Results 71 to 80 of about 29,505 (203)

A Novel Protective Framework for Defeating HTTP-Based Denial of Service and Distributed Denial of Service Attacks

open access: yesThe Scientific World Journal, 2015
The growth of web technology has brought convenience to our life, since it has become the most important communication channel. However, now this merit is threatened by complicated network-based attacks, such as denial of service (DoS) and distributed ...
Mohammed A. Saleh, Azizah Abdul Manaf
doaj   +1 more source

The dangers, directness, and purposes of online collective actions

open access: yesPolitical Psychology, EarlyView.
Abstract Most research on online collective action investigates low‐effort, social media‐based actions rather than tactics with highly disruptive potential. To better account for the variety of forms of collective actions that use digital technologies, we conducted an open‐source intelligence search (Study 1a) and an expert consultation survey (Study ...
Catherine G. Lowery   +2 more
wiley   +1 more source

Moral Tolerance: The Ethics of Social Punishment in Cases of Moral Disagreement

open access: yesTheoria, EarlyView.
ABSTRACT In many practical contemporary contexts, people need to make correct ethical judgements about how to respond to perceived wrongdoing—in particular, whether to punish it or tolerate it. This judgement can be challenging when the wrongdoer does not accept the allegation of wrongdoing at the level of moral principle, holding that the type of ...
Hugh Breakey, Graham Wood
wiley   +1 more source

A Survey for Deep Reinforcement Learning Based Network Intrusion Detection

open access: yesApplied AI Letters, Volume 7, Issue 2, June 2026.
This paper surveys deep reinforcement learning (DRL) for network intrusion detection, evaluating model efficiency, minority attack detection, and dataset imbalance. Findings show DRL achieves state‐of‐the‐art results on public datasets, sometimes surpassing traditional deep learning.
Wanrong Yang   +3 more
wiley   +1 more source

Preventing DDoS using Bloom Filter: A Survey

open access: yes, 2018
Distributed Denial-of-Service (DDoS) is a menace for service provider and prominent issue in network security. Defeating or defending the DDoS is a prime challenge. DDoS make a service unavailable for a certain time.
Borgohain, Samir Kumar   +2 more
core   +1 more source

The Role of N6‐Methyladenosine Modification in Health and Disease

open access: yesMedComm, Volume 7, Issue 6, June 2026.
N6‐methyladenosine (m6A) is the most prevalent internal RNA modification in eukaryotes, acting as a pivotal epitranscriptomic regulator of RNA metabolism. This modification plays a dual role: it maintains physiological homeostasis under normal conditions but drives disease progression when dysregulated.
Linghuan Li   +6 more
wiley   +1 more source

Защита NTP-серверов от DDOS-атак [PDF]

open access: yes, 2014
The realization of DDoS-attacks using the protocol NTP. The amplification of traffic NTP-server when you issue monlist.
Ха Туан Кханг   +1 more
core  

CALD : surviving various application-layer DDoS attacks that mimic flash crowd

open access: yes, 2010
Distributed denial of service (DDoS) attack is a continuous critical threat to the Internet. Derived from the low layers, new application-layer-based DDoS attacks utilizing legitimate HTTP requests to overwhelm victim resources are more undetectable. The
Jia, Weijia   +4 more
core   +1 more source

Generating Pattern‐Based Datasets for Cyber Attack Detection Using Machine‐Learning Techniques

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 16, Issue 2, June 2026.
The aim of this work is to review the state of the art in the design, generation, and labeling of attack pattern datasets for training of detection systems based on machine learning. ABSTRACT This work aims to review the state of the art in the design, generation, and labeling of attack pattern datasets for the training of detection systems based on ...
Pedro Díaz García   +4 more
wiley   +1 more source

Defending Against Denial of Service [PDF]

open access: yes, 2012
Civil Society currently faces significant cyber threats. At the top of the list of those threats are Denial of Service (DoS) attacks. The websites of many organizations and individuals have already come under such attacks, and the frequency of those ...

core  

Home - About - Disclaimer - Privacy