Results 111 to 120 of about 61,931 (258)

Mitigating DRDoS Network Attacks via Consolidated Deny Filter Rules

open access: yesResearch Briefs on Information & Communication Technology Evolution, 2020
This article is concerning distributed reflection denial of service (DRDoS) attacks. These DRDoS attacks are more frequent and large scale, and are one of the biggest threats on the Internet. This paper discusses the best way to defend from these attacks
Todd Booth, Karl Andersson
doaj   +1 more source

Physical Activity Knowledge in People With Knee Osteoarthritis Before and After Participation in an Education and Exercise Therapy Programme

open access: yesMusculoskeletal Care, Volume 24, Issue 2, June 2026.
ABSTRACT Objective Few people with knee osteoarthritis meet the World Health Organization (WHO) physical activity guidelines, and knowledge of guidelines in this population is not well known. We examined (i) baseline knowledge of physical activity guidelines in people with knee osteoarthritis; (ii) change in knowledge following participation in an ...
A. Couper   +6 more
wiley   +1 more source

Performance Analysis of Gradient Boosting and Decision Tree on Distributed Denial of Service Attacks in Software Defined Networks

open access: yesJurnal Sisfokom
Distributed Denial of Service (DDoS) attacks remain a prominent threat to modern network infrastructures, particularly in Software Defined Networks (SDNs), which operate under a centralized control architecture.
Andi Muhammad Iqra Rezky Hatta   +2 more
doaj   +1 more source

Collaborative Blockchain-Based Detection of Distributed Denial of Service Attacks Based on Internet of Things Botnets

open access: yesFuture Internet, 2019
Internet of Things is one of the most significant latest developments in computer science. It is common for modern computing infrastructures to partially consist of numerous low power devices that are characterized by high diversity in both hardware and ...
Georgios Spathoulas   +3 more
doaj   +1 more source

Generating Pattern‐Based Datasets for Cyber Attack Detection Using Machine‐Learning Techniques

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 16, Issue 2, June 2026.
The aim of this work is to review the state of the art in the design, generation, and labeling of attack pattern datasets for training of detection systems based on machine learning. ABSTRACT This work aims to review the state of the art in the design, generation, and labeling of attack pattern datasets for the training of detection systems based on ...
Pedro Díaz García   +4 more
wiley   +1 more source

Divergent Regulatory Effects of Jasmonic Acid on Tomato Lycopene Biosynthesis Under Light and Dark Conditions

open access: yesAdvanced Science, Volume 13, Issue 26, 8 May 2026.
This study reveals the mechanism by which jasmonic acid (JA) regulates lycopene synthesis under light and dark conditions. In light, JA activates SlMYC2, which suppresses SlPIF1a and promotes SlPSY1 expression. In darkness, JA induces the acetyltransferase SlNATA1, which acetylates the dark‐accumulated SlPIF1a, thereby repressing SlPSY1 expression ...
Jiayi Xu   +10 more
wiley   +1 more source

ANALYSING MALICIOUS SOFTWARE SUPPORTING DDOS ATTACKS ON IOT NETWORKS

open access: yesInformation and Telecommunication Sciences
Background. With the proliferation of Internet of Things (IoT) networks in the digital age, the risk of cyberattacks, especially DDoS attacks, is also increasing.
Валерій Правило   +1 more
doaj   +1 more source

TSCBA-A Mitigation System for ARP Cache Poisoning Attacks

open access: yesCybernetics and Information Technologies, 2018
Address Resolution Protocol (ARP) cache poisoning results in numerous attacks. A novel mitigation system for ARP cache poisoning presented here avoids ARP cache poisoning attacks by introducing timestamps and counters in the ARP messages and ARP data ...
Prabadevi B., Jeyanthi N.
doaj   +1 more source

Experimental validation of the RESPONSE framework against cyberattacks on cyber‐physical process systems

open access: yesAIChE Journal, Volume 72, Issue 5, May 2026.
Abstract This work experimentally validates the RESPONSE (Resilient Process cONtrol SystEm) framework as a solution for maintaining safe, continuous operation of cyber‐physical process systems under cyberattacks. RESPONSE implements a dual‐loop architecture that runs a networked online controller in parallel with a hard‐isolated offline controller ...
Luyang Liu   +5 more
wiley   +1 more source

Trilateral Trust Based Defense Mechanism against DDoS Attacks in Cloud Computing Environment

open access: yesCybernetics and Information Technologies, 2015
Distributed Denial of Service (DDoS) in a Cloud leads to a high rate of overload conditions, which subverts the Data Center (DC) performance and ends up in resource unavailability.
Iyengar N. Ch. S. N., Ganapathy Gopinath
doaj   +1 more source

Home - About - Disclaimer - Privacy