Results 61 to 70 of about 29,505 (203)
Graph neural network‐based attack prediction for communication‐based train control systems
Abstract The Advanced Persistent Threats (APTs) have emerged as one of the key security challenges to industrial control systems. APTs are complex multi‐step attacks, and they are naturally diverse and complex. Therefore, it is important to comprehend the behaviour of APT attackers and anticipate the upcoming attack actions.
Junyi Zhao +3 more
wiley +1 more source
Until now, an effective defense method against Distributed Denial of Service (DDoS) attacks is yet to be offered by security systems. Incidents of serious damage due to DDoS attacks have been increasing, thereby leading to an urgent need for new attack ...
Bashar Ahmed Khalaf +4 more
doaj +1 more source
Distributed Denial of Service (DDoS) attacks represent the most common and critical attacks targeting conventional and new generation networks, such as the Internet of Things (IoT), cloud computing, and fifth-generation (5G) communication networks.
Noe Marcelo Yungaicela-Naula +2 more
doaj +1 more source
ABSTRACT Networked control systems (NCSs) often suffer from performance degradation due to limited communication bandwidth, which can cause data transmission conflicts and packet loss. Existing scheduling strategies may fail to simultaneously meet the real‐time requirements and the importance of multisensor data, and they are particularly vulnerable ...
Da Chen +5 more
wiley +1 more source
Fingerprinting Internet DNS Amplification DDoS Activities
This work proposes a novel approach to infer and characterize Internet-scale DNS amplification DDoS attacks by leveraging the darknet space. Complementary to the pioneer work on inferring Distributed Denial of Service (DDoS) activities using darknet ...
Bou-Harb, Elias +2 more
core +1 more source
Feature Selection Approach to Detect DDoS Attack Using Machine Learning Algorithms
Distributed Denial of Service (DDoS) attacks are dangerous attacks that can cause disruption to server, system or application layer. It will flood the target server with the amount of Internet traffic that the server could not afford at one time ...
Muhammad Aqil Haqeemi Azmi +5 more
doaj +1 more source
Distinguishing DDoS attacks from flash crowds using probability metrics
Both Flash crowds and DDoS (Distributed Denial-of-Service) attacks have very similar properties in terms of internet traffic, however Flash crowds are legitimate flows and DDoS attacks are illegitimate flows, and DDoS attacks have been a serious threat ...
Hai, Jing +4 more
core +1 more source
In strawberry, Botrytis cinerea induces the expression of the long, intergenic non‐coding RNA lincRNA667,which upregulates the transcription factor gene FnWRKY14. FnWRKY14 then binds to the promoter of the pathogenesis‐related gene FnPR1B, enhancing strawberry resistance to B. cinerea.
Yuhan Guan +6 more
wiley +1 more source
ABSTRACT Striped stem borer (SSB; Chilo suppressalis Walker) is one of the most destructive pests in rice production. Previous studies have demonstrated that SSB infestation induces transcription of OsT5H (tryptamine‐5‐hydroxylase) and biosynthesis of serotonin, a newly recognised phytohormone, and that disruption of serotonin biosynthesis ...
Jia‐Run Zhang +9 more
wiley +1 more source
A Distributed Denial of Service (DDoS) attack is an attempt to make a service unavailable by overwhelming the server with malicious traffic. DDoS attacks have become the most tedious and cumbersome issue in recent past. The number and magnitude of attacks have increased from few megabytes of data to 100s of terabytes of data these days.
null Dhananjay Tangtode +4 more
openaire +2 more sources

