Results 241 to 250 of about 503,301 (280)
Some of the next articles are maybe not open access.
Quality of service and denial of service
Proceedings of the ACM SIGCOMM workshop on Revisiting IP QoS What have we learned, why do we care? - RIPQoS '03, 2003We argue that most forms of internet QoS must provide protection against DoS attacks. To date, the most cost-effective way of improving the treatment of some traffic has been to improve the treatment of all traffic. In a well-provisioned network, protection from DoS is essentially what defines QoS.
Stanislav Shalunov, Benjamin Teitelbaum
openaire +1 more source
A policy model for denial of service
[1990] Proceedings. The Computer Security Foundations Workshop III, 2002A service model that is framed on the notions of subject priority and object criticality is introduced. The prevent (p, c) denial of service policy is expressed with respect to the service model. The author demonstrates an approach to arguing compliance with the policy by interpreting the System V/MLS secure operating system in terms of the service ...
openaire +1 more source
Denial of service protection the nozzle
Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00), 2002A denial of service attack is a dominating conversation with a network resource designed to preclude other conversations with that resource. This type of attack can cost millions of dollars when the target is a critical resource such as a Web server or domain name server.
openaire +1 more source
International Journal of Information Security and Cybercrime, 2021
A denial-of-service (DoS) is any type of attack where the attackers (hackers) attempt to prevent legitimate users from accessing the service. In a DoS attack, the attacker usually sends excessive messages asking the network or server to authenticate requests that have invalid return addresses.
openaire +1 more source
A denial-of-service (DoS) is any type of attack where the attackers (hackers) attempt to prevent legitimate users from accessing the service. In a DoS attack, the attacker usually sends excessive messages asking the network or server to authenticate requests that have invalid return addresses.
openaire +1 more source
Denial of Service — Panel Discussion
2001Virgil Gligor: I decided to go first, to review a brief history of what I think the denial of service problem was, and the motivation. I started working on this at a time when the denial of service problem was being denied, in fact we were in a state of denial.
Virgil D. Gligor +2 more
openaire +1 more source
On denial-of-service in computer networks
1986 IEEE Second International Conference on Data Engineering, 1986The problem of denial of service and some of Its properties are reviewed. Some common misconceptions about denial of service are explained. Although fundamental changes to the notion of denial of service are unwarranted by use of computer networks, new and novel Instances of the problem appear. Research directions for solutions to the denlal-of-servlce
openaire +1 more source
Denial-of-Service & Distributed Denial-of-Service on The Internet. [PDF]
Kate Ormiston, Mariki M. Eloff
openaire
Event-triggered H∞ control for networked control systems under denial-of-service attacks
Transactions of the Institute of Measurement and Control, 2021Liruo Zhang +2 more
exaly

