Results 81 to 90 of about 26,597 (201)

Adaptive Response System for Distributed Denial-of-Service Attacks

open access: yes, 2008
The continued prevalence and severe damaging effects of the Distributed Denial of Service (DDoS) attacks in today’s Internet raise growing security concerns and call for an immediate response to come up with better solutions to tackle DDoS attacks. The
Thing, Vrizlynn Ling Ling   +1 more
core   +1 more source

Experimental validation of the RESPONSE framework against cyberattacks on cyber‐physical process systems

open access: yesAIChE Journal, Volume 72, Issue 5, May 2026.
Abstract This work experimentally validates the RESPONSE (Resilient Process cONtrol SystEm) framework as a solution for maintaining safe, continuous operation of cyber‐physical process systems under cyberattacks. RESPONSE implements a dual‐loop architecture that runs a networked online controller in parallel with a hard‐isolated offline controller ...
Luyang Liu   +5 more
wiley   +1 more source

A Blockchain‐Less Traceability System for Agriculture Using DAG, IPFS, and Serverless Deployments

open access: yesInternational Journal of Network Management, Volume 36, Issue 3, May/June 2026.
ABSTRACT Ensuring transparency and integrity in agricultural data management is a critical challenge as the sector increasingly relies on advanced technologies. The primary problem is maintaining data traceability and security throughout the supply chain.
Antonio Villafranca   +6 more
wiley   +1 more source

Detection Model for 5G Core PFCP DDoS Attacks Based on Sin-Cos-bIAVOA

open access: yesAlgorithms
The development of 5G environments has several advantages, including accelerated data transfer speeds, reduced latency, and improved energy efficiency.
Zheng Ma, Rui Zhang, Lang Gao
doaj   +1 more source

Trust Implications of DDoS Protection in Online Elections

open access: yes, 2017
Online elections make a natural target for distributed denial of service attacks. Election agencies wary of disruptions to voting may procure DDoS protection services from a cloud provider.
Culnane, Chris   +3 more
core   +1 more source

Identification and Authentication Failures: Foundational Aspects of Strong Detection Mechanisms

open access: yesEngineering Reports, Volume 8, Issue 4, April 2026.
A review of recent techniques for detecting Identification and Authentication Failures in online platforms storing sensitive user data. Analyzed methods include biometric, hierarchical, blockchain, IoT‐based, EPICS, and VAP authentication systems. ABSTRACT Online platforms, such as e‐commerce and online apps, have become crucial in daily activities ...
Md. Maruf Hassan   +2 more
wiley   +1 more source

Machine Learning DDoS Detection for Consumer Internet of Things Devices

open access: yes, 2018
An increasing number of Internet of Things (IoT) devices are connecting to the Internet, yet many of these devices are fundamentally insecure, exposing the Internet to a variety of attacks. Botnets such as Mirai have used insecure consumer IoT devices to
Apthorpe, Noah   +2 more
core   +1 more source

A Note on Analysing the Attacker Aims Behind DDoS Attacks [PDF]

open access: yes, 2019
Distributed denial of service (DDoS) attacks pose a serious threat to the availability of online resources. In this paper, we analyse the attacker aims for the use of DDoS attacks. We propose a model that can be used to evaluate news articles for determining probable aims of attackers.
Abhishta Abhishta   +3 more
openaire   +2 more sources

DDoS Attack Detection and Attacker Identification

open access: yesInternational Journal of Computer Applications, 2012
DDoS attack is a form of DoS attack in which attacker uses authorized user IP address to attack on a particular victim. Of the two types of attack it falls in the active category. The main aim of the attacker is to jam the resources in order to deny services to the recipient. The attacker can use several strategies to achieve this goal, one of which is
S. K. Jena, Brajesh Kashyap
openaire   +1 more source

Mitigation of Application Layer DDoS Flood Attack Against Web Servers

open access: yesJournal of Information Security and Cybercrimes Research, 2019
The Application-layer Distributed Denial of Service (App-DDoS) attack is one of the most menacing types of cyberattacks that circumvent web servers. Since the attackers have developed different techniques and methods, preventing App-DDoS attacks has ...
Ahamed Aljuhani   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy