Works matching DE "DENIAL of service attacks"
Results: 2274
Learning to control a structured-prediction decoder for detection of HTTP-layer DDoS attackers.
- Published in:
- Machine Learning, 2016, v. 104, n. 2-3, p. 385, doi. 10.1007/s10994-016-5581-9
- By:
- Publication type:
- Article
Effectiveness of SIP Server Under SIP Flooding Attack During VoIP Calls.
- Published in:
- Wireless Personal Communications, 2019, v. 108, n. 4, p. 2229, doi. 10.1007/s11277-019-06519-3
- By:
- Publication type:
- Article
ITCA, an IDS and Trust Solution Collaborated with ACK Based Approach to Mitigate Network Layer Attack on MANET Routing.
- Published in:
- Wireless Personal Communications, 2019, v. 107, n. 1, p. 393, doi. 10.1007/s11277-019-06282-5
- By:
- Publication type:
- Article
An ECC Based Secure Authentication and Key Exchange Scheme in Multi-server Environment.
- Published in:
- Wireless Personal Communications, 2019, v. 107, n. 1, p. 351, doi. 10.1007/s11277-019-06280-7
- By:
- Publication type:
- Article
Jammed Node Detection and Routing in a Multihop Wireless Sensor Network Using Hybrid Techniques.
- Published in:
- Wireless Personal Communications, 2019, v. 104, n. 2, p. 663, doi. 10.1007/s11277-018-6042-5
- By:
- Publication type:
- Article
Using Improved Hilbert-Huang Transformation Method to Detect Routing-Layer Reduce of Quality Attack in Wireless Sensor Network.
- Published in:
- Wireless Personal Communications, 2019, v. 104, n. 2, p. 595, doi. 10.1007/s11277-018-6036-3
- By:
- Publication type:
- Article
Identifying Camouflaging Adversary in MANET Using Cognitive Agents.
- Published in:
- Wireless Personal Communications, 2018, v. 102, n. 4, p. 3427, doi. 10.1007/s11277-018-5378-1
- By:
- Publication type:
- Article
Multi Model Mitigation Approach for Network Threats on Cluster Based Linear Chain Routing Protocol in Wireless Sensor Networks at QoS Development.
- Published in:
- Wireless Personal Communications, 2018, v. 102, n. 4, p. 3205, doi. 10.1007/s11277-018-5346-9
- By:
- Publication type:
- Article
FJADA: Friendship Based JellyFish Attack Detection Algorithm for Mobile Ad Hoc Networks.
- Published in:
- Wireless Personal Communications, 2018, v. 101, n. 4, p. 1901, doi. 10.1007/s11277-018-5797-z
- By:
- Publication type:
- Article
Efficient Techniques for Attack Detection Using Different Features Selection Algorithms and Classifiers.
- Published in:
- Wireless Personal Communications, 2018, v. 100, n. 4, p. 1689, doi. 10.1007/s11277-018-5662-0
- By:
- Publication type:
- Article
Ensemble Classifiers with Drift Detection (ECDD) in Traffic Flow Streams to Detect DDOS Attacks.
- Published in:
- Wireless Personal Communications, 2018, v. 99, n. 4, p. 1639, doi. 10.1007/s11277-018-5306-4
- By:
- Publication type:
- Article
BIFAD: Bio-Inspired Anomaly Based HTTP-Flood Attack Detection.
- Published in:
- Wireless Personal Communications, 2017, v. 97, n. 1, p. 281, doi. 10.1007/s11277-017-4505-8
- By:
- Publication type:
- Article
Node Re-Routing and Congestion Reduction Scheme for Wireless Vehicular Networks.
- Published in:
- Wireless Personal Communications, 2017, v. 96, n. 4, p. 5203, doi. 10.1007/s11277-016-3736-4
- By:
- Publication type:
- Article
Provable Identity Based User Authentication Scheme on ECC in Multi-server Environment.
- Published in:
- Wireless Personal Communications, 2017, v. 95, n. 3, p. 2785, doi. 10.1007/s11277-017-3961-5
- By:
- Publication type:
- Article
A New Efficient Chaotic Maps Based Three Factor User Authentication and Key Agreement Scheme.
- Published in:
- Wireless Personal Communications, 2017, v. 95, n. 3, p. 3391, doi. 10.1007/s11277-017-4003-z
- By:
- Publication type:
- Article
An Efficient DSR Protocol to Detect Blackhole Attacks in WMN Using Cross Layer Approach.
- Published in:
- Wireless Personal Communications, 2017, v. 95, n. 3, p. 3477, doi. 10.1007/s11277-017-4008-7
- By:
- Publication type:
- Article
Performance Study of 802.11w for Preventing DoS Attacks on Wireless Local Area Networks.
- Published in:
- Wireless Personal Communications, 2017, v. 95, n. 2, p. 1031, doi. 10.1007/s11277-016-3812-9
- By:
- Publication type:
- Article
Impact of DoS Attack in Software Defined Network for Virtual Network.
- Published in:
- Wireless Personal Communications, 2017, v. 94, n. 4, p. 2189, doi. 10.1007/s11277-016-3370-1
- By:
- Publication type:
- Article
A Reliant Certificate Revocation of Malicious Nodes in MANETs.
- Published in:
- Wireless Personal Communications, 2016, v. 90, n. 2, p. 435, doi. 10.1007/s11277-015-3016-8
- By:
- Publication type:
- Article
DAD: A Secured Routing Protocol for Detecting and Preventing Denial-of-Service in Wireless Networks.
- Published in:
- Wireless Personal Communications, 2016, v. 90, n. 2, p. 457, doi. 10.1007/s11277-015-3022-x
- By:
- Publication type:
- Article
Localized DoS Attack Detection Architecture for Reliable Data Transmission Over Wireless Sensor Network.
- Published in:
- Wireless Personal Communications, 2016, v. 90, n. 2, p. 847, doi. 10.1007/s11277-016-3231-y
- By:
- Publication type:
- Article
An Energy Efficient Cluster Head Selection Technique Using Network Trust and Swarm Intelligence.
- Published in:
- Wireless Personal Communications, 2016, v. 89, n. 2, p. 351, doi. 10.1007/s11277-016-3269-x
- By:
- Publication type:
- Article
Mobile-Based DoS Attack Security Agent in Sensor Networking.
- Published in:
- Wireless Personal Communications, 2016, v. 86, n. 1, p. 91, doi. 10.1007/s11277-015-3098-3
- By:
- Publication type:
- Article
Cryptanalysis and Improvement of a Mobile Dynamic ID Authenticated Key Agreement Scheme Based on Chaotic Maps.
- Published in:
- Wireless Personal Communications, 2015, v. 85, n. 4, p. 2141, doi. 10.1007/s11277-015-2896-y
- By:
- Publication type:
- Article
An Efficient Pairwise and Group Key Management Protocol for Wireless Sensor Network.
- Published in:
- Wireless Personal Communications, 2015, v. 84, n. 3, p. 2035, doi. 10.1007/s11277-015-2546-4
- By:
- Publication type:
- Article
Impact of Distributed Denial-of-Service Attack on Advanced Metering Infrastructure.
- Published in:
- Wireless Personal Communications, 2015, v. 83, n. 3, p. 2211, doi. 10.1007/s11277-015-2510-3
- By:
- Publication type:
- Article
A New Privacy-Aware Handover Authentication Scheme for Wireless Networks.
- Published in:
- Wireless Personal Communications, 2015, v. 80, n. 2, p. 581, doi. 10.1007/s11277-014-2029-z
- By:
- Publication type:
- Article
A Key Hiding Communication Scheme for Enhancing the Wireless LAN Security.
- Published in:
- Wireless Personal Communications, 2014, v. 77, n. 2, p. 1145, doi. 10.1007/s11277-013-1559-0
- By:
- Publication type:
- Article
An Investigation of Security Trends in Personal Wireless Networks.
- Published in:
- Wireless Personal Communications, 2014, v. 75, n. 3, p. 1669, doi. 10.1007/s11277-013-1386-3
- By:
- Publication type:
- Article
Improvement of the Hash-Based RFID Mutual Authentication Protocol.
- Published in:
- Wireless Personal Communications, 2014, v. 75, n. 1, p. 219, doi. 10.1007/s11277-013-1358-7
- By:
- Publication type:
- Article
Prevention of DoS Attacks in VANET.
- Published in:
- Wireless Personal Communications, 2013, v. 73, n. 1, p. 95, doi. 10.1007/s11277-013-1161-5
- By:
- Publication type:
- Article
Capability-Based Defenses Against DoS Attacks in Multi-path MANET Communications.
- Published in:
- Wireless Personal Communications, 2013, v. 73, n. 1, p. 127, doi. 10.1007/s11277-013-1297-3
- By:
- Publication type:
- Article
Denial of Service Prevention for 5G.
- Published in:
- Wireless Personal Communications, 2011, v. 57, n. 3, p. 365, doi. 10.1007/s11277-010-0074-9
- By:
- Publication type:
- Article
Integrated Network Monitoring using Zabbix with Push Notification via Telegram.
- Published in:
- Journal of Computing Research & Innovation, 2022, v. 7, n. 1, p. 155, doi. 10.24191/jcrinn.v7i1.282
- By:
- Publication type:
- Article
Machine Learning-Based DDoS Attack Detection on SDN-Based SCADA Systems.
- Published in:
- Gazi Journal of Engineering Sciences (GJES) / Gazi Mühendislik Bilimleri Dergisi, 2023, v. 9, n. 3, p. 596, doi. 10.30855/gmbd.0705090
- By:
- Publication type:
- Article
EXPLORING THE SECURITY OF CLOUD COMPUTING: AN ANALYSIS OF THREATS AND COUNTERMEASURES FOR CLOUD COMPUTING IN THE ERA OF DIGITAL TRANSFORMATION.
- Published in:
- Knowledge: International Journal, 2024, v. 65, n. 3, p. 305
- By:
- Publication type:
- Article
السياسة الخارجية الإسرائيلية تجاه العراق بعد الاحتلال عام 2003
- Published in:
- Journal of Political Sciences, 2019, n. 57, p. 429
- By:
- Publication type:
- Article
Enhanced Extreme Learning Machine for Energy Efficient Vampire Attack Detection in Wireless Sensor Networks.
- Published in:
- Journal Européen des Systèmes Automatisés, 2024, v. 57, n. 6, p. 1649, doi. 10.18280/jesa.570612
- By:
- Publication type:
- Article
DETECTION OF DDoS ATTACK IN CLOUD COMPUTING AND ITS PREVENTION: A SYSTEMATIC REVIEW.
- Published in:
- i-Manager's Journal On Cloud Computing, 2022, v. 9, n. 1, p. 1, doi. 10.26634/jcc.9.1.18542
- By:
- Publication type:
- Article
Denial-of-Service (DoS) Attack Detection within a Network of Wireless Sensors via Adaptive Sunflower Optimization and Improved Deep Convolutional Neural Network.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2,Part 5, p. 5878
- By:
- Publication type:
- Article
IoT based WiFi Penetration Testing Toolkit.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2,Part 4, p. 3710
- By:
- Publication type:
- Article
DDOS Attacks Detection and Mitigation in SDN using Machine Learning.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2, Part 2, p. 1972
- By:
- Publication type:
- Article
Investigating Parameters of Software Defined Networks for Detecting DDoS Attacks.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2, Part 2, p. 1907
- By:
- Publication type:
- Article
An Empirical Assessment of Botnets and Detection Methods.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 1, Part 3, p. 2828
- By:
- Publication type:
- Article
Analysing the Effectiveness of Intrusion Detection Systems against the Mirai Botnet: A Comparative Study.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 1, Part 2, p. 1500
- By:
- Publication type:
- Article
Enhancing Network Security: A Novel Hybrid ML Approach for DDoS Attack Detection.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 1, Part 1, p. 915
- By:
- Publication type:
- Article
Design of a Hybrid Framework for Detecting Attacks in Fog-based IoT Architecture using Deep Learning.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 1, Part 1, p. 605
- By:
- Publication type:
- Article
Internet Monitoring using Snort and Naïve Bayes Method using Internet of Things (IoT).
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2023, v. 9, n. 2, p. 323
- By:
- Publication type:
- Article
Strategic-level Framework with Combined Feature Engineering, Bio-inspired Optimization and ML for Detecting DDos Flooding Attacks in Cloud.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2023, v. 9, n. 1, p. 560
- By:
- Publication type:
- Article
Detection of Network Intrusions using Machine Learning.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2020, v. 6, n. 2, p. 151
- By:
- Publication type:
- Article