Results 211 to 220 of about 61,931 (258)
Some of the next articles are maybe not open access.
2013
In this chapter, we study on detection methods on DDoS attacks, which covers feature based detection methods, network traffic based detection methods, and detections against legitimate network event mimicking attacks. Each detection method is mathematically modelled for readers for possible further work in the fields.
openaire +1 more source
In this chapter, we study on detection methods on DDoS attacks, which covers feature based detection methods, network traffic based detection methods, and detections against legitimate network event mimicking attacks. Each detection method is mathematically modelled for readers for possible further work in the fields.
openaire +1 more source
DARAC: DDoS Mitigation Using DDoS Aware Resource Allocation in Cloud
2015Internet-based computing has lead to an emergence of a large number of threats. One of the major threat is DDoS Distributed Denial of Service attack. Recent incidents have shown that DDoS attacks have the capability of shutting a business not for a day but weeks. DDoS attacks have a greater impact on multi-tenant clouds than traditional infrastructure.
Gaurav Somani +5 more
openaire +1 more source
2018
Rump Session of the Workshop of the Economics of Information Security, 18 juni ...
openaire +1 more source
Rump Session of the Workshop of the Economics of Information Security, 18 juni ...
openaire +1 more source
An exhaustive study of DDOS attacks and DDOS datasets
International Journal of Internet Technology and Secured Transactions, 2020Joshua Ojo Nehinbe +1 more
openaire +1 more source
DDoS in the IoT: Mirai and Other Botnets
Computer, 2017C. Kolias +3 more
semanticscholar +1 more source
Analysis of Hybrid DDoS Defense to Mitigate DDoS Impact
Advanced Science Letters, 2017Gede Barkah Widagdo, Charles Lim
openaire +1 more source

