Works about DENIAL of service attacks
Results: 2262
Securing eNode-B from DDoS Attacks Using Isolation Bandwidth Technique.
- Published in:
- Ingénierie des Systèmes d'Information, 2025, v. 30, n. 2, p. 419, doi. 10.18280/isi.300213
- By:
- Publication type:
- Article
Event-Triggered MFAILC Bipartite Formation Control for Multi-Agent Systems Under DoS Attacks.
- Published in:
- Applied Sciences (2076-3417), 2025, v. 15, n. 4, p. 1921, doi. 10.3390/app15041921
- By:
- Publication type:
- Article
Federated Deep Learning for Scalable and Privacy-Preserving Distributed Denial-of-Service Attack Detection in Internet of Things Networks.
- Published in:
- Future Internet, 2025, v. 17, n. 2, p. 88, doi. 10.3390/fi17020088
- By:
- Publication type:
- Article
Machine Learning-Based Detection and Selective Mitigation of Denial-of-Service Attacks in Wireless Sensor Networks.
- Published in:
- Computers, Materials & Continua, 2025, v. 82, n. 2, p. 2475, doi. 10.32604/cmc.2025.058963
- By:
- Publication type:
- Article
ADVANCED HYBRID GENERATIVE AI MODELS FOR MULTI-LAYERED DETECTION AND DEFENSE AGAINST DDOS ATTACKS.
- Published in:
- ICTACT Journal on Soft Computing, 2025, v. 15, n. 3, p. 3618, doi. 10.21917/ijsc.2025.0502
- By:
- Publication type:
- Article
Analysing Cyber Attacks and Cyber Security Vulnerabilities in the University Sector.
- Published in:
- Computers (2073-431X), 2025, v. 14, n. 2, p. 49, doi. 10.3390/computers14020049
- By:
- Publication type:
- Article
A Novel ConvXGBoost Method for Detection and Identification of Cyberattacks on Grid-Connected Photovoltaic (PV) Inverter System.
- Published in:
- Computation, 2025, v. 13, n. 2, p. 33, doi. 10.3390/computation13020033
- By:
- Publication type:
- Article
Cyber–Physical System Attack Detection and Isolation: A Takagi–Sugeno Approach.
- Published in:
- Mathematical & Computational Applications, 2025, v. 30, n. 1, p. 12, doi. 10.3390/mca30010012
- By:
- Publication type:
- Article
Hybrid GAN-LSTM for Enhancing DDoS Detection on Imbalance Dataset.
- Published in:
- International Journal of Safety & Security Engineering, 2025, v. 15, n. 1, p. 189, doi. 10.18280/ijsse.150120
- By:
- Publication type:
- Article
A Heterogeneity-Aware Semi-Decentralized Model for a Lightweight Intrusion Detection System for IoT Networks Based on Federated Learning and BiLSTM.
- Published in:
- Sensors (14248220), 2025, v. 25, n. 4, p. 1039, doi. 10.3390/s25041039
- By:
- Publication type:
- Article
"Our Biggest Nightmare Is Here": Cyberattacks are targeting school districts. How can schools respond to keep data and systems secure?
- Published in:
- Education Next, 2022, v. 22, n. 2, p. 44
- By:
- Publication type:
- Article
Leveraging blockchain and machine learning to counter DDoS attacks over IoT network.
- Published in:
- Multimedia Tools & Applications, 2025, v. 84, n. 1, p. 317, doi. 10.1007/s11042-024-18842-4
- By:
- Publication type:
- Article
SHIS: secure healthcare intelligent scheme in internet of multimedia vehicular environment.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 40, p. 87781, doi. 10.1007/s11042-024-18720-z
- By:
- Publication type:
- Article
An evolutionary KNN model for DDoS assault detection using genetic algorithm based optimization.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 35, p. 83005, doi. 10.1007/s11042-024-18744-5
- By:
- Publication type:
- Article
Security establishment using deep convolutional network model in cyber-physical systems.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 31, p. 76201, doi. 10.1007/s11042-024-18535-y
- By:
- Publication type:
- Article
2-layer classification model with correlated common feature selection for intrusion detection system in networks.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 22, p. 61213, doi. 10.1007/s11042-023-17781-w
- By:
- Publication type:
- Article
DDoS mitigation using blockchain and machine learning techniques.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 21, p. 60265, doi. 10.1007/s11042-023-18028-4
- By:
- Publication type:
- Article
DDoS attack forecasting based on online multiple change points detection and time series analysis.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 18, p. 53655, doi. 10.1007/s11042-023-17637-3
- By:
- Publication type:
- Article
Design of an incremental learning model for shard management in performance-aware blockchains: GA-TLEHO approach.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 15, p. 44639, doi. 10.1007/s11042-023-17227-3
- By:
- Publication type:
- Article
SD-IIDS: intelligent intrusion detection system for software-defined networks.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 4, p. 11077, doi. 10.1007/s11042-023-15725-y
- By:
- Publication type:
- Article
DDOS attack prevention and validation with metric based ensemble approach.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 28, p. 44147, doi. 10.1007/s11042-023-15523-6
- By:
- Publication type:
- Article
Blockchain DrivenAccess control architecture for the internet of things.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 20, p. 31397, doi. 10.1007/s11042-023-14881-5
- By:
- Publication type:
- Article
Retraction Note: Improved encryption protocol for secure communication in trusted MANETs against denial of service attacks.
- Published in:
- 2023
- By:
- Publication type:
- Correction Notice
LEAESN: Predicting DDoS attack in healthcare systems based on Lyapunov Exponent Analysis and Echo State Neural Networks.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 29, p. 41455, doi. 10.1007/s11042-020-10179-y
- By:
- Publication type:
- Article
A new lightweight conditional privacy preserving authentication and key – agreement protocol in social internet of things for vehicle to smart grid networks.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 19, p. 27683, doi. 10.1007/s11042-022-12946-5
- By:
- Publication type:
- Article
Enhanced method of ANN based model for detection of DDoS attacks on multimedia internet of things.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 19, p. 26739, doi. 10.1007/s11042-021-10640-6
- By:
- Publication type:
- Article
A detailed survey of denial of service for IoT and multimedia systems: Past, present and futuristic development.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 14, p. 19879, doi. 10.1007/s11042-021-11859-z
- By:
- Publication type:
- Article
Predictive machine learning-based integrated approach for DDoS detection and prevention.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 3, p. 4185, doi. 10.1007/s11042-021-11740-z
- By:
- Publication type:
- Article
A lightweight improvement of PeDAAC protocol for 6LoWPAN in the Internet of Things.
- Published in:
- Multimedia Tools & Applications, 2021, v. 80, n. 20, p. 31467, doi. 10.1007/s11042-021-11236-w
- By:
- Publication type:
- Article
Event-triggered synchronization control for neural networks against DoS attacks.
- Published in:
- Electronic Research Archive, 2025, v. 33, n. 1, p. 1, doi. 10.3934/era.2025007
- By:
- Publication type:
- Article
A collaborative prediction approach to defend against amplified reflection and exploitation attacks.
- Published in:
- Electronic Research Archive, 2023, v. 31, n. 10, p. 1, doi. 10.3934/era.2023308
- By:
- Publication type:
- Article
An unsupervised approach for the detection of zero‐day distributed denial of service attacks in Internet of Things networks.
- Published in:
- IET Networks (Wiley-Blackwell), 2024, v. 13, n. 5, p. 513, doi. 10.1049/ntw2.12134
- By:
- Publication type:
- Article
Enabling low‐latency service function chains by merging duplicate match operations.
- Published in:
- IET Networks (Wiley-Blackwell), 2022, v. 11, n. 5, p. 147, doi. 10.1049/ntw2.12049
- By:
- Publication type:
- Article
An enhanced mechanism for detection of Domain Name System‐based distributed reflection denial of service attacks depending on modified metaheuristic algorithms and adaptive thresholding techniques.
- Published in:
- IET Networks (Wiley-Blackwell), 2022, v. 11, n. 5, p. 169, doi. 10.1049/ntw2.12043
- By:
- Publication type:
- Article
Comment on 'ElGamal cryptosystem‐based secure authentication system for cloud‐based IoT applications'.
- Published in:
- IET Networks (Wiley-Blackwell), 2021, v. 10, n. 5, p. 244, doi. 10.1049/ntw2.12014
- By:
- Publication type:
- Article
Lightweight models for detection of denial‐of‐service attack in wireless sensor networks.
- Published in:
- IET Networks (Wiley-Blackwell), 2021, v. 10, n. 4, p. 185, doi. 10.1049/ntw2.12011
- By:
- Publication type:
- Article
إمـكـانـيـة تـقـديـم املـراسـالت الـتـي تـتـضـمـن مـا يـتـعـلـق بـخـصـوصـيـات الـخـصـوم إلـى الـقـضـاء.
- Published in:
- Journal of The Iraqi University, 2019, v. 45, n. 3, p. 409
- By:
- Publication type:
- Article
Robustness test of multiple protection strategies for ecological networks from the perspective of complex networks: Evidence from Wuhan Metropolitan Area, China.
- Published in:
- Land Degradation & Development, 2023, v. 34, n. 1, p. 52, doi. 10.1002/ldr.4443
- By:
- Publication type:
- Article
Distributed denial of service attack detection in cloud computing using hybrid extreme learning machine.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2021, v. 29, n. 4, p. 1852, doi. 10.3906/elk-1908-87
- By:
- Publication type:
- Article
An Inter-Domain Attack Mitigating Solution.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2020, v. 28, n. 2, p. 757, doi. 10.3906/elk-1904-179
- By:
- Publication type:
- Article
Threshold-based distributed DDoS attack detection in ISP networks.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2018, v. 26, n. 4, p. 1796, doi. 10.3906/elk-1712-3
- By:
- Publication type:
- Article
A generalized detection system to detect distributed denial of service attacks and flash events for information theory metrics.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2018, v. 26, n. 4, p. 1759, doi. 10.3906/elk-1706-340
- By:
- Publication type:
- Article
Behavior-based detection of application layer distributed denial of service attacks during ash events.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2016, v. 24, n. 2, p. 510, doi. 10.3906/elk-1308-188
- By:
- Publication type:
- Article
Preserving location privacy for a group of users.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2013, v. 21, n. 1, p. 1857, doi. 10.3906/elk-1109-8
- By:
- Publication type:
- Article
Design and evaluation of a query-based jamming detection algorithm for wireless sensor networks.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2011, v. 19, n. 1, p. 1, doi. 10.3906/elk-0912-334
- By:
- Publication type:
- Article
Penggunaan Random Forest dan Analisis Perilaku untuk Prediksi Serangan DDoS dalam Lingkungan Cloud Computing.
- Published in:
- Techno.com, 2024, v. 23, n. 3, p. 668, doi. 10.62411/tc.v23i3.11317
- By:
- Publication type:
- Article
Penanggulangan Serangan LOIC Terhadap Web Server.
- Published in:
- Techno.com, 2023, v. 22, n. 3, p. 746, doi. 10.33633/tc.v22i3.8168
- By:
- Publication type:
- Article
Mitigasi Distributed Denial of Service (DDoS) Attack Pada Arsitektur Software Defined Network (SDN).
- Published in:
- Techno.com, 2022, v. 21, n. 4, p. 878, doi. 10.33633/tc.v21i4.6879
- By:
- Publication type:
- Article
Sistem Deteksi dan Pengendalian Serangan Denial of Service pada Server Berbasis Snort dan Telegram-API.
- Published in:
- Techno.com, 2022, v. 21, n. 3, p. 511, doi. 10.33633/tc.v21i3.6466
- By:
- Publication type:
- Article
Analisis Kinerja Mikrotik Terhadap Serangan Brute Force Dan DDoS.
- Published in:
- Techno.com, 2021, v. 20, n. 3, p. 392, doi. 10.33633/tc.v20i3.4615
- By:
- Publication type:
- Article