Works matching DE "DENIAL of service attacks"
Results: 2276
The pedagogy of Cyber-WAR:: Explaining Ukraine's resilience against Russian Cyber-aggression.
- Published in:
- Defense & Security Analysis, 2024, v. 40, n. 2, p. 270, doi. 10.1080/14751798.2024.2326313
- By:
- Publication type:
- Article
Enhancing Cybersecurity Attack Detection Using Multiplayer Battle Game Optimizer with Hybridization of Deep Learning Models.
- Published in:
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 2, p. 115, doi. 10.54216/JCIM.150210
- By:
- Publication type:
- Article
Securing the Future: Real-Time intrusion Detection in IIoT Smart Grids through Innovative AI Solutions.
- Published in:
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 2, p. 208, doi. 10.54216/JCIM.150216
- By:
- Publication type:
- Article
基于移动目标防御的卫星互联网防御系统设计.
- Published in:
- Space-Integrated-Ground Information Networks, 2024, v. 5, n. 4, p. 106, doi. 10.11959/j.issn.2096-8930.2024043
- By:
- Publication type:
- Article
Unknown DDoS Attack Detection with Sliced Iterative Normalizing Flows Technique.
- Published in:
- Computers, Materials & Continua, 2025, v. 82, n. 3, p. 4881, doi. 10.32604/cmc.2025.061001
- By:
- Publication type:
- Article
BRASÍLIA EM CENA: Performatividade antidemocrática nos atos de 8 de janeiro e os desafios à Agenda 2030.
- Published in:
- Pixo: Revista de Arquitetura Cidade e Contemporaneidade, 2024, v. 8, n. 31, p. 154
- By:
- Publication type:
- Article
Prioritizing Network-On-Chip Routers for Countermeasure Techniques against Flooding Denial-of-Service Attacks: A Fuzzy Multi-Criteria Decision-Making Approach.
- Published in:
- Computer Modeling in Engineering & Sciences (CMES), 2025, v. 142, n. 3, p. 2661, doi. 10.32604/cmes.2025.061318
- By:
- Publication type:
- Article
Advancing Vehicle Security: Deep Learning based Solution for Defending CAN Networks in the Internet of Vehicles.
- Published in:
- EAI Endorsed Transactions on Internet of Things, 2024, v. 10, p. 1, doi. 10.4108/eetiot.6523
- By:
- Publication type:
- Article
Security Methods to Improve Quality of Service.
- Published in:
- EAI Endorsed Transactions on Internet of Things, 2024, v. 10, p. 1, doi. 10.4108/eetiot.4587
- By:
- Publication type:
- Article
CTMBIDS: convolutional Tsetlin machine-based intrusion detection system for DDoS attacks in an SDN environment.
- Published in:
- Neural Computing & Applications, 2025, v. 37, n. 9, p. 6795, doi. 10.1007/s00521-025-10976-2
- By:
- Publication type:
- Article
Uji Penetrasi Keamanan Website Dinas Komunikasi dan Informatika.
- Published in:
- Techno.com, 2025, v. 24, n. 1, p. 260, doi. 10.62411/tc.v24i1.12259
- By:
- Publication type:
- Article
Securing eNode-B from DDoS Attacks Using Isolation Bandwidth Technique.
- Published in:
- Ingénierie des Systèmes d'Information, 2025, v. 30, n. 2, p. 419, doi. 10.18280/isi.300213
- By:
- Publication type:
- Article
Efficient network attack path optimization method based on prior knowledge-based PPO algorithm.
- Published in:
- Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-024-00288-8
- By:
- Publication type:
- Article
Event-Triggered MFAILC Bipartite Formation Control for Multi-Agent Systems Under DoS Attacks.
- Published in:
- Applied Sciences (2076-3417), 2025, v. 15, n. 4, p. 1921, doi. 10.3390/app15041921
- By:
- Publication type:
- Article
Federated Deep Learning for Scalable and Privacy-Preserving Distributed Denial-of-Service Attack Detection in Internet of Things Networks.
- Published in:
- Future Internet, 2025, v. 17, n. 2, p. 88, doi. 10.3390/fi17020088
- By:
- Publication type:
- Article
Machine Learning-Based Detection and Selective Mitigation of Denial-of-Service Attacks in Wireless Sensor Networks.
- Published in:
- Computers, Materials & Continua, 2025, v. 82, n. 2, p. 2475, doi. 10.32604/cmc.2025.058963
- By:
- Publication type:
- Article
ADVANCED HYBRID GENERATIVE AI MODELS FOR MULTI-LAYERED DETECTION AND DEFENSE AGAINST DDOS ATTACKS.
- Published in:
- ICTACT Journal on Soft Computing, 2025, v. 15, n. 3, p. 3618, doi. 10.21917/ijsc.2025.0502
- By:
- Publication type:
- Article
Analysing Cyber Attacks and Cyber Security Vulnerabilities in the University Sector.
- Published in:
- Computers (2073-431X), 2025, v. 14, n. 2, p. 49, doi. 10.3390/computers14020049
- By:
- Publication type:
- Article
A Novel ConvXGBoost Method for Detection and Identification of Cyberattacks on Grid-Connected Photovoltaic (PV) Inverter System.
- Published in:
- Computation, 2025, v. 13, n. 2, p. 33, doi. 10.3390/computation13020033
- By:
- Publication type:
- Article
Cyber–Physical System Attack Detection and Isolation: A Takagi–Sugeno Approach.
- Published in:
- Mathematical & Computational Applications, 2025, v. 30, n. 1, p. 12, doi. 10.3390/mca30010012
- By:
- Publication type:
- Article
Hybrid GAN-LSTM for Enhancing DDoS Detection on Imbalance Dataset.
- Published in:
- International Journal of Safety & Security Engineering, 2025, v. 15, n. 1, p. 189, doi. 10.18280/ijsse.150120
- By:
- Publication type:
- Article
A Heterogeneity-Aware Semi-Decentralized Model for a Lightweight Intrusion Detection System for IoT Networks Based on Federated Learning and BiLSTM.
- Published in:
- Sensors (14248220), 2025, v. 25, n. 4, p. 1039, doi. 10.3390/s25041039
- By:
- Publication type:
- Article
"Our Biggest Nightmare Is Here": Cyberattacks are targeting school districts. How can schools respond to keep data and systems secure?
- Published in:
- Education Next, 2022, v. 22, n. 2, p. 44
- By:
- Publication type:
- Article
Leveraging blockchain and machine learning to counter DDoS attacks over IoT network.
- Published in:
- Multimedia Tools & Applications, 2025, v. 84, n. 1, p. 317, doi. 10.1007/s11042-024-18842-4
- By:
- Publication type:
- Article
SHIS: secure healthcare intelligent scheme in internet of multimedia vehicular environment.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 40, p. 87781, doi. 10.1007/s11042-024-18720-z
- By:
- Publication type:
- Article
An evolutionary KNN model for DDoS assault detection using genetic algorithm based optimization.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 35, p. 83005, doi. 10.1007/s11042-024-18744-5
- By:
- Publication type:
- Article
Security establishment using deep convolutional network model in cyber-physical systems.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 31, p. 76201, doi. 10.1007/s11042-024-18535-y
- By:
- Publication type:
- Article
2-layer classification model with correlated common feature selection for intrusion detection system in networks.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 22, p. 61213, doi. 10.1007/s11042-023-17781-w
- By:
- Publication type:
- Article
DDoS mitigation using blockchain and machine learning techniques.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 21, p. 60265, doi. 10.1007/s11042-023-18028-4
- By:
- Publication type:
- Article
DDoS attack forecasting based on online multiple change points detection and time series analysis.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 18, p. 53655, doi. 10.1007/s11042-023-17637-3
- By:
- Publication type:
- Article
Design of an incremental learning model for shard management in performance-aware blockchains: GA-TLEHO approach.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 15, p. 44639, doi. 10.1007/s11042-023-17227-3
- By:
- Publication type:
- Article
SD-IIDS: intelligent intrusion detection system for software-defined networks.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 4, p. 11077, doi. 10.1007/s11042-023-15725-y
- By:
- Publication type:
- Article
DDOS attack prevention and validation with metric based ensemble approach.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 28, p. 44147, doi. 10.1007/s11042-023-15523-6
- By:
- Publication type:
- Article
Blockchain DrivenAccess control architecture for the internet of things.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 20, p. 31397, doi. 10.1007/s11042-023-14881-5
- By:
- Publication type:
- Article
Retraction Note: Improved encryption protocol for secure communication in trusted MANETs against denial of service attacks.
- Published in:
- 2023
- By:
- Publication type:
- Correction Notice
LEAESN: Predicting DDoS attack in healthcare systems based on Lyapunov Exponent Analysis and Echo State Neural Networks.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 29, p. 41455, doi. 10.1007/s11042-020-10179-y
- By:
- Publication type:
- Article
A new lightweight conditional privacy preserving authentication and key – agreement protocol in social internet of things for vehicle to smart grid networks.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 19, p. 27683, doi. 10.1007/s11042-022-12946-5
- By:
- Publication type:
- Article
Enhanced method of ANN based model for detection of DDoS attacks on multimedia internet of things.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 19, p. 26739, doi. 10.1007/s11042-021-10640-6
- By:
- Publication type:
- Article
A detailed survey of denial of service for IoT and multimedia systems: Past, present and futuristic development.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 14, p. 19879, doi. 10.1007/s11042-021-11859-z
- By:
- Publication type:
- Article
Predictive machine learning-based integrated approach for DDoS detection and prevention.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 3, p. 4185, doi. 10.1007/s11042-021-11740-z
- By:
- Publication type:
- Article
A lightweight improvement of PeDAAC protocol for 6LoWPAN in the Internet of Things.
- Published in:
- Multimedia Tools & Applications, 2021, v. 80, n. 20, p. 31467, doi. 10.1007/s11042-021-11236-w
- By:
- Publication type:
- Article
Event-triggered synchronization control for neural networks against DoS attacks.
- Published in:
- Electronic Research Archive, 2025, v. 33, n. 1, p. 1, doi. 10.3934/era.2025007
- By:
- Publication type:
- Article
A collaborative prediction approach to defend against amplified reflection and exploitation attacks.
- Published in:
- Electronic Research Archive, 2023, v. 31, n. 10, p. 1, doi. 10.3934/era.2023308
- By:
- Publication type:
- Article
An unsupervised approach for the detection of zero‐day distributed denial of service attacks in Internet of Things networks.
- Published in:
- IET Networks (Wiley-Blackwell), 2024, v. 13, n. 5, p. 513, doi. 10.1049/ntw2.12134
- By:
- Publication type:
- Article
Enabling low‐latency service function chains by merging duplicate match operations.
- Published in:
- IET Networks (Wiley-Blackwell), 2022, v. 11, n. 5, p. 147, doi. 10.1049/ntw2.12049
- By:
- Publication type:
- Article
An enhanced mechanism for detection of Domain Name System‐based distributed reflection denial of service attacks depending on modified metaheuristic algorithms and adaptive thresholding techniques.
- Published in:
- IET Networks (Wiley-Blackwell), 2022, v. 11, n. 5, p. 169, doi. 10.1049/ntw2.12043
- By:
- Publication type:
- Article
Comment on 'ElGamal cryptosystem‐based secure authentication system for cloud‐based IoT applications'.
- Published in:
- IET Networks (Wiley-Blackwell), 2021, v. 10, n. 5, p. 244, doi. 10.1049/ntw2.12014
- By:
- Publication type:
- Article
Lightweight models for detection of denial‐of‐service attack in wireless sensor networks.
- Published in:
- IET Networks (Wiley-Blackwell), 2021, v. 10, n. 4, p. 185, doi. 10.1049/ntw2.12011
- By:
- Publication type:
- Article
إمـكـانـيـة تـقـديـم املـراسـالت الـتـي تـتـضـمـن مـا يـتـعـلـق بـخـصـوصـيـات الـخـصـوم إلـى الـقـضـاء.
- Published in:
- Journal of The Iraqi University, 2019, v. 45, n. 3, p. 409
- By:
- Publication type:
- Article
Robustness test of multiple protection strategies for ecological networks from the perspective of complex networks: Evidence from Wuhan Metropolitan Area, China.
- Published in:
- Land Degradation & Development, 2023, v. 34, n. 1, p. 52, doi. 10.1002/ldr.4443
- By:
- Publication type:
- Article