Results 91 to 100 of about 40,714 (194)
ANALYSING MALICIOUS SOFTWARE SUPPORTING DDOS ATTACKS ON IOT NETWORKS
Background. With the proliferation of Internet of Things (IoT) networks in the digital age, the risk of cyberattacks, especially DDoS attacks, is also increasing.
Валерій Правило +1 more
doaj +1 more source
Trilateral Trust Based Defense Mechanism against DDoS Attacks in Cloud Computing Environment
Distributed Denial of Service (DDoS) in a Cloud leads to a high rate of overload conditions, which subverts the Data Center (DC) performance and ends up in resource unavailability.
Iyengar N. Ch. S. N., Ganapathy Gopinath
doaj +1 more source
ABSTRACT Abiotic stresses severely constrain soybean productivity worldwide. Here we demonstrate that gmeif2b5 (eukaryotic initiation factors) mutants confer dual stress tolerance through coordinated mechanisms. Integrative RNA‐Seq and protein interaction analyses revealed that gmeif2b5 mutants increase lignin deposition to increase drought resilience ...
Juan Liu +16 more
wiley +1 more source
A Virtual Firewall Mechanism Using Army Nodes to Protect Cloud Infrastructure from DDoS Attacks
Cloud is not exempted from the vulnerability of Distributed Denial of Service (DDoS) attack, a serious threat to any distributed network and has considerably less effective solutions to deploy in the network.
Jeyanthi N, Mogankumar P. C.
doaj +1 more source
ABSTRACT Chloroplasts are essential organelles responsible for photosynthesis, providing energy and metabolic intermediates required for plant growth and productivity. Chloroplast development is highly sensitive to environmental stresses such as drought, and this sensitivity is closely associated with growth inhibition and yield reduction under stress ...
Deok Hyun Seo, Jiwoong Jung, Geupil Jang
wiley +1 more source
One major problem commonly faced by organizations is a network attack especially if the network is vulnerable due to poor security policies. Network security is vital in protecting not only the infrastructure but most importantly, the data that moves ...
Mohammad Adib Khairuddin +4 more
doaj +1 more source
ABSTRACT Nicotine is the most abundant alkaloid produced by Nicotiana species against insect herbivores. Although it has been known for decades that auxin can strongly inhibit nicotine biosynthesis, the underlying mechanisms have remained unclear.
Miyun Yang +3 more
wiley +1 more source
Artificial Intelligence in Satellite Network Defense: Architectures, Threats, and Security Protocols
This paper examines the application of Artificial Intelligence (AI) to protect satellite communication networks, focusing on the identification and prevention of cyber threats.
Rumen Doynov +3 more
doaj +1 more source
CADA: A Flexible and Elastic DDoS Mitigation Architecture
The rigidity of traditional hardware DDoS mitigation frameworks is insufficient for handling complex and varied DDoS attacks. To address this, we introduce the Cloud-native Anti-DDoS Architecture (CADA), which is designed to ensure flexibility and ...
Junrui Wu +7 more
doaj +1 more source
Enhancing DDoS Attack Classification through SDN and Machine Learning: A Feature Ranking Analysis
Due to the growing dependence of digital services on the Internet, Distributed Denial of Service (DDoS) attacks are a common threat that can cause significant disruptions to online operations and financial losses. Machine learning (ML) offers a promising
Aymen AlAwadi, Kawthar Rasoul ALesawi
doaj +1 more source

