Results 51 to 60 of about 26,597 (201)

Victimization in DDoS attacks: The role of popularity and industry sector

open access: yesJournal of Information Security and Applications
Distributed denial-of-service (DDoS) attacks may be driven not only by economic motives such as extortion, but also by social or political goals, including hacktivism and state-sponsored operations. Therefore, the monetary value of a target alone does not fully explain why some organizations are more frequently victimized.
Muhammad Yasir Muzayan Haq   +6 more
openaire   +2 more sources

Data privacy model using blockchain reinforcement federated learning approach for scalable internet of medical things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Internet of Medical Things (IoMT) has typical advancements in the healthcare sector with rapid potential proof for decentralised communication systems that have been applied for collecting and monitoring COVID‐19 patient data. Machine Learning algorithms typically use the risk score of each patient based on risk factors, which could help ...
Chandramohan Dhasaratha   +9 more
wiley   +1 more source

DDoS attacks and machine‐learning‐based detection methods: A survey and taxonomy

open access: yesEngineering Reports, 2023
Distributed denial of service (DDoS) attacks represent a significant cybersecurity challenge, posing a critical risk to computer networks. Developing an effective defense mechanism against these attacks is crucial but challenging, given their diverse ...
Mohammad Najafimehr   +2 more
doaj   +1 more source

Mark-aided distributed filtering by using neural network for DDoS defense

open access: yes, 2005
Currently Distributed Denial of Service (DDoS) attacks have been identified as one of the most serious problems on the Internet. The aim of DDoS attacks is to prevent legitimate users from accessing desired resources, such as network bandwidth. Hence the
Xiang, Yang, Zhou, Wanlei
core   +1 more source

Graph neural network‐based attack prediction for communication‐based train control systems

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract The Advanced Persistent Threats (APTs) have emerged as one of the key security challenges to industrial control systems. APTs are complex multi‐step attacks, and they are naturally diverse and complex. Therefore, it is important to comprehend the behaviour of APT attackers and anticipate the upcoming attack actions.
Junyi Zhao   +3 more
wiley   +1 more source

Dynamic Resource Allocation Optimisation and Security‐Resilient Control for Bandwidth‐Limited Network Control Systems With Data Conflicts

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Networked control systems (NCSs) often suffer from performance degradation due to limited communication bandwidth, which can cause data transmission conflicts and packet loss. Existing scheduling strategies may fail to simultaneously meet the real‐time requirements and the importance of multisensor data, and they are particularly vulnerable ...
Da Chen   +5 more
wiley   +1 more source

Defending Against Denial of Service [PDF]

open access: yes, 2012
Civil Society currently faces significant cyber threats. At the top of the list of those threats are Denial of Service (DoS) attacks. The websites of many organizations and individuals have already come under such attacks, and the frequency of those ...

core  

lincRNA6679 promotes FnPR1B expression via phosphorylation‐activated FnWRKY14 to enhance strawberry resistance to Botrytis cinerea

open access: yesJournal of Integrative Plant Biology, EarlyView.
In strawberry, Botrytis cinerea induces the expression of the long, intergenic non‐coding RNA lincRNA667,which upregulates the transcription factor gene FnWRKY14. FnWRKY14 then binds to the promoter of the pathogenesis‐related gene FnPR1B, enhancing strawberry resistance to B. cinerea.
Yuhan Guan   +6 more
wiley   +1 more source

A broad learning-based comprehensive defence against SSDP reflection attacks in IoTs

open access: yesDigital Communications and Networks, 2023
The proliferation of Internet of Things (IoT) rapidly increases the possiblities of Simple Service Discovery Protocol (SSDP) reflection attacks. Most DDoS attack defence strategies deploy only to a certain type of devices in the attack chain,and need to ...
Xin Liu   +5 more
doaj   +1 more source

Entropy-based collaborative detection of DDOS attacks on community networks

open access: yes, 2008
A community network often operates with the same Internet service provider domain or the virtual network of different entities who are cooperating with each other.
Yu, Shui, Zhou, Wanlei
core   +1 more source

Home - About - Disclaimer - Privacy