Results 211 to 220 of about 61,931 (258)
Some of the next articles are maybe not open access.

DDoS Attack Detection

2013
In this chapter, we study on detection methods on DDoS attacks, which covers feature based detection methods, network traffic based detection methods, and detections against legitimate network event mimicking attacks. Each detection method is mathematically modelled for readers for possible further work in the fields.
openaire   +1 more source

DARAC: DDoS Mitigation Using DDoS Aware Resource Allocation in Cloud

2015
Internet-based computing has lead to an emergence of a large number of threats. One of the major threat is DDoS Distributed Denial of Service attack. Recent incidents have shown that DDoS attacks have the capability of shutting a business not for a day but weeks. DDoS attacks have a greater impact on multi-tenant clouds than traditional infrastructure.
Gaurav Somani   +5 more
openaire   +1 more source

SS-DDoS:

2022
Nilesh Vishwasrao Patil   +2 more
openaire   +1 more source

DDOS dynamics

2018
Rump Session of the Workshop of the Economics of Information Security, 18 juni ...
openaire   +1 more source

DDoS Attacks

2001
Ryan Russell   +4 more
openaire   +1 more source

DDoS

2020
openaire   +1 more source

An exhaustive study of DDOS attacks and DDOS datasets

International Journal of Internet Technology and Secured Transactions, 2020
Joshua Ojo Nehinbe   +1 more
openaire   +1 more source

DDoS in the IoT: Mirai and Other Botnets

Computer, 2017
C. Kolias   +3 more
semanticscholar   +1 more source

DDoS Lab

2020
Richard R. Brooks, İlker Özçelik
openaire   +1 more source

Analysis of Hybrid DDoS Defense to Mitigate DDoS Impact

Advanced Science Letters, 2017
Gede Barkah Widagdo, Charles Lim
openaire   +1 more source

Home - About - Disclaimer - Privacy