Results 81 to 90 of about 29,505 (203)
Network attack detection at flow level
In this paper, we propose a new method for detecting unauthorized network intrusions, based on a traffic flow model and Cisco NetFlow protocol application.
C. Douligeris +3 more
core +1 more source
MdRLKT1–MdRAX2–MdMKS1 Module Positively Regulating Resistance to Cytospora mali in Apple
ABSTRACT Valsa canker (caused by Cytospora mali = Valsa mali. C. mali) is one of the most destructive diseases affecting apple cultivation. The scarcity of natural germplasm resources with high resistance and immunity underscores the importance of exploring plant immune regulation factors of disease‐resistant breeding.
Yanan Tang +5 more
wiley +1 more source
Abstract This work experimentally validates the RESPONSE (Resilient Process cONtrol SystEm) framework as a solution for maintaining safe, continuous operation of cyber‐physical process systems under cyberattacks. RESPONSE implements a dual‐loop architecture that runs a networked online controller in parallel with a hard‐isolated offline controller ...
Luyang Liu +5 more
wiley +1 more source
A real-time machine-learning model for detecting and mitigating DDoS attacks
Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks are among the most lethal cyber threats in this world, which make an online service unavailable to its legitimate users by overwhelming the service provider’s resources.
Mohammad Fathian, Alireza Seifousadati
doaj +1 more source
Deep Defense: Using Radial Basis Neural Networks for Mitigating the DDoS Attacks
The SDN architecture supports the detection and mitigation of DDoS attacks as soon as possible, which is difficult in a conventional network. The SDN controller identifies DDoS attacks in their early phases and mitigates their impact on the entire ...
Roheen Qamar +4 more
doaj +1 more source
An Approach for Mitigating Denial of Service Attack [PDF]
Distributed Denial of Service (DDoS) attacks are the most common types of cyber-attack on the internet and are rapidly increasing. Denial of service/distributed denial of service attack is an explicit attempt to make a machine or a network resource ...
Chauhan, Chetan
core
A Cost-effective Shuffling Method against DDoS Attacks using Moving Target Defense
Moving Target Defense (MTD) has emerged as a newcomer into the asymmetric field of attack and defense, and shuffling-based MTD has been regarded as one of the most effective ways to mitigate DDoS attacks.
Chen, Zihan +5 more
core +1 more source
A Blockchain‐Less Traceability System for Agriculture Using DAG, IPFS, and Serverless Deployments
ABSTRACT Ensuring transparency and integrity in agricultural data management is a critical challenge as the sector increasingly relies on advanced technologies. The primary problem is maintaining data traceability and security throughout the supply chain.
Antonio Villafranca +6 more
wiley +1 more source
Trust Implications of DDoS Protection in Online Elections
Online elections make a natural target for distributed denial of service attacks. Election agencies wary of disruptions to voting may procure DDoS protection services from a cloud provider.
Culnane, Chris +3 more
core +1 more source
Identification and Authentication Failures: Foundational Aspects of Strong Detection Mechanisms
A review of recent techniques for detecting Identification and Authentication Failures in online platforms storing sensitive user data. Analyzed methods include biometric, hierarchical, blockchain, IoT‐based, EPICS, and VAP authentication systems. ABSTRACT Online platforms, such as e‐commerce and online apps, have become crucial in daily activities ...
Md. Maruf Hassan +2 more
wiley +1 more source

