Found: 7
Select item for more details and to access through your institution.
THE SLOW HTTP DDOS ATTACKS: DETECTION, MITIGATION AND PREVENTION IN THE CLOUD ENVIRONMENT.
- Published in:
- Scalable Computing: Practice & Experience, 2019, v. 20, n. 4, p. 669, doi. 10.12694/scpe.v20i4.1569
- By:
- Publication type:
- Article
THE SLOW HTTP DISTRIBUTED DENIAL OF SERVICE ATTACK DETECTION IN CLOUD.
- Published in:
- Scalable Computing: Practice & Experience, 2019, v. 20, n. 2, p. 285, doi. 10.12694/scpe.v20i2.1501
- By:
- Publication type:
- Article
Quantitative Analysis of Pesticide Residues in Okra using Gas Chromatography Tandem Mass Spectrometry.
- Published in:
- Pesticide Research Journal (09706763), 2022, v. 34, n. 1, p. 61, doi. 10.5958/2249-524X.2022.00012.7
- By:
- Publication type:
- Article
A IMAGE STEGANOGRAPHY TECHNIQUE ON SPATIAL DOMAIN USING MATRIX AND LSB EMBEDDING BASED ON HUFFMAN ENCODING.
- Published in:
- i-Manager's Journal on Future Engineering & Technology, 2011, v. 6, n. 3, p. 25, doi. 10.26634/jfet.6.3.1410
- By:
- Publication type:
- Article
Protection of online images against theft using robust multimodal biometric watermarking and T-norms.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 17, p. 52405, doi. 10.1007/s11042-023-17497-x
- By:
- Publication type:
- Article
An OpenStack based cloud testbed framework for evaluating HTTP flooding attacks.
- Published in:
- Wireless Networks (10220038), 2021, v. 27, n. 8, p. 5491, doi. 10.1007/s11276-019-01937-4
- By:
- Publication type:
- Article
A Recursive High Payload Reversible Data Hiding Using Integer Wavelet and Arnold Transform.
- Published in:
- Intelligent Automation & Soft Computing, 2023, v. 35, n. 1, p. 537, doi. 10.32604/iasc.2023.027070
- By:
- Publication type:
- Article