Works matching DE "DENIAL of service attacks"
Results: 2230
SEC-MAC: A Secure Wireless Sensor Network Based on Cooperative Communication.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2025, v. 16, n. 1, p. 79
- By:
- Publication type:
- Article
Detection of DDoS Cyberattack Using a Hybrid Trust-Based Technique for Smart Home Networks.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2025, v. 16, n. 1, p. 32
- By:
- Publication type:
- Article
Innovative Machine Learning Strategies for DDoS Detection: A Review.
- Published in:
- UHD Journal of Science & Technology, 2024, v. 8, n. 2, p. 38, doi. 10.21928/uhdjst.v8n2y2024
- By:
- Publication type:
- Article
Cyber Mobilisation 2.0: Capitalisation and Instigation of Hacktivists and Vigilantes in Future Conflicts.
- Published in:
- Journal of Information Warfare, 2025, v. 24, n. 1, p. 105
- By:
- Publication type:
- Article
EFFICIENT CLASSIFIER TO DETECT DDoS ATTACK BASED ON INTERNET OF THINGS.
- Published in:
- Thermal Science, 2024, v. 28, n. 6B, p. 5113, doi. 10.2298/TSCI2406113A
- By:
- Publication type:
- Article
Power Struggles--Energy as a Weapon of War, Domination and Resistance in Palestine.
- Published in:
- Middle East Report, 2024, n. 313, p. 1
- By:
- Publication type:
- Article
Validating operational risk models.
- Published in:
- British Actuarial Journal, 2024, v. 29, p. 1, doi. 10.1017/S1357321724000096
- Publication type:
- Article
Leveraging blockchain and machine learning to counter DDoS attacks over IoT network.
- Published in:
- Multimedia Tools & Applications, 2025, v. 84, n. 1, p. 317, doi. 10.1007/s11042-024-18842-4
- By:
- Publication type:
- Article
COMPUTING BEYOND THE FIREWALL.
- Published in:
- Research Technology Management, 2010, v. 53, n. 3, p. 64, doi. 10.1080/08956308.2010.11671472
- By:
- Publication type:
- Article
Detecting and Preventing Wireless Deauthentication Flood Attacks over 802.11 Networks.
- Published in:
- Journal of Information Science & Engineering, 2025, v. 41, n. 1, p. 217, doi. 10.6688/JISE.202501_41(1).0012
- By:
- Publication type:
- Article
A Study on Traffic Asymmetry for Detecting DDoS Attack in P4-based SDN.
- Published in:
- Journal of Information Science & Engineering, 2022, v. 38, n. 6, p. 1265, doi. 10.6688/JISE.202211_38(6).0009
- By:
- Publication type:
- Article
IMBF - Counteracting Denial-of-Sleep Attacks in 6LowPAN Based Internet of Things.
- Published in:
- Journal of Information Science & Engineering, 2019, v. 35, n. 2, p. 361, doi. 10.6688/J1SE.201903_35(2).0007
- By:
- Publication type:
- Article
Efficient Denial of Service Attacks Detection in Wireless Sensor Networks.
- Published in:
- Journal of Information Science & Engineering, 2018, v. 34, n. 4, p. 977, doi. 10.6688/JISE.201807_34(4).0011
- By:
- Publication type:
- Article
A Unified Ant Agent Framework for Solving DoS and QoS Problems.
- Published in:
- Journal of Information Science & Engineering, 2016, v. 32, n. 6, p. 1397
- By:
- Publication type:
- Article
LDDoS Attack Detection by Using Ant Colony Optimization Algorithms.
- Published in:
- Journal of Information Science & Engineering, 2016, v. 32, n. 4, p. 995
- By:
- Publication type:
- Article
Low Storage and Traceback Overhead IP Traceback System.
- Published in:
- Journal of Information Science & Engineering, 2016, v. 32, n. 1, p. 27
- By:
- Publication type:
- Article
Single Packet ICMP Traceback Technique using Router Interface.
- Published in:
- Journal of Information Science & Engineering, 2014, v. 30, n. 6, p. 1673
- By:
- Publication type:
- Article
Impact of Identifier-Locator Split Mechanism on DDoS Attacks.
- Published in:
- Journal of Information Science & Engineering, 2013, v. 29, n. 6, p. 1097
- By:
- Publication type:
- Article
A Precise and Practical IP Traceback Technique Based on Packet Marking and Logging.
- Published in:
- Journal of Information Science & Engineering, 2012, v. 28, n. 3, p. 453
- By:
- Publication type:
- Article
An Anonymous Path Routing (APR) Protocol for Wireless Sensor Networks.
- Published in:
- Journal of Information Science & Engineering, 2011, v. 27, n. 2, p. 657
- By:
- Publication type:
- Article
The changing face of protests in the digital age: on occupying cyberspace and Distributed-Denial-of-Services (DDoS) attacks.
- Published in:
- International Review of Law, Computers & Technology, 2014, v. 28, n. 1, p. 98, doi. 10.1080/13600869.2014.870638
- By:
- Publication type:
- Article
BBC Funding: Much Ado about the Cost of a Coffee a Week.
- Published in:
- Political Quarterly, 2024, v. 95, n. 1, p. 70, doi. 10.1111/1467-923X.13371
- By:
- Publication type:
- Article
Retraction Note: Detecting distributed denial of service (DDoS) in SD-IoT environment with enhanced firefly algorithm and convolution neural network.
- Published in:
- 2024
- By:
- Publication type:
- Correction Notice
Detecting distributed denial of service (DDoS) in SD-IoT environment with enhanced firefly algorithm and convolution neural network.
- Published in:
- Optical & Quantum Electronics, 2023, v. 55, n. 5, p. 1, doi. 10.1007/s11082-023-04553-x
- By:
- Publication type:
- Article
DE2RA-RPL: detection and elimination of resource-related attacks in IoT RPL-based protocol.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 15, p. 22397, doi. 10.1007/s11227-024-06256-w
- By:
- Publication type:
- Article
The g-faulty-block connectivity of folded hypercubes.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 9, p. 12512, doi. 10.1007/s11227-024-05917-0
- By:
- Publication type:
- Article
Iot traffic-based DDoS attacks detection mechanisms: A comprehensive review.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 7, p. 9986, doi. 10.1007/s11227-023-05843-7
- By:
- Publication type:
- Article
Mitigating data imbalance to improve the generalizability in IoT DDoS detection tasks.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 7, p. 9935, doi. 10.1007/s11227-023-05829-5
- By:
- Publication type:
- Article
Blockchain-based end-to-end privacy-preserving scheme for IoT-based healthcare systems.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 2, p. 2067, doi. 10.1007/s11227-023-05522-7
- By:
- Publication type:
- Article
SlowTrack: detecting slow rate Denial of Service attacks against HTTP with behavioral parameters.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 2, p. 1788, doi. 10.1007/s11227-023-05453-3
- By:
- Publication type:
- Article
Proof of location based delivery system using multi-party virtual state channel: a blockchain model.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 1, p. 703, doi. 10.1007/s11227-023-05510-x
- By:
- Publication type:
- Article
A lightweight blockchain-based framework for medical cyber-physical system.
- Published in:
- Journal of Supercomputing, 2023, v. 79, n. 11, p. 12013, doi. 10.1007/s11227-023-05133-2
- By:
- Publication type:
- Article
Early detection and mitigation of TCP SYN flood attacks in SDN using chi-square test.
- Published in:
- Journal of Supercomputing, 2023, v. 79, n. 9, p. 10353, doi. 10.1007/s11227-023-05057-x
- By:
- Publication type:
- Article
An efficient centralized DDoS attack detection approach for Software Defined Internet of Things.
- Published in:
- Journal of Supercomputing, 2023, v. 79, n. 9, p. 10386, doi. 10.1007/s11227-023-05072-y
- By:
- Publication type:
- Article
Enhanced Rank Attack Detection Algorithm (E-RAD) for securing RPL-based IoT networks by early detection and isolation of rank attackers.
- Published in:
- Journal of Supercomputing, 2023, v. 79, n. 6, p. 6825, doi. 10.1007/s11227-022-04921-6
- By:
- Publication type:
- Article
Discriminate, locate and mitigate DDoS traffic in presence of Flash Crowd in Software Defined Network.
- Published in:
- Journal of Supercomputing, 2022, v. 78, n. 15, p. 16770, doi. 10.1007/s11227-022-04538-9
- By:
- Publication type:
- Article
FSO-LSTM IDS: hybrid optimized and ensembled deep-learning network-based intrusion detection system for smart networks.
- Published in:
- Journal of Supercomputing, 2022, v. 78, n. 7, p. 9438, doi. 10.1007/s11227-021-04285-3
- By:
- Publication type:
- Article
A hybrid machine learning approach for detecting unprecedented DDoS attacks.
- Published in:
- Journal of Supercomputing, 2022, v. 78, n. 6, p. 8106, doi. 10.1007/s11227-021-04253-x
- By:
- Publication type:
- Article
KS-DDoS: Kafka streams-based classification approach for DDoS attacks.
- Published in:
- Journal of Supercomputing, 2022, v. 78, n. 6, p. 8946, doi. 10.1007/s11227-021-04241-1
- By:
- Publication type:
- Article
AUGChain: blockchain-based mobile user authentication scheme in global mobility network.
- Published in:
- Journal of Supercomputing, 2022, v. 78, n. 5, p. 6788, doi. 10.1007/s11227-021-04139-y
- By:
- Publication type:
- Article
Design of an IoT DDoS attack prediction system based on data mining technology.
- Published in:
- Journal of Supercomputing, 2022, v. 78, n. 4, p. 4601, doi. 10.1007/s11227-021-04055-1
- By:
- Publication type:
- Article
Automated detection-in-depth in industrial control systems.
- Published in:
- International Journal of Advanced Manufacturing Technology, 2022, v. 118, n. 7/8, p. 2467, doi. 10.1007/s00170-021-08001-6
- By:
- Publication type:
- Article
Securing Wireless Sensor Networks Against DoS attacks in Industrial 4.0.
- Published in:
- Journal of Intelligent Systems & Internet of Things, 2023, v. 8, n. 1, p. 66, doi. 10.54216/JISIoT.080106
- By:
- Publication type:
- Article
Recent Trends on Sophisticated types of Flooding Attacks and Detection Methods based on Multi Sensors Fusion Data for Cloud Computing Systems.
- Published in:
- Fusion: Practice & Applications, 2023, v. 11, n. 1, p. 37, doi. 10.54216/FPA.110103
- By:
- Publication type:
- Article
Improved Security in Cloud Computer Networks Using RNN Deep Learning Techniques.
- Published in:
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 365, doi. 10.54216/JCIM.150129
- By:
- Publication type:
- Article
A Hybrid Deep Learning Model for Securing Smart City Networks Against Flooding Attack.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 14, n. 2, p. 311, doi. 10.54216/JCIM.140222
- By:
- Publication type:
- Article
A Hybrid Genetic Algorithm and Neural Network-Based Cyber Security Approach for Enhanced Detection of DDoS and Malware Attacks in Wide Area Networks.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 14, n. 2, p. 253, doi. 10.54216/JCIM.140217
- By:
- Publication type:
- Article
Integrating Novel Mechanisms for Threat Detection in Enhanced Data Classification using Ant Colony Optimization with Recurrent Neural Network.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 14, n. 2, p. 132, doi. 10.54216/JCIM.140209
- By:
- Publication type:
- Article
Investigating the Efficacy of Deep Reinforcement Learning Models in Detecting and Mitigating Cyber-attacks: a Novel Approach.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 14, n. 1, p. 96, doi. 10.54216/JCIM.140107
- By:
- Publication type:
- Article
An Encrypted Rules and Extreme Learning Machine Approach for Enhancement of Data Security.
- Published in:
- Journal of Cybersecurity & Information Management, 2023, v. 11, n. 2, p. 47, doi. 10.54216/JCIM.110205
- By:
- Publication type:
- Article