Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
    • by 
    •   7  
      DoS AttackCryptographyProtocolsInternet
    • by 
    •   11  
      DoS AttackStabilityGeographic distributionInternet services
    • by 
    •   4  
      DoS AttackData StructureDenial of ServiceDenial of Service Attack
    • by 
    •   6  
      DoS AttackAd Hoc NetworksVehicular ad hoc networkDenial of Service
This paper gives the idea of Vulnerabilities present in protocols, Also detail study of DoS attacks and the scenario of how DoS attacks can happen on internet its defence mechanisms. There are many solutions proposed by many author to... more
    • by 
    •   6  
      Computer ScienceDoS AttackNetwork ProtocolsVirus
We describe possible denial of service attacks to access points in infrastructure wireless networks using the 802.11b protocol. To carry out such attacks, only commodity hardware and software components are required. The experimental... more
    • by  and +1
    •   10  
      Distributed ComputingAutomataDoS AttackWireless networks
    • by 
    •   4  
      DoS AttackVanetJammingPlatooning
    • by 
    •   11  
      Computer ScienceDoS AttackNetwork ForensicsDigital Forensics
    • by 
    •   16  
      DoS AttackNeural NetworkComputer NetworkIndustrial electronics
    • by 
    •   20  
      Machine LearningLinear LogicDoS AttackIntrusion Detection
In today's world, data is generated at a very rapid speed and final destination of such data is database. Data is stored in database for easy and efficient way to manage these data. All the operations of data manipulation and maintenance... more
    • by  and +1
    •   37  
      Relational DatabaseInformation SecurityInternational SecurityCritical Security Studies
Denial of Service (DoS) attacks is one of the major threats to Internet sites and one of the major security problems Internet faces today. The nature of threats caused by Distributed Denial of Service (DDoS) attacks on networks. With... more
    • by  and +2
    •   7  
      Information SecurityNetwork SecurityComputer NetworksDoS Attack
    • by 
    •   19  
      Machine LearningData MiningNetwork SecurityGenetic Algorithms
    • by 
    •   12  
      EngineeringTechnologyNetwork SecurityComputer Networks
Applying of security mechanisms to middle and high layers of OSI/ISO network model
    • by 
    •   20  
      DoS AttackAuthenticationDNSProtocol
Recent automotive systems are increasingly complex and networked using various protocols like CAN, LIN, MOST, FlexRay, etc. The introduction of these technologies adds to the vulnerability of the vehicle security and gives more... more
    • by 
    •   4  
      DoS AttackEcuadorCan BusRaspberry Pi
    • by  and +1
    •   8  
      Game TheoryInformation SecurityDoS AttackCryptography
ABSTRACT Confidentiality, Integrity and Availability are the three major components of cyber security. Denial of Service (DoS) and its variant, Distributed Denial of Service (DDoS), are possible threats which exhaust the resources to make... more
    • by 
    •   3  
      Network SecurityDoS AttackEthical Hacking
    • by 
    •   13  
      Cognitive ScienceDistributed ComputingDoS AttackIntrusion Detection
    • by 
    •   4  
      Information SecurityDoS AttackComputer SecurityCryptography
    • by 
    •   14  
      EngineeringTechnologySignal ProcessingNetwork Security
    • by  and +1
    •   5  
      DoS AttackSecurity and PrivacyPublic key cryptographyBoolean Satisfiability
    • by 
    •   8  
      Voice over IPDoS AttackOpen SourceVoice Quality
The use of the Internet of Things (IoT) devices has surged in recent years. However, due to the lack of substantial security , IoT devices are vulnerable to cyber-attacks like Denial-of-Service (DoS) attacks. Most of the current security... more
    • by  and +1
    •   5  
      DoS AttackGraph Data MiningSmart Home TechnologyInternet of Things (IoT)
    • by 
    •   16  
      DoS AttackNeural NetworkComputer NetworkIndustrial electronics
The paper considers the problem of protecting the Internet of things infrastructure against denial-of-service (DoS) attacks at the application level. The authors considered parameters that affect the network gateway workload: message... more
    • by 
    •   6  
      Support Vector MachinesDoS AttackInternet of ThingsArtificial Neural Networks
In the current internet world , most of the services , businesses and other things are mostly relying on the cloud services let it be mail service , social medias , payment gateways , and nowadays traditional computing and data storage of... more
    • by 
    •   5  
      Computer ScienceNetwork SecurityDoS AttackComputer Security
    • by 
    •   17  
      Cognitive ScienceDistributed ComputingNetwork SecurityWireless Sensor Networks
Cloud computing is the new buzz word in computer oriented services and in IT industry. But, even now cloud computing is in its infancy, there numerous challenges like performance, security, availability, etc. The infrastructure of cloud... more
    • by 
    •   4  
      Tcp/IpDoS AttackCloud ComputingCloud Computing Security
    • by 
    •   171  
      HistoryCultural HistoryEconomic HistorySociology
    • by 
    •   19  
      Analytical ChemistryDoS AttackComputer SecuritySensors
    • by 
    •   10  
      Distributed ComputingDoS AttackComputer SoftwareIntrusion Detection
    • by 
    •   4  
      DoS AttackInternet ArchitectureDenial of ServiceIp Traceback
    • by 
    •   14  
      Wireless Sensor NetworksEnergy ConsumptionDoS AttackPublic key cryptography
    • by 
    •   6  
      Information SecurityComputer NetworksSecurityDoS Attack
Cyber-physical system (CPS) is a modern technology in the cyber world, and it integrates with wireless sensor network (WSN). This system is widely used in many applications such as a smart city, greenhouse, healthcare, and power grid.... more
    • by 
    •   3  
      DoS AttackCPSTerrestrial Laser Scanning (TLS)
    • by 
    •   11  
      Distributed ComputingNetworksWireless Sensor NetworksDoS Attack
Wake-up-radio-based sensing systems make use of radio-triggering techniques and ultra-low power wake-up receivers (WuRs) to enable on-demand asynchronous network wake ups. Thanks to this, they have the potential to achieve low latency... more
    • by  and +1
    •   5  
      Wireless Sensor NetworksDoS AttackWSN (Wireless sensor network)Wireless wake-up receivers
    • by 
    •   6  
      DoS AttackWireless NetworkWireless TechnologyWireless Mesh Network
    • by 
    •   6  
      Computer NetworksDoS AttackFloodingMANETs
Wireless Local Area Networks (WLAN) provide connectivity along with flexibility at low cost. Appreciating the exponential growth in this area, Institute of Electrical and Electronics Engineers (IEEE) ratified IEEE standard 802.11 in 1999... more
    • by 
    •   12  
      Computer ScienceNetwork SecurityWireless securityDoS Attack
    • by 
    •   14  
      Computer ScienceNetwork SecurityWireless Sensor NetworksDoS Attack
    • by 
    •   13  
      Cognitive ScienceDistributed ComputingDoS AttackIntrusion Detection
    • by 
    •   3  
      DoS AttackOPERATING SYSTEMMobile Device
Denial of Service (DoS) attacks are dif-ficult to prevent and protect against. In this paper we focus on DoS attacks in wireless ad hoc networks that propagate from MAC to routing layer, causing breaking of critical routes. We present... more
    • by 
    •   8  
      DoS AttackAd hoc networkIntrusion Detection SystemDenial of Service
    • by 
    •   8  
      Information SystemsDoS AttackDistributed Denial of Service AttackComputer Software
    • by 
    •   12  
      Distributed ComputingNetwork SecurityBack PropagationDoS Attack
    • by 
    •   7  
      Computer NetworksDoS AttackBlackhole AttackEnergy efficiency
    • by 
    •   12  
      Computer ScienceVoice over IPDoS AttackMultimedia Communication