Results 31 to 40 of about 503,301 (280)

Denial-of-service in automation systems [PDF]

open access: yes2008 IEEE International Conference on Emerging Technologies and Factory Automation, 2008
Security aspects of todaypsilas automation systems gain increasing importance. One critical point regarding security is the exchange of control data over the network. Recently, cryptographic techniques have been developed that can protect the transmitted data against a malicious interference.
Wolfgang Granzer   +2 more
openaire   +1 more source

Composite DoS attack model / Jungtinis DoS atakų modelis

open access: yesMokslas: Lietuvos Ateitis, 2012
Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc.
Simona Ramanauskaitė, Antanas Čenys
doaj   +1 more source

Detecting Denial of Service attacks using machine learning algorithms

open access: yesJournal of Big Data, 2022
Currently, Distributed Denial of Service Attacks are the most dangerous cyber danger. By inhibiting the server's ability to provide resources to genuine customers, the affected server's resources, such as bandwidth and buffer size, are slowed down.
Kimmi Kumari, M. Mrunalini
doaj   +1 more source

Active Internet Traffic Filtering: Real-time Response to Denial of Service Attacks [PDF]

open access: yes, 2003
Denial of Service (DoS) attacks are one of the most challenging threats to Internet security. An attacker typically compromises a large number of vulnerable hosts and uses them to flood the victim's site with malicious traffic, clogging its tail circuit ...
Argyraki, Katerina J.   +1 more
core   +3 more sources

High-Speed Network DDoS Attack Detection: A Survey

open access: yesSensors, 2023
Having a large number of device connections provides attackers with multiple ways to attack a network. This situation can lead to distributed denial-of-service (DDoS) attacks, which can cause fiscal harm and corrupt data.
Rana M. Abdul Haseeb-ur-rehman   +6 more
doaj   +1 more source

Deteksi Serangan Denial Of Service Menggunakan Artificial Immune System [PDF]

open access: yes, 2016
Salah satu masalah ayng ada pada bidang komputer security adalah serangan Denial of Service (DoS). Sudah banyak dikembangkan, beberapa metode yang dapat digunakan untuk mendeteksi jenis serangan ini, salah satunya adalah anomaly detection.
Heryanto, A. (Ahmad)   +1 more
core  

Protecting web services with service oriented traceback architecture [PDF]

open access: yes, 2008
Service oriented architecture (SOA) is a way of reorganizing software infrastructure into a set of service abstracts. In the area of applying SOA to Web service security, there have been some well defined security dimensions.
Chonka, Ashley   +2 more
core   +2 more sources

Assessing Cognitive Functioning in Children With Brain Tumors: Interaction of Neighborhood Social Determinants of Health and Neurological Risk

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background This study investigated how neighborhood‐level social determinants of health (SDOH), including redlining and neurological risk, interact to influence cognitive outcomes in children treated for brain tumors (CTBT). Methods A retrospective chart review of 161 CTBT aged 5–17 was conducted.
Alannah R. Srsich   +5 more
wiley   +1 more source

Neutrosophic Set and Machine Learning Models for Detection of DoS Attack Resilience [PDF]

open access: yesNeutrosophic Sets and Systems
Security has been a major problem in in-vehicle networks (VNs) in recent years, assaults that broadcast a deluge of packets, including Denial of Service (DoS) and Distributed Denial of Service (DDoS) assaults, might put the network at risk. Consequently,
Ahmad M. Nagm   +6 more
doaj   +1 more source

Defending Against Denial of Service [PDF]

open access: yes, 2012
Civil Society currently faces significant cyber threats. At the top of the list of those threats are Denial of Service (DoS) attacks. The websites of many organizations and individuals have already come under such attacks, and the frequency of those ...

core  

Home - About - Disclaimer - Privacy