Results 81 to 90 of about 29,505 (203)

Network attack detection at flow level

open access: yes, 2011
In this paper, we propose a new method for detecting unauthorized network intrusions, based on a traffic flow model and Cisco NetFlow protocol application.
C. Douligeris   +3 more
core   +1 more source

MdRLKT1–MdRAX2–MdMKS1 Module Positively Regulating Resistance to Cytospora mali in Apple

open access: yesPlant Biotechnology Journal, Volume 24, Issue 6, Page 4105-4120, June 2026.
ABSTRACT Valsa canker (caused by Cytospora mali = Valsa mali. C. mali) is one of the most destructive diseases affecting apple cultivation. The scarcity of natural germplasm resources with high resistance and immunity underscores the importance of exploring plant immune regulation factors of disease‐resistant breeding.
Yanan Tang   +5 more
wiley   +1 more source

Experimental validation of the RESPONSE framework against cyberattacks on cyber‐physical process systems

open access: yesAIChE Journal, Volume 72, Issue 5, May 2026.
Abstract This work experimentally validates the RESPONSE (Resilient Process cONtrol SystEm) framework as a solution for maintaining safe, continuous operation of cyber‐physical process systems under cyberattacks. RESPONSE implements a dual‐loop architecture that runs a networked online controller in parallel with a hard‐isolated offline controller ...
Luyang Liu   +5 more
wiley   +1 more source

A real-time machine-learning model for detecting and mitigating DDoS attacks

open access: yesCybersecurity
Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks are among the most lethal cyber threats in this world, which make an online service unavailable to its legitimate users by overwhelming the service provider’s resources.
Mohammad Fathian, Alireza Seifousadati
doaj   +1 more source

Deep Defense: Using Radial Basis Neural Networks for Mitigating the DDoS Attacks

open access: yesSukkur IBA Journal of Computing and Mathematical Sciences
The SDN architecture supports the detection and mitigation of DDoS attacks as soon as possible, which is difficult in a conventional network. The SDN controller identifies DDoS attacks in their early phases and mitigates their impact on the entire ...
Roheen Qamar   +4 more
doaj   +1 more source

An Approach for Mitigating Denial of Service Attack [PDF]

open access: yes, 2013
Distributed Denial of Service (DDoS) attacks are the most common types of cyber-attack on the internet and are rapidly increasing. Denial of service/distributed denial of service attack is an explicit attempt to make a machine or a network resource ...
Chauhan, Chetan
core  

A Cost-effective Shuffling Method against DDoS Attacks using Moving Target Defense

open access: yes, 2019
Moving Target Defense (MTD) has emerged as a newcomer into the asymmetric field of attack and defense, and shuffling-based MTD has been regarded as one of the most effective ways to mitigate DDoS attacks.
Chen, Zihan   +5 more
core   +1 more source

A Blockchain‐Less Traceability System for Agriculture Using DAG, IPFS, and Serverless Deployments

open access: yesInternational Journal of Network Management, Volume 36, Issue 3, May/June 2026.
ABSTRACT Ensuring transparency and integrity in agricultural data management is a critical challenge as the sector increasingly relies on advanced technologies. The primary problem is maintaining data traceability and security throughout the supply chain.
Antonio Villafranca   +6 more
wiley   +1 more source

Trust Implications of DDoS Protection in Online Elections

open access: yes, 2017
Online elections make a natural target for distributed denial of service attacks. Election agencies wary of disruptions to voting may procure DDoS protection services from a cloud provider.
Culnane, Chris   +3 more
core   +1 more source

Identification and Authentication Failures: Foundational Aspects of Strong Detection Mechanisms

open access: yesEngineering Reports, Volume 8, Issue 4, April 2026.
A review of recent techniques for detecting Identification and Authentication Failures in online platforms storing sensitive user data. Analyzed methods include biometric, hierarchical, blockchain, IoT‐based, EPICS, and VAP authentication systems. ABSTRACT Online platforms, such as e‐commerce and online apps, have become crucial in daily activities ...
Md. Maruf Hassan   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy