:
- Cahiers Franco-Canadiens De L'Ouest, 2022, v. 34, n. 1/2, p. 149, doi. 10.7202/1094026ar
- By:
- Publication type:
- Article
Intelligent feature selection using particle swarm optimization algorithm with a decision tree for DDoS attack detection.
- Published in:
- International Journal of Advances in Intelligent Informatics, 2021, v. 7, n. 1, p. 37, doi. 10.26555/ijain.v7i1.553
- By:
- Publication type:
- Article
A novel intelligent approach for detecting DoS flooding attacks in software-defined networks.
- Published in:
- International Journal of Advances in Intelligent Informatics, 2018, v. 4, n. 1, p. 11, doi. 10.26555/ijain.v4i1.138
- By:
- Publication type:
- Article
From PocketQube to Glucose Monitoring – in ’24.
- Published in:
- Infocommunications Journal, 2024, v. 16, n. 1, p. 1
- By:
- Publication type:
- Article
Deep Learning based DDoS Attack Detection in Internet of Things: An Optimized CNN-BiLSTM Architecture with Transfer Learning and Regularization Techniques.
- Published in:
- Infocommunications Journal, 2024, v. 16, n. 1, p. 2, doi. 10.36244/ICJ.2024.1.1
- By:
- Publication type:
- Article
Detection strategies for post-pandemic DDoS profiles.
- Published in:
- Infocommunications Journal, 2023, v. 15, n. 4, p. 26, doi. 10.36244/ICJ.2023.4.4
- By:
- Publication type:
- Article
ДОСЛІДЖЕННЯ АСПЕКТУ ДІДЖИТАЛІЗАЦІЇ ТА ІМПЛЕМЕНТАЦІЇ СТАНДАРТІВ PAPERLESS ПРИ ФОРМУВАННІ ТА БЕНЧМАРКІНГОВУ АНАЛІЗУ ЗВІТНИХ ПОКАЗНИКІВ З НАУКОВОЇ ДІЯЛЬНОСТІ.
- Published in:
- Automation of Technological & Business Processes / Avtomatizaciâ Tehnologiceskih i Biznes-Processov, 2022, v. 14, n. 4, p. 48, doi. 10.15673/atbp.v14i4.2437
- By:
- Publication type:
- Article
Was tun... ... wenn es passiert? Schritt für Schritt beim Hackereintritt.
- Published in:
- IM + io, 2023, n. 3, p. 90
- By:
- Publication type:
- Article
Quantitative Approach for Calculating DRDoS Risk.
- Published in:
- Journal of Information & Communication Convergence Engineering, 2023, v. 21, n. 3, p. 192, doi. 10.56977/jicce.2023.21.3.192
- By:
- Publication type:
- Article
DoS Attack Control Design of IoT System for 5G Era.
- Published in:
- Journal of Information & Communication Convergence Engineering, 2018, v. 16, n. 2, p. 93, doi. 10.6109/jicce.2018.16.2.93
- By:
- Publication type:
- Article
Edge 라우터 기반 네트워크 공격에 대응하는 보안기술 연구.
- Published in:
- Journal of the Korea Institute of Information & Communication Engineering, 2022, v. 26, n. 9, p. 1374, doi. 10.6109/jkiice.2022.26.9.1374
- By:
- Publication type:
- Article
웹 모니터링 기반 암호화 웹트래픽 공격 탐지 시스템.
- Published in:
- Journal of the Korea Institute of Information & Communication Engineering, 2021, v. 25, n. 3, p. 449, doi. 10.6109/jkiice.2021.25.3.449
- By:
- Publication type:
- Article
트래픽 속성 개수를 고려한 의사 결정 트리 DDoS 기반 분석.
- Published in:
- Journal of the Korea Institute of Information & Communication Engineering, 2021, v. 25, n. 1, p. 69, doi. 10.6109/jkiice.2021.25.1.69
- By:
- Publication type:
- Article
Anthropomorphizing malware, bots, and servers with human-like images and dialogues: the emotional design effects in a multimedia learning environment.
- Published in:
- Smart Learning Environments, 2022, v. 9, n. 1, p. 1, doi. 10.1186/s40561-022-00187-w
- By:
- Publication type:
- Article
Binary Terror: The Reality of Terrorism in a Virtual World.
- Published in:
- American Intelligence Journal, 2015, v. 32, n. 2, p. 131
- By:
- Publication type:
- Article
Iran's Cyber Terrorism Surge: Defending the Digital Frontline.
- Published in:
- International Policy Digest, 2024, p. 1
- By:
- Publication type:
- Article
Detecting DDoS Attacks using Machine Learning: Survey.
- Published in:
- Journal of Qadisiyah Computer Science & Mathematics, 2024, v. 16, n. 2, p. 118, doi. 10.29304/jqcsm.2024.16.21548
- By:
- Publication type:
- Article
ВИЯВЛЕННЯ ТА БЛОКУВАННЯ ПОВІЛЬНИХ DDOS-АТАК ЗА ДОПОМОГОЮ ПРОГНОЗУВАННЯ ПОВЕДІНКИ КОРИСТУВАЧА.
- Published in:
- Science-Based Technologies, 2022, v. 55, n. 3, p. 184, doi. 10.18372/2310-5461.55.16908
- By:
- Publication type:
- Article
A Survey on DDoS Attack and Defense Strategies: From Traditional Schemes to Current Techniques.
- Published in:
- Interdisciplinary Information Sciences, 2013, v. 19, n. 2, p. 173, doi. 10.4036/iis.2013.173
- By:
- Publication type:
- Article
A data plane security model of segmented routing based on SDP trust enhancement architecture.
- Published in:
- Scientific Reports, 2022, v. 12, n. 1, p. 1, doi. 10.1038/s41598-022-12858-2
- By:
- Publication type:
- Article
Formation control for discrete-time multi-agent system with input and output delays under network attacks.
- Published in:
- Scientific Reports, 2022, v. 12, n. 1, p. 1, doi. 10.1038/s41598-022-12417-9
- By:
- Publication type:
- Article
DETECTION OF DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS USING CONVOLUTIONAL NEURAL NETWORKS.
- Published in:
- Nigerian Journal of Technology, 2022, v. 41, n. 6, p. 1017, doi. 10.4314/njt.v41i6.12
- By:
- Publication type:
- Article
DoS Attack Detection and Path Collision Localization in NoC-Based MPSoC Architectures.
- Published in:
- Journal of Low Power Electronics & Applications, 2019, v. 9, n. 1, p. 7, doi. 10.3390/jlpea9010007
- By:
- Publication type:
- Article
Ulusötecilik Bağlamında Avrupa'da Gerçekleşen Terör Saldırılarının Çevrimiçi (Online) Medyada Söylem Analizi: Trollhättan Okul Saldırısı Örneği.
- Published in:
- Journal of Social Sciences Research / Sosyal Bilimler Arastirmalari Dergisi, 2022, v. 12, n. 2, p. 887, doi. 10.48146/odusobiad.1052704
- By:
- Publication type:
- Article
Adaptive secure lateral control of autonomous electric vehicles under denial-of-service attacks.
- Published in:
- Transactions of the Institute of Measurement & Control, 2024, v. 46, n. 13, p. 2558, doi. 10.1177/01423312241233780
- By:
- Publication type:
- Article
Security bipartite synchronization of MASs resilient to DoS attacks.
- Published in:
- Transactions of the Institute of Measurement & Control, 2024, v. 46, n. 8, p. 1489, doi. 10.1177/01423312231198950
- By:
- Publication type:
- Article
Improving service in the presence of surge traffic: a K-policy voluntary flushing queueing system.
- Published in:
- Annals of Operations Research, 2020, v. 295, n. 1, p. 411, doi. 10.1007/s10479-020-03700-x
- By:
- Publication type:
- Article
Nitric oxide function during oxygen deprivation in physiological and stress processes.
- Published in:
- Journal of Experimental Botany, 2021, v. 72, n. 3, p. 904, doi. 10.1093/jxb/eraa442
- By:
- Publication type:
- Article
HomeNet Shield.
- Published in:
- Journal of Algebraic Statistics, 2022, v. 13, n. 3, p. 4687
- By:
- Publication type:
- Article
Snapcatch - Protection of Data from Covert Timing Channels.
- Published in:
- Journal of Algebraic Statistics, 2022, v. 13, n. 3, p. 4938
- By:
- Publication type:
- Article
A Systematic Review of DoS Attack Prevention Techniques on Delay Tolerant Network.
- Published in:
- Journal of Algebraic Statistics, 2022, v. 13, n. 3, p. 3412
- By:
- Publication type:
- Article
Analysis of Features Selection Effects on Different Classification Algorithms with Performance Metrics Improvement based on PortScanattack of CICDDoS2019 Dataset.
- Published in:
- Journal of Algebraic Statistics, 2022, v. 13, n. 3, p. 1712
- By:
- Publication type:
- Article